WorldWideScience

Sample records for civil security forces

  1. Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War

    NARCIS (Netherlands)

    Jentzsch, C.

    2017-01-01

    Who rules during the civil war? This article argues that the concept of armed group governance must be expanded to include auxiliary armed forces linked to rebels or the government. Comparing the organization of rebel and government auxiliaries, the article demonstrates that security governance

  2. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  3. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  4. Civil-military relations : enhancing international security

    OpenAIRE

    Fekete, Florian

    2003-01-01

    Approved for public release; distribution is unlimited The thesis describes how civil-military relations at the international level enhance international security, in particular, the way of development of international society in trying to orient its progress towards international peace, security and sustainable development. It focuses upon civil-military relationships in the League of Nations and the United Nations, the North Atlantic Treaty Organization, The International Committee of Re...

  5. Air Force Civil Engineer, Volume 14, Number 2, 2006

    Science.gov (United States)

    2006-01-01

    homes located off base), reimburs - able service agreements are created between the housing development’s project owner and both the Air Force...Just as with security, fire protection is provided by the on-base fire department on a reimbursable basis. At a recent fire at Hanscom AFB, Mass... reimbursable clients; and programming functions. Input of this “living record” allows the database to manage the 5-Year Plan so 16 AIR FORCE CIVIL

  6. Capitalizing on emergence: The 'new' civil security market in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2014-01-01

    In recent years, the European Union has supported the development of a new civil security market, capable of providing security technology for new and global security challenges. This article analyses the emerging growth market for civil security in relation to contemporary notions of potential

  7. Risk assessment techniques for civil aviation security

    Energy Technology Data Exchange (ETDEWEB)

    Tamasi, Galileo, E-mail: g.tamasi@enac.rupa.i [Ente Nazionale per l' Aviazione Civile-Direzione Progetti, Studi e Ricerche, Via di Villa Ricotti, 42, 00161 Roma (Italy); Demichela, Micaela, E-mail: micaela.demichela@polito.i [SAfeR-Centro Studi su Sicurezza, Affidabilita e Rischi, Dipartimento di Scienza dei Materiali e Ingegneria Chimica, Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129 Torino (Italy)

    2011-08-15

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  8. Risk assessment techniques for civil aviation security

    International Nuclear Information System (INIS)

    Tamasi, Galileo; Demichela, Micaela

    2011-01-01

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  9. Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  10. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  11. Regional Civil Support Forces for Homeland Defense and Civil Support Missions

    National Research Council Canada - National Science Library

    Nuismer, Barbara A

    2007-01-01

    To protect the homeland, a plan to form ten regional Civil Support Forces (CSF) made up of National Guard forces has been proposed by senior fellow Christine Wormuth of the Center for Strategic and International Studies (CSIS...

  12. Civil-Military Relations: Enhancing International Security

    National Research Council Canada - National Science Library

    Fekete, Florian

    2003-01-01

    .... In particular, it focuses upon civil-military relationships in the League of Nations and the United Nations, the North Atlantic Treaty Organization and The International Committee of Red Cross...

  13. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  14. Analysis of Air Force Civil Engineering Strategic Planning

    National Research Council Canada - National Science Library

    Mondo, Francis

    2003-01-01

    Several organizations within the Department of Defense, including the Air Force Civil Engineer, are actively engaged in strategic planning in an effort to create a roadmap for future capabilities and performance...

  15. Securing the Peace After Civil War

    Science.gov (United States)

    2009-03-01

    transportation infrastructure has been destroyed. The currency is often devalued . Institutions are weak and corrupt with dysfunctional legal, governmental...increases to an average of five percent during a civil war.28 A 1997 IMF study estimated that an additional 2.2 percent of GDP spent on the military...to rule in an arbitrary and repressive manner. The recent examples in Venezuela and Nigeria suggest that even when the governments of oil states

  16. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  17. The Theological Misappropriation of Christianity as a Civilizing Force

    Science.gov (United States)

    MisirHiralall, Sabrina D.

    2017-01-01

    The theological misappropriation of Christianity as a civilizing force occurs when individuals convert to Christianity due to deception that ignores the faith-based aspect of Christianity. The history of Western education in India illustrates the hidden curriculum that Christian missionaries employed to disrupt the Indian educational system. This…

  18. Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2014-01-01

    In recent years, the European Union has supported the development of a new civil security market, capable of providing security technology for new and global security challenges. This article analyses the emerging growth market for civil security in relation to contemporary notions of potential

  19. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  20. Rhetoric of civil conflict management: United Nations Security Council debates over the Syrian civil war

    Directory of Open Access Journals (Sweden)

    Juraj Medzihorsky

    2017-04-01

    Full Text Available This paper introduces a spatial model of civil conflict management rhetoric to explore how the emerging norm of responsibility to protect shapes major power rhetorical responses to civil war. Using framing theory, we argue that responsibility to protect functions like a prescriptive norm, such that representing a conflict as one of (1 human rights violations (problem definition, implies rhetorical support for (2 coercive outside intervention (solution identification. These dimensions reflect the problem-solution form of a prescriptive norm. Using dictionary scaling with a dynamic model, we analyze the positions of UN Security Council members in debates over the Syrian Civil War separately for each dimension. We find that the permanent members who emphasized human rights violations also used intervention rhetoric (UK, France, and the US, and those who did not used non-intervention rhetoric (Russia and China. We conclude that, while not a fully consolidated norm, responsibility to protect appears to have structured major power rhetorical responses to the Syrian Civil War.

  1. Air Force Civil Engineer, Volume 9, Number 2, Summer 2001

    Science.gov (United States)

    2001-01-01

    and massive concrete slabs with protruding steel segments were partially hidden by an overgrowth of vegetation . The three-story structure, which was...terms of the job you get afterward. Capt Bill Kale came to AFIT from Lajes Field, Azores, where he was the base architect with the 65th CES. Q. Why did...meet Air Force civil engineer needs. Speaking of AFIT � Capt Manuel Fernandez Capt Bill Kale Capt Laurie Richter Interviews with current and former

  2. DEBT SECURITIES, SECURITIES IN THE NEW CODE OF CIVIL LAW – THE NEED OF JUDICIAL DISAMBIGUATION

    Directory of Open Access Journals (Sweden)

    Eugenia Florescu

    2012-11-01

    Full Text Available A large part of the wealth is invested in securities, which circulate through documents or specific scriptural records that are located in the memory of the computer. These magnetic or paper-made „supports”, received different names, in law and in doctrine: debt securities, securities, negotiable instruments or commercial securities, equity securities, bearer bonds, financial instruments, transferable securities, stocks, bonds, bill, promissory note, check, et al. These expressions used by the New Code of Civil Law were assumed tale quale from the specialized language of commercial law, without any concern for explaining the foundation and judicial meaning of these legal institutions, and eliminate the ambiguity in this matter. Under such conditions, the analysis is to identify the criteria under which the judicial genre will separate from the judicial species in relation to the law and jurisprudence of the European Union and/or to the regulations specially adopted at national level, over time.

  3. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ... civil rights, civil liberties, such as profiling on the basis of race, ethnicity, or religion, by.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it); Allegation... Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive...

  4. Civil Air Patrol Proposed Agreements With the Air Force Are Intended to Address Identified Problems

    National Research Council Canada - National Science Library

    2000-01-01

    The Air Force and Civil Air Patrol relationship is usually cooperative. The Air Force includes the Patrol in its internal budget process to determine what the Patrol needs and how much money will be available to support the Patrol...

  5. Ukraine. Law on civil liability for nuclear damage and its financial security (13 december 2001)

    International Nuclear Information System (INIS)

    Anon.

    2002-01-01

    The objective of this law is to regulate civil liability for the compensation of damage resulting from activities involving the utilisation of nuclear energy for peaceful purposes. It governs relations in respect of civil liability for nuclear damage, establishes the rules and procedures for compensation for damage caused by a nuclear incident, defines the methods of ensuring financial security of civil liability and establishes its limits. (N.C.)

  6. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  7. Michel Foucault and the Forces of Civil Society

    DEFF Research Database (Denmark)

    Villadsen, Kaspar

    2016-01-01

    , presenting civil society as a ‘reality that does not exist’ but still has real effects. This new reality holds contradictory potentials. When articulated by political eschatology, civil society supports prophecies of the end of politics in a final accord where contradictions dissolve and the community...... absorbs the state. Neoliberal notions of civil society promise, on Foucault’s account, a more open-ended milieu of subject formation....

  8. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  9. Legislating Civil Service Reform: The Homeland Security Act of 2002

    National Research Council Canada - National Science Library

    Brook, Douglas A; King, Cynthia L; Anderson, David; Bahr, Joshua

    2006-01-01

    .... It includes a review of the recent history of civil service reform, a chronology of the major events leading up to passage of the legislation, and a detailed examination of the rhetorical framing...

  10. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  11. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  12. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  13. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  14. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  15. Civil control over the security institutions in South Africa ...

    African Journals Online (AJOL)

    security policy. The main aim of this article is therefore to assist critical new thinking regarding security.6. Then, to draw policy implications for the governance of security and intelligence ...... network of institutions and relationships that involve vertical and horizontal accountability . Important is Karl s observation that ...

  16. Applications of nuclear techniques relevant for civil security

    International Nuclear Information System (INIS)

    Valkovi, Vlado

    2006-01-01

    The list of materials which are subject to inspection with the aim of reducing the acts of terrorism includes explosives, narcotics, chemical weapons, hazardous chemicals and radioactive materials. To this we should add also illicit trafficking with human beings. The risk of nuclear terrorism carried out by sub-national groups is considered not only in construction and/or use of nuclear device, but also in possible radioactive contamination of large urban areas. Modern personnel, parcel, vehicle and cargo inspection systems are non-invasive imaging techniques based on the use of nuclear analytical techniques. The inspection systems use penetrating radiations: hard x-rays (300 keV or more) or gamma-rays from radioactive sources ( 137 Cs and 60 Co with energies from 600 to 1300 keV) that produce a high resolution radiograph of the load. Unfortunately, this information is 'non-specific' in that it gives no information on the nature of objects that do not match the travel documents and are not recognized by a visual analysis of the radiographic picture. Moreover, there are regions of the container where x and gamma-ray systems are 'blind' due to the high average atomic number of the objects irradiated that appear as black spots in the radiographic image. Contrary to that is the use of neutrons; as results of the bombardment, nuclear reactions occur and a variety of nuclear particles, gamma and x-ray radiation is emitted, specific for each element in the bombarded material. The problem of material (explosive, drugs, chemicals, etc.) identification can be reduced to the problem of measuring elemental concentrations. Neutron scanning technology offers capabilities far beyond those of conventional inspection systems. The unique automatic, material specific detection of terrorist threats can significantly increase the security at ports, border-crossing stations, airports, and even within the domestic transportation infrastructure of potential urban targets as well as

  17. Applications of nuclear techniques relevant for civil security

    Energy Technology Data Exchange (ETDEWEB)

    Valkovi, Vlado [Institute Ruder Boskovi, Zagreb (Croatia)

    2006-05-15

    The list of materials which are subject to inspection with the aim of reducing the acts of terrorism includes explosives, narcotics, chemical weapons, hazardous chemicals and radioactive materials. To this we should add also illicit trafficking with human beings. The risk of nuclear terrorism carried out by sub-national groups is considered not only in construction and/or use of nuclear device, but also in possible radioactive contamination of large urban areas. Modern personnel, parcel, vehicle and cargo inspection systems are non-invasive imaging techniques based on the use of nuclear analytical techniques. The inspection systems use penetrating radiations: hard x-rays (300 keV or more) or gamma-rays from radioactive sources ({sup 137}Cs and {sup 60}Co with energies from 600 to 1300 keV) that produce a high resolution radiograph of the load. Unfortunately, this information is 'non-specific' in that it gives no information on the nature of objects that do not match the travel documents and are not recognized by a visual analysis of the radiographic picture. Moreover, there are regions of the container where x and gamma-ray systems are 'blind' due to the high average atomic number of the objects irradiated that appear as black spots in the radiographic image. Contrary to that is the use of neutrons; as results of the bombardment, nuclear reactions occur and a variety of nuclear particles, gamma and x-ray radiation is emitted, specific for each element in the bombarded material. The problem of material (explosive, drugs, chemicals, etc.) identification can be reduced to the problem of measuring elemental concentrations. Neutron scanning technology offers capabilities far beyond those of conventional inspection systems. The unique automatic, material specific detection of terrorist threats can significantly increase the security at ports, border-crossing stations, airports, and even within the domestic transportation infrastructure of potential

  18. Evaluating Air Force Civil Engineer's Current Automated Information Systems

    National Research Council Canada - National Science Library

    Phillips, Edward

    2002-01-01

    ...) to the Automated Civil Engineer System (ACES). This research focused on users perceptions of both database and data importance to determine if significant differences existed between various user sub-groups...

  19. THE FACTOR OF ENERGY-INFORMATION SECURITY IN THE FRAMEWORK OF GLOBAL CIVILIZATION-RELATED CHANGES

    OpenAIRE

    Alexey Viktorovich SUHORUKHIH

    2015-01-01

    The paper examined the grounds having involved global social and cultural changes, and emphasized the precedence taken by an energy-information component to the geopolitical dynamics of the civilization continuum. The study emphasized the relevance of new facets in social and cultural insight urged to respond to challenges of direct mental hazards emerging over the world, and requirement of energy-information security the civilization has sought for, assumed to be the framework for considerin...

  20. Patterns of Force: System Strength, Terrorism and Civil War

    DEFF Research Database (Denmark)

    Freytag, Andreas; Meierrieks, Daniel; Münch, Angela

    2010-01-01

    We jointly analyze the genesis of terrorism and civil war, providing a simple conceptual framework to explain why violent opposition groups choose distinct forms of violence (i.e., terrorism and open rebellion). We argue that the distinct modes of violent opposition are chosen by opposition groups...... in response to the strengths and weaknesses of the system they challenge. An empirical test of this hypothesis for 104 countries for 1992 to 2004 indeed shows that the socio-economic strength of a system positively correlates with the likelihood of terrorism, but negatively with the incidence of civil war....... Institutional quality and political participation of opponents reduce the risk of civil war, but do not affect the likelihood of terrorism. We also show that system stability reduces the likelihood of all forms of violent opposition....

  1. How Can Air Force Civil Engineers Use Expert Systems?

    Science.gov (United States)

    1988-09-01

    Acknowledgements On this academic path called "thesis", many individuals have befriended me along the way. I would like to express my thanks to Maj James R...that provided their insight into civil engineering throughout the interviews: Col James G. Zody, Col Thomas E. Lollis, Col Joe L. Hicks, Col Nicholas A...training role" ( Basden , 1984: 63-64). Consultant. Using an expert system as a consultant, the non- specialist can obtain counsel, guidance, or information

  2. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  3. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  4. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  5. Summary of Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  6. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  7. Culture Wars: Air Force Culture and Civil-Military Relations

    Science.gov (United States)

    2013-08-01

    organizations such that new policies or foreign procedures can appear threatening. In their studies of bureaucracies and policy making, Mor- ton Halperin and...evict Iraqi forces from Kuwait.29 As historians Michael Gordon and Bernard Trainor observe, “The lineup ran counter to what most of the public would

  8. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi

  9. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  10. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  11. Pattern of skin diseases among civil population and armed forces personnel at Pune

    Directory of Open Access Journals (Sweden)

    Sayal S

    1997-01-01

    Full Text Available The pattern of skin disorders among 11393 civil and 8123 defence service personnel who attended out-patient department (OPD from January 1989 to December 1994 is presented. Infective dermatoses were more common in civil population (41.2% as compared to defence service personnel (36.3%. Fungal infection was common in both groups (15.1% and 17.2% whereas parasitic infestations and pyoderma were more common in civil population (12.8% and 6.1% as compared to service personnel (7.8% and 3.6%. Among non-infective dermatoses eczemas were more common in civil population (17.3% as compared to Armed Forces personnel (11.7%, whereas papulosquamous disorders, pigmentary disorders, acne and alopecia were more common in Armed Forces personnel (13.5%, 13.4% 8.7% and 6.2% as compared to civil population (10.8%, 10.1%, 6.4% and 4.1%. The incidence of other skin disorders did not differ much between the two groups.

  12. India's energy security: A sample of business, government, civil society, and university perspectives

    International Nuclear Information System (INIS)

    Bambawale, Malavika Jain; Sovacool, Benjamin K.

    2011-01-01

    This article explores the concept of energy security perceived and understood by a sample of government, business, civil society, and university stakeholders in India. Based on a literature review, the authors hypothesize what energy experts suggest energy security is for India. The article then tests these hypotheses through the use of a survey completed by 172 Indian respondents. The article begins by describing its methodology before summarizing the results of the literature review to distill seven working hypotheses related to energy security in India. These hypotheses relate to (1) security of energy supply, (2) equitable access to energy services, (3) research and development of new energy technologies, (4) energy efficiency and conservation, (5) self-sufficiency and trade in energy fuels, (6) nuclear power, and (7) the energy-water nexus. It then tests these hypotheses with our survey instrument before concluding with implications for energy policy in India and beyond. - Research highlights: → We measured the concept of energy security for India through a survey that tested the importance of 16 dimensions. → For our sample of respondents from India, as hypothesized, security of fossil fuel supply, R and D in new technologies, centralized energy systems, and the availability of clean water emerged as important dimensions. → Equitable access to energy and low energy intensity did not emerge as important dimensions of energy security for our sample even though we hypothesized them to be so.

  13. India's energy security: A sample of business, government, civil society, and university perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Bambawale, Malavika Jain, E-mail: sppmjb@nus.edu.s [Energy Governance Program, Centre on Asia and Globalisation, Lee Kuan Yew School of Public Policy, National University of Singapore, Oei Tiong Ham Building, 469C Bukit Timah Road, Singapore 259772 (Singapore); Sovacool, Benjamin K., E-mail: bsovacool@nus.edu.s [Energy Governance Program, Centre on Asia and Globalisation, Lee Kuan Yew School of Public Policy, National University of Singapore, Oei Tiong Ham Building, 469C Bukit Timah Road, Singapore 259772 (Singapore)

    2011-03-15

    This article explores the concept of energy security perceived and understood by a sample of government, business, civil society, and university stakeholders in India. Based on a literature review, the authors hypothesize what energy experts suggest energy security is for India. The article then tests these hypotheses through the use of a survey completed by 172 Indian respondents. The article begins by describing its methodology before summarizing the results of the literature review to distill seven working hypotheses related to energy security in India. These hypotheses relate to (1) security of energy supply, (2) equitable access to energy services, (3) research and development of new energy technologies, (4) energy efficiency and conservation, (5) self-sufficiency and trade in energy fuels, (6) nuclear power, and (7) the energy-water nexus. It then tests these hypotheses with our survey instrument before concluding with implications for energy policy in India and beyond. - Research highlights: {yields} We measured the concept of energy security for India through a survey that tested the importance of 16 dimensions. {yields} For our sample of respondents from India, as hypothesized, security of fossil fuel supply, R and D in new technologies, centralized energy systems, and the availability of clean water emerged as important dimensions. {yields} Equitable access to energy and low energy intensity did not emerge as important dimensions of energy security for our sample even though we hypothesized them to be so.

  14. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    2015-09-01

    equipment, and habitat destruction from general construction (DoE, “ Wind Turbine Interactions with Birds , Bats, and Their Habitats,” pgs 2-4). Another...utility-resource-efficiency>, accessed 16 December 2014. Department of Energy, Wind Turbine Interactions with Birds , Bats, and Their Habitats... Wind power is a mature technology, with wind turbines first being used for electricity in the late 19th century. The Air Force operates two wind

  15. Weapons of Mass Destruction and Domestic Force Protection: Basic Response Capability for Military, Police & Security Forces

    National Research Council Canada - National Science Library

    Manto, Samuel

    1999-01-01

    ... actions to improve preparedness. This paper examines what a minimum basic response capability for all military, police and security forces should be to ensure at least some chance for their own survival and possible early warning...

  16. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  17. Global Food Security Governance: Civil Society Engagement in the Reformed Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.

    2015-01-01

    In 2007/8 world food prices spiked and global economic crisis set in, leaving hundreds of millions of people unable to access adequate food. The international reaction was swift. In a bid for leadership, the 123 member countries of the United Nations’ Committee on World Food Security (CFS) adopted a

  18. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-08

    ..., ethnic, or religious profiling related to the Department's activities. The system will also track and... agency for labor and employment relations; to an agency, organization, or individual when there could... civil rights and civil liberties, or to allege racial, ethnic, or religious profiling by DHS, its...

  19. Methodology of the Auditing Measures to Civil Airport Security and Protection

    Directory of Open Access Journals (Sweden)

    Ján Kolesár

    2016-10-01

    Full Text Available Airports similarly to other companies are certified in compliance with the International Standardization Organization (ISO standards of products and services (series of ISO 9000 Standards regarding quality management, to coordinate the technical side of standardizatioon and normalization at an international scale. In order for the airports to meet the norms and the certification requirements as by the ISO they are liable to undergo strict audits of quality, as a rule, conducted by an independent auditing organization. Focus of the audits is primarily on airport operation economics and security. The article is an analysis into the methodology of the airport security audit processes and activities. Within the framework of planning, the sequence of steps is described in line with the principles and procedures of the Security Management System (SMS and starndards established by the International Standardization Organization (ISO. The methodology of conducting airport security audit is developed in compliance with the national programme and international legislation standards (Annex 17 applicable to protection of civil aviation against acts of unlawful interference.

  20. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  1. [Perceived risks and victimization of military and civil police in the public (in)security domain].

    Science.gov (United States)

    Minayo, Maria Cecília de Souza; Souza, Edinilsa Ramos de; Constantino, Patrícia

    2007-11-01

    This study was based on a larger survey on the socioeconomic, quality-of-life, occupational, and health characteristics of military and civil police in the State of Rio de Janeiro, Brazil. The study triangulated quantitative methods (an anonymous questionnaire in a random sample of clusters involving 46 police units and 2,678 police force members) and qualitative ones (18 focus groups with 143 police force members, 24 individual semi-structured interviews, and field observations). The article specifically approaches the issues of victimization and perceived risks among on-duty and off-duty police. Data were processed and analyzed according to risk-related variables. We performed a content analysis, comparing strata within and between police forces, according to thematic lines. This empirical approach is supported by secondary data analyses. According to our analysis, the police are the greatest victims in the performance of their duties, especially military police and those from both forces involved in direct law enforcement activities. Different variables are associated with risk in the two forces, with an emphasis on work conditions and especially involvement in other activities during their official off-duty time.

  2. Fickle Allies: Regular and Irregular Confederate Forces in Missouri during the American Civil War

    Science.gov (United States)

    2014-05-22

    238-239, 242. 58Kel N. Pickens, “The Battle of Wilson’s Creek, Missouri, August 10, 1861,” in Civil War Battles in the West, ed. LeRoy H. Fischer ...force with nearby Confederate Army Brigadier General William Hardee and MSG Brigadier General M. Jeff . Thompson, and open a new front to ultimately...West, ed. LeRoy H. Fischer (Manhattan, KS: Sunflower University Press, 1981), 40. 101Shea, War in the West, 18-19, 26, 34-35. 30

  3. NEW MISSIONS AND SCENARIOS FOR ARMED FORCES AND ITS IMPLICATIONS IN CIVIL – MILITARY RELATIONS

    Directory of Open Access Journals (Sweden)

    JOSÉ MIGUEL PIUZZI CABRERA

    2017-09-01

    The author analyses the changes that had occurred in missions and contexts where the armed forces are being employed, and from that, addresses the demands this new situation imposes to the civilian and military leaders; at the same time addresses the need to move forward in the design of relations and work procedures formulas, more explicit and institutionalized that may contribute to facilitate a better interaction able to add value to the decision – making process, in a coherent framework within the civil – military relations principles.

  4. Modeling a Civil Event Case Study for Consequence Management Using the IMPRINT Forces Module

    Science.gov (United States)

    Gacy, Marc; Gosakan, Mala; Eckdahl, Angela; Miller, Jeffrey R.

    2012-01-01

    A critical challenge in the Consequence Management (CM) domain is the appropriate allocation of necessary and skilled military and civilian personnel and materiel resources in unexpected emergencies. To aid this process we used the Forces module in the Improved Performance Research Integration Tool (IMPRINT). This module enables analysts to enter personnel and equipment capabilities, prioritized schedules and numbers available, along with unexpected emergency requirements in order to assess force response requirements. Using a suspected terrorist threat on a college campus, we developed a test case model which exercised the capabilities of the module, including the scope and scale of operations. The model incorporates data from multiple sources, including daily schedules and frequency of events such as fire calls. Our preliminary results indicate that the model can predict potential decreases in civilian emergency response coverage due to an involved unplanned incident requiring significant portions of police, fire and civil responses teams.

  5. Public and Private Institutions: Educating Civil Society about European Security Concerns

    Directory of Open Access Journals (Sweden)

    Rafael Bardají

    1997-12-01

    Full Text Available As an specialist in strategic studies and political adviser, the author developes three basic ideas in his speech: 1 the objective necessity of strategic thinking to increase defense awareness, with the goal of ameliorating the relations between civil society and the Armed Forces, and to create a strategic culture to help to make more permeable the Administration decision-making process; 2 public and private institutions have to understand each other, despite the fact that tradition and time pressures do negatively weigh on Administration decision-making; 3 both parts –Administration and specialists in security– have to make the effort of becoming more flexible, on the one hand, and more capable of producing relevant studies in political terms, on the other.

  6. Contractual Penalty and the Right to Payment for Delays Caused by Force Majeure in Czech Civil Law under the New Civil Code

    OpenAIRE

    Janku Martin

    2015-01-01

    In the context of the conclusion of contracts between entrepreneurs under the Czech Civil Code, it is a relatively common arrangement that the parties disclaim any and all liability for damage arising from non-compliance with contractual obligations, if they can prove that this failure was due to an obstacle independent of their will. This circumstance excluding liability for the damage is called force majeure by the theory. In many countries this circumstance is ruled upon directly by the le...

  7. Contractual Penalty and the Right to Payment for Delays Caused by Force Majeure in Czech Civil Law under the New Civil Code

    Directory of Open Access Journals (Sweden)

    Janku Martin

    2015-12-01

    Full Text Available In the context of the conclusion of contracts between entrepreneurs under the Czech Civil Code, it is a relatively common arrangement that the parties disclaim any and all liability for damage arising from non-compliance with contractual obligations, if they can prove that this failure was due to an obstacle independent of their will. This circumstance excluding liability for the damage is called force majeure by the theory. In many countries this circumstance is ruled upon directly by the legislation (höhere Gewalt, vis major. The Czech regulations represented by the new Civil Code of 2012 (CivC, however, contains only a framework provision that mentions discharging reasons. The paper deals with the – rather disputable – issue that the force majeure does not affect the obligation to pay a contractual penalty under the new rules of the CivC. It should be therefore reflected in the arrangements for contractual penalties inter partes. To this effect the paper analyses the concepts of contractual penalties and force majeure in civil law legislation. Afterwards it compares their mutual relationship and impact on the obligations of the Contracting Parties. Finally, it draws recommendations for practice from the perspective of the contracting process.

  8. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  9. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  10. Unleashed Potential: The Potential of Civil Military Support Elements in Theater Security Cooperation

    Science.gov (United States)

    2012-05-16

    MEC Ministerio de Educacion y Cultura (Minister of Education and Culture) METT-TC Mission, Enemy, Time, Troops Available, & Civil Considerations...interests. Moreover, the QDR calls for an expansion of civil affairs capacity especially in the face of Counterinsurgency and Counterterrorism operations...07, Department of Defense Joint Publication 3-57, and annual US Special Operations Command (USSOCOM) Posture Statements ( especially 2008) before

  11. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  12. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  13. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  14. Joint force protection advanced security system (JFPASS) "the future of force protection: integrate and automate"

    Science.gov (United States)

    Lama, Carlos E.; Fagan, Joe E.

    2009-09-01

    The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.

  15. DEPARTMENT OF ENERGY: Views on Proposed Civil Penalties, Security Oversight, and External Safety Regulation Legislation

    National Research Council Canada - National Science Library

    Jones, Gary

    2000-01-01

    .... 3383 would amend the Atomic Energy Act by eliminating the exemption that currently allows certain nonprofit contractors to avoid paying civil penalties if they violate DOE's nuclear safety rules...

  16. Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation

    Directory of Open Access Journals (Sweden)

    Prezelj Iztok

    2015-12-01

    Full Text Available Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation (case of introducing body scanners. The paper’s results show that the concept of human security usefully integrates the care for human rights and security of individuals. The debate on the potential introduction of body scanners on the European airports was actually a debate on the ways of providing individual human security on the airports with simultaneous concern for other human rights. The output of this debate was a compromise: body scanners can be used at the discretion of individual airports and member states, but are not an obligatory measure on all European airports.

  17. Draft Federal Act of the Russian Federation 'The Civil Liability for Nuclear Damage and its Financial Security'

    International Nuclear Information System (INIS)

    Lebedeva, Yulia

    2014-01-01

    The use of nuclear power by states in the modern world requires supplements to international law through the development of national legislation on civil liability for nuclear damage and compensation. The situation in the Russian Federation is no exception. Russian law on civil liability for nuclear damage has not fully evolved, and currently, there is no specific law covering liability for nuclear damage, nor is there a law regarding the financial and insurance mechanisms for compensation. Instead, the current laws establish a state system of benefits and compensation for damage to health and property of citizens. Since 1996, Russia has been actively working to develop a draft federal act to cover liability for nuclear damage. A bill was first introduced in the State Duma of the Federal Assembly of the Russian Federation on 16 July 1996, and was originally called 'The Compensation for Nuclear Damage and Nuclear Insurance'. In 1997, the official representative of the Government of the Russian Federation, Head of Russian Federal Inspectorate for Nuclear and Radiation Safety, Yuri Vishnevsky, was appointed to present this bill for discussion in the chambers of the Federal Assembly of the Russian Federation. In September 1998, the State Duma rejected the draft federal act and instead adopted in the first reading a different draft federal act: No. 96700118-2, 'The Civil Liability for Nuclear Damage and its Financial Security' ('the bill'). In this case, the State Duma Committee on Ecology was charged with incorporating the incoming amendments into a final bill and submitting it to the State Duma for a second reading. In 2005, Russia ratified the Vienna Convention on Civil Liability for Nuclear Damage. This ratification required significant amendments to 'The Civil Liability for Nuclear Damage and its Financial Security' bill. But, even though the Russian Federation had not yet ratified the Vienna Convention, the drafters were still careful to take into account the

  18. Finding of No Significant Impact (FONSI) for Construction of a Base Civil Engineer Complex at Travis Air Force Base, California

    Science.gov (United States)

    2002-01-26

    2 Ellis Drive Dix o n A v e Rags dale Stree t Bioremedial Site Base Civil Engineering ComplexEnvironmental AssessmentTravis Air Force Base...CNPS List 1B species. This species is an annual herb in the sunflower tribe (Heliantheae) of the sunflower family (Asteraceae). Individual plants...range from approximately 10 to 40 centimeters (cm) tall. Being in the sunflower family (Asteraceae), the characteristic yellow flower of this plant

  19. The Law of Force or The Force of Law: Does Following The Rule of Law Assist Security Forces in Defeating an Armed Insurgency?

    Science.gov (United States)

    2012-06-08

    and Policy in International Relations (Spring): 40-79 Arendt , Hannah . 1963. On revolution. New York: Viking Cohen, Eliot A., John Horvath, and...conditions, where the armed forces can be trusted to obey the civil authorities” ( Arendt 1965, 40). This is especially the case in countries where

  20. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  1. Developing Civil-Military Competencies Among Senior National Security Practitioners in Democratizing Latin America

    Science.gov (United States)

    2008-01-01

    President Raul Alfonsin did not retaliate against the military. Nor did President Carlos Menem in the 1990s. There was no question in either of these...1 Herbert C. Huser, Argentine Civil-Military Relations: From Alfonsin to Menem (Washington, DC: National Defense University Press, 2002

  2. Conceptual Dimension of Problems of Joint Activity of the State and Civil Society Institutes on Ensuring National Security of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Gulyaikhin Vyacheslav N.

    2016-09-01

    Full Text Available In the article the main methodological approaches to the problem of interaction of institutes of the state and civil society in the context of ensuring national security of Russia are analyzed. Two main alternative concepts (liberal and etatist to which the Russian researchers adhere are allocated. Supporters of liberal approach suppose that domination of the interests of civil society and ensuring equal cooperation with government institutions at the solution of problems of ensuring national security is necessary. Adherents of the etatist concept defend an unconditional priority of government bodies in this sphere. The authors provide the conceptual analysis of estimates by domestic researchers of the main activities of associations of the citizens connected with the counteraction to threats of national security. In the article positive impact of institutes of civil society on political and social and economic processes in Russia is noted, their assistance in development of the state institutes of the state and the potential of constructive interaction with federal and regional authorities on ensuring national security is estimated. The detailed analysis of the politological concept according to which more active participation of public organizations and socially responsible citizens in ensuring national security is necessary, is carried out. Their influence on development of a security system has to become more and more considerable because of social and economic problems which are objectively demanding participation of civil society in their decision-making. It is connected also with the need of modernization breakthrough, not possible without civil initiatives. In the article the conclusion that the Russian researchers attach great value to interaction of institutes of the state and civil society in ensuring national security of the Russian Federation is drawn, conceptually proving the need of their joint activity for this direction, and

  3. Securing Document Warehouses against Brute Force Query Attacks

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2017-04-01

    Full Text Available The paper presents the scheme of data management and protocols for securing document collection against adversary users who try to abuse their access rights to find out the full content of confidential documents. The configuration of secure document retrieval system is described and a suite of protocols among the clients, warehouse server, audit server and database management server is specified. The scheme makes it infeasible for clients to establish correspondence between the documents relevant to different search queries until a moderator won’t give access to these documents. The proposed solution allows ensuring higher security level for document warehouses.

  4. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  5. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part

  6. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  7. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    National Research Council Canada - National Science Library

    Atha, Roberto J

    2008-01-01

    .... It reveals how the influence of the military affected the implementation of internal security reforms, influencing the professionalism and effectiveness of police forces in the fight against violence and gangs today...

  8. DEPARTMENT OF ENERGY: Views on Proposed Civil Penalties, Security Oversight, and External Safety Regulation Legislation

    National Research Council Canada - National Science Library

    Jones, Gary

    2000-01-01

    This report provides the General Accounting Office's views on three bills designed to improve worker and nuclear facility safety and health as well as to enhance security for the Department of Energy (DOE...

  9. Taming the wounded lion: Transforming security forces in West Africa

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-01

    Feb 1, 2011 ... Solidarity networks of language and culture link ethnic groups ... policymaking process, financial management issues, defence forces, ... Related articles ... of the developing world's brightest scientists find new ways to improve ...

  10. The Australian Defence Force: Broadened Concepts of Security Operations

    National Research Council Canada - National Science Library

    Wing, Ian

    1998-01-01

    ...-fighting role and could result in fundamental force structure and resource changes. More Australian Government policy changes are possible, and increased participation in counter-drug operations has been foreshadowed...

  11. United States Air Force Civil Engineering Additive Manufacturing Applications: Tools and Jigs

    Science.gov (United States)

    2016-03-24

    Its Potential Impact on Biotechnology and the Chemical Sciences. Analytical Chemistry, Vol. 86, 3240-3253. Halterman, T. (2014, August 28). 3D...2015). 3D Printing Makes Explosive Headway at AFIT. Civil Engineer Magazine , 23(1), 34-35. Smiths Detection. (2015). LCD 3.2E Handheld CWA & TIC...the Fleet’ Program. National Defense Magazine . Tan, A. (2014, Summer). Advanced Ordnance Teaching Materials. The Journal of ERW and Mine Action, 39

  12. Civil society must get up to speed on cyber security, watchdog warns ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-06

    Oct 6, 2010 ... As states encroach on Internet governance around the world, IDRC is ... if they fail to get up to speed on information security in the digital era, he says. ... an IDRC -funded project that is helping to build a regional network of ...

  13. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    Science.gov (United States)

    2016-02-01

    overhead transmission and distribution conductors are exposed. Microgrids offer a control method for utility systems that allow operators to control ... microgrids offer an additional level of control that installations would not otherwise have. For instance, an incident affecting one part of the grid...could cause undue strain on another part that is experiencing a higher power demand. With secure microgrid controls , technicians have the ability to de

  14. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  15. Negotiable Collateral Damage: Civil Liberties Versus National Security in Times of Threat

    Science.gov (United States)

    2011-06-01

    concept of defense. In his influential work, ―A Theory of Human Motivation,‖ published in 1943, Maslow theorized five hierarchical types of needs...rarely changes due to threats to national security; thus, this study does not reference this issue. 7 A. H. Maslow , "A Theory of Human Motivation...Americans living in the Pacific region of the United States. 52 Abraham Lincoln and Thomas Harry

  16. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  17. Air Force IT System Security Compliance with Law and Policy

    Science.gov (United States)

    2016-04-01

    monetary burden on 3 system owners as there is “…a significant cost benefit to building in IA during the development phase” 4 of a system. Current...16 Option 4 : Cloud Computing to Eliminate Policy and Methodology Requirements ....17 Option 4 : Application...Assurance ( IA ) (data integrity) to support mission assurance. To ensure IA and to support the mission, changes need to be made to Air Force IT

  18. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  19. Enviromental Assessment: Security Forces Regional Training Center at Little Rock Air Force Base Arkansas

    Science.gov (United States)

    2004-07-14

    OMB control number. 1. REPORT DATE 14 JUL 2004 2. REPORT TYPE 3. DATES COVERED 00-00-2004 to 00-00-2004 4. TITLE AND SUBTITLE Enviromental ...civil engineers , services, fliers, maintenance, etc.). The numbers of personnel and types of associated equipment vary based on the functional group...streams or wetlands. Section 404 regulates development in streams and wetlands and requires a permit from the United States Army Corps of Engineers

  20. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    .... During a crisis, the President and Secretary of Defense could authorize use of Title 10 forces. However, this "just in time" approach does not allow for the units assigned the opportunity to be fully trained to respond...

  1. Inhibiting and driving forces for the digitalization of security systems: security officers’ view on the issue

    OpenAIRE

    Lahtinen, Markus

    2007-01-01

    This memo reports on factors that drive and inhibit the digitalization of security systems. The reported factors are as follows: Technology-push factors • Need to lower costs on the end-user side, i.e. replacing labour with technology • Perceived convenience and ease-of-use of digital systems • Digital products can be connected to the current enterprise network; enabling an expanding set of security features • Firms holding the IP-capability (IP=Internet Protocol) and not h...

  2. Civil nuclear power as an energy security instrument in the 21. century

    International Nuclear Information System (INIS)

    Bigot, Bernard

    2011-01-01

    More than ever, the public opinions wonder about the means to secure a relative of energy supply. The last geopolitical events in the Arab countries, the Fukushima nuclear accident, the black tide in Mexico Bay, the meteorological and climate perturbations, probably linked to massive greenhouse gas emissions, are many reasons to be uneasy face to an increasing energy demand whatever the efforts for energy savings we will do. It is proposed to consider a policy combining nuclear and renewable energies to produce electricity. Successive generation of nuclear technologies, fission fusion, fruits of a continuous effort of R and D, are possible, provide the safety has the highest priority. The resources in nuclear fuels are sufficient for a sustainable use as they are for renewable energies. Are we ready to follow this strategy?

  3. Force Majeure in Islamic Law of Transaction: A Comparative Study of the Civil Codes of Islamic Countries

    Directory of Open Access Journals (Sweden)

    Mhd. Syahnan

    2013-05-01

    Full Text Available This paper attempts to shed lights on the performance of  the obligations to a valid contract that can be frustrated by events beyond human control. Such events may have considerable impact on various designated legal principles and rules which is widely known as force majeure. The doctrine of unforeseen circumstances in contemporary legislation, on the main, is expressed in the same term which understandably as result of  the origin derivation of  the French law le theorie de l’imprévision. Although it is true that there is no such general principle of  force majeure in classical Islamic law, the author argues that significant efforts have been made in synthesizing both the Islamic and Western law concepts. Accordingly, despite the fact that the traditional Islamic legal system has its own mechanism to deal with such events at the time of contract, to a certain extent, it has influenced its contemporary form of  the concept of  intervening conti- ngencies (nazariyyat al-jawa’ih as reflected in the Civil Codes of  the Arab states. In addition, in response to the exigencies of the ever-increasing problems of modern life which brings with it alien concept, force majeure does not contradict with the provisions of the Shari‘ah since the views of Islamic jurisprudents (fuqahâ can justifiably be referred to.

  4. Two 'hot buttons' in gas contracting: security performance and force majeure

    International Nuclear Information System (INIS)

    Park, J.J.

    1996-01-01

    Two important developments in gas contracting issues are the 'force majeure' provisions and security for performance clauses. 'Force majeure' was defined as any acts of God or any acts of omission by a transporter of gas, which is excused by any event not within the control of the party claiming suspension. 'Force majeure' provisions need to be specifically negotiated in every case. These issues often arise in gas contracting situations, but the nature of Canada's non-litigious oil and gas industry is such that we have had little or no Canadian case law to assist in interpreting what these clauses mean. The 'force majeure' clause is basically meant to protect the parties from events outside normal business risk. The security of performance issue arises when the obligation of a supplier of gas to perform, and the obligation of a buyer of gas to pay, is unsecured, as would be the case for example, if one of the parties becomes bankrupt

  5. Analysis of the Perceived Adequacy of Air Force Civil Engineering Prime Beef Training

    Science.gov (United States)

    1985-09-01

    hands-on portion is sufficient. The apparent positive effect of the classroom training is encouraging to note for educators, but must be balanced with...Gains Through Worklife Improvements. New York: Harcourt Brace Jovanovich, 1976. 19. Hains III, Major Paul W. "IMAGE," Air Force Engineering and Services

  6. Turnover Intentions: A Qualitative Analysis of Comments from Air Force Civil Engineering Company Grade Officers

    Science.gov (United States)

    2012-03-22

    scheme. It seems as though they are simply being paid extra for being the " sexy " part of the Air Force, not for doing something additional or more...dudes getting passed over for Major because they didn’t get sexy OPRs or a strat because they were deployed for 6+ months of the rating period with

  7. An Analysis of Factors that Influence Air Force Civil Engineer Company Grade Officer Turnover Intentions

    Science.gov (United States)

    2010-03-01

    has changed my perception of my own pay scheme. It seems as though they are simply being paid extra for being the " sexy " part of the Air Force, not...dudes getting passed over for Major because they didn’t get sexy OPRs or a strat because they were deployed for 6+ months of the rating period with

  8. Environmental Assessment for Proposed Security Forces Operations Facility, Buckley Air Force Base, Colorado

    National Research Council Canada - National Science Library

    Meyer, Elizabeth; Myklebust, Jessica; Denier, James; Christner, Jennifer; Fontaine, Kathyrn

    2006-01-01

    The United States Air Force (USAF) has prepared this EA in accordance with the National Environmental Policy Act to evaluate the potential environmental and social impacts from the construction and operation of the proposed SFOF...

  9. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  10. THE APPLICATION PROCESS OF HAMBURG RULES, GIVEN THE CONTEXT OF THE EMERGENCE AND ENTRY INTO FORCE OF THE NEW ROMANIAN CIVIL CODE

    Directory of Open Access Journals (Sweden)

    Adriana Elena Belu

    2013-11-01

    Full Text Available The paper aims to conduct a comparative analysis and tries to offer an objective point of view regarding a number of questions arisen in practice, related to the applicability of the 1978 Hamburg Rules and keeping public order of Romanian private international law, such as those that aim at: agreeing upon the applicability of the foreign law by the Romanian parties; applicability of the Hamburg Rules; public nuisance of the Romanian private international law; character of public policy rule of the Hamburg Rules. In the application process of the Hamburg Rules, given the context of the emergence and entry into force of the New Civil Code, obviously, the provisions of the Romanian Civil Code shall apply in addition, where the international convention lacks. Therefore, in order to apply the logic of the provisions of the Civil Code in full compliance with the international standards, though giving priority to the latter rules, a rigorous analysis is required, analysis which becomes more complex given the fact that, in accordance with Art. 230 of Law no. 71/2011 to implement Law no. 287/2009 on the Civil Code, Book II "About Maritime Trade and Sailing" of the Commercial Code, will be abolished upon the entry into force of the Maritime Code, as those provisions remain in force, being applied with priority to the rules of the Civil Code.

  11. The Mandatory Force of the Contract in Relation with the Thirds. Positive Consecration in Comparative Law and in the New Romanian Civil Code

    Directory of Open Access Journals (Sweden)

    Nora Andreea Daghie

    2011-05-01

    Full Text Available The drafters of the Romanian Civil Code at 1864 supressed the last part of the correspondingarticle of French Civil Code (art. 1165 so that the appearance was created of a rigid principle that did notallow for exceptions. The relativity of contractual bond provided under art. 973 Civ. c. shall however createboth integrating mechanisms and contain mitigations of the principle by virtue of principles of commutativejustice and juridical security. In the quasi-majority of legislations there are a series of situations when acontract may produce effects versus thirds, for an example the stipulation for another in the French civilCode, Civil Code of Quebec Province and Civil Code of Louisiana State. The new Romanian Civil Codereformulates the principles into affirmative draft in art. 1.280 that only maintains limitation of mandatoryeffects versus parties and even if no reference is explicitly made to thirds the collocation „unless otherwiseprovided by law” may however result by deduction in that a contract may under certain circumstancesproduce effects versus thirds too.

  12. Proposing C4ISR Architecture Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Farah-Stapleton, Monica F; Dimarogonas, James; Eaton, Rodney; Deason, Paul J

    2004-01-01

    This presentation presents how a network architecture methodology developed for the Army's Future Force could be applied to the requirements of Civil Support, Homeland Security/Homeland Defense (CS HLS/HLD...

  13. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  14. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  15. Role of U.S. Security Assistance in Modernizing the Portuguese Armed Forces: A Historical Analysis.

    Science.gov (United States)

    1986-09-01

    Portuguese Air Force Fiscal Year 1986 IMET/FMS Training Program Security Assistance Management Manual * "Portuguese Navy: A Naval Fleet that is...of the techniques of fiscal management and, within the limits that he had set for the regime, his program of economic recovery succeeded .... What...1984). Currency: Escudo * Agriculture: generally developed; 8.8,% of GDP; main crops - grains, potatoes, olives, grapes (wine); deficit foods - sugar

  16. The Report of the Independent Commission on the Security Forces of Iraq

    Science.gov (United States)

    2007-09-06

    Point of Entry Border Station 7. Taji Camp Taji Counterinsurgency Center for Excelence Iraqi Counterinsurgency Academy Iraqi Military Inteligence ...he serves on the North Carolina Military Foundation and as a director with several private and public businesses . General Charles G. Boyd, USAF...Ret.) General Charles G. Boyd, U.S. Air Force (Ret.), became president and CEO of Business Executives for National Security (BENS) in May of 2002

  17. From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education

    Science.gov (United States)

    2017-06-09

    support procedures and decision - making processes. Creating awareness that limitations are present creates a natural motivation to want to reduce...law enforcement decision - making ? What cultural norms within Security Forces should be challenged to improve responses of young adults faced with...enforcement and combat decision - making processes is available. However, it is not uncommon for laboratory discoveries to enter clinical practice, not to

  18. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  19. From El Billar to Operations Fenix and Jaque: The Colombian Security Force Experience, 1998-2008

    Science.gov (United States)

    2009-12-01

    577–601. ———. Sostenibilidad De La Seguridad Democratica. Bogotá: Fundadcion Seguridad & Democracia, 23 February 2005. Rempe, Dennis M...Security Force Experience, 1998–2008 Robert D. Ramsey III Occasional Paper 34 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be

  20. Iseseisvusdeklaratsioonid 1776–1918. The Estonian Declaration of Sovereignty: An Example of the Civilizing Force of Hypocrisy

    Directory of Open Access Journals (Sweden)

    Hent Kalmo

    2012-06-01

    Full Text Available Sovereignty has been characterised as a form of “organized hypocrisy”, a system governed by a set of rules that are generally recognised as binding and yet are continually infringed upon by the most powerful actors. This idea can be extended to analyse the role of sovereignty within the Soviet Union. The Soviet Union was nominally governed by a Constitution which endowed the Union Republics with the right of secession, but there was no realistic possibility of exercising this right. One should not rush to conclude, however, that the actual wording of the Soviet Constitution of 1977 was entirely without relevance. As Jon Elster has argued, hypocrisy can have a “civilizing force” when the need to appear impartial and to retain public credibility forces actors to choose a strategy they would not choose otherwise. A good example of this kind of argumentative constraint is offered by the dilemma faced by the Soviet leadership after the mid-1980s, as it became reluctant to use military force to suppress independence movements within the Baltic States while, at the same time, promising to give more weight to the Soviet Constitution and respect the “sovereignty” of the Union Republics. In this setting, the ambiguity of the word “sovereignty” could be played upon by a whole gamut of political movements in order to further their agenda, from local communists eager to expand their autonomy within the Soviet system to those making an explicit bid for the restoration of independence. Significant legal and political changes could be justified as mere conclusions from the constitutionally recognised status of the Union Republics – a strategy which was all the more effective as Moscow struggled to formulate an alternative line of constitutional interpretation that could be used to counter the Baltic claims. This exchange of opinions escalated into a constitutional conflict in November 1988, when the Estonian Supreme Soviet responded to

  1. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  2. Legitimacy and Force in International Security : A Regionalist Approach on Multilateralism and the Role of Legitimacy in the Modern World

    OpenAIRE

    Arnesen, Ketil Vike

    2008-01-01

    This thesis will address the issue of legitimacy within international security, with a focus on the use of force by states. Using military force against other actors in the international system will initiate a debate on its perceived legitimacy by several different audiences. This investigation uses the Regional Security Complex Theory of Buzan and Wæver and the assumptions of Idealism to instigate the analytical framework on legitimacy. This thesis will analyse the role and importance of le...

  3. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  4. Medicare and Social Security: fraud and abuse; civil money penalties for misuse of certain terms, symbols and emblems--HHS. Final rule.

    Science.gov (United States)

    1991-08-28

    This final rule implements section 428(a) of Public Law 100-360 which authorizes the imposition of civil money penalties for the use--in advertising, solicitations or other communications--of certain words, letters, symbols or emblems associated with the Department of Health and Human Services' Social Security and Medicare programs in a manner that the user knows, or should know, would convey a false impression that (1) the communicated item was approved, endorsed or authorized by the Department or its programs, or (2) the responsible person or organization has some connection with, or authorization from, the Department or these programs. This rulemaking is designed to assist in protecting citizens from misrepresentations concerning the services offered and programs administered by the Social Security Administration and the Health Care Financing Administration.

  5. Civil Surgeon Info

    Data.gov (United States)

    Department of Homeland Security — USCIS designates certain doctors (also known as civil surgeons) to perform the medical exam required for most Green Card applicants. This data set represents the...

  6. Enhancing the Security Cooperation Marine Air Ground Task Force to Satisfy the Needs of the Uncertain Global Security Environment

    Science.gov (United States)

    2009-06-12

    and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for

  7. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  8. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  9. Partners of Choice and Necessity: Special Operations Forces and the National Security Imperatives of Building Partner Capacity

    Science.gov (United States)

    2015-05-21

    intersection of complexity, social interaction, political violence, and military force. Lastly, I owe a tremendous debt to my wife and family for giving me the...space to pursue these intellectual endeavors while “taking a break” from deployment. In partial payment of that debt , I promise not to mention any...Going Big by Getting Small (Denver, CO: Outskirts Press), 162-163. 12 liberalism.19 From the Greek civil war of the late 1940s to the modern

  10. The Contribution of the Spanish Guardia Civil to the Peace and Stability Operations Within the Human Security Framework

    Science.gov (United States)

    2010-03-08

    1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new

  11. Demonstration of Security Benefits of Renewable Generation at FE Warren Air Force Base

    International Nuclear Information System (INIS)

    Warwick, William M.; Myers, Kurt; Seifert, Gary

    2010-01-01

    Report detailing field demonstration of security benefits of renewable generation at FE Warren Air Force Base. The 2006 National Defense Appropriations Act directed the Department of Defense (DOD) to coordinate the testing of a wind turbine (new to the U.S. market) at an Air Force installation as a follow on to analyses conducted by the Pacific Northwest National Laborabory (PNNL) as part of the 2005 DOD Renewable Assessment. The earlier study simulated the performance of renewable power produced from wind turbines, solar photovoltaics and geothermal energy as part of a Base-wide energy security solution. The simulation concluded that integration of renewable generating resources with emergency generators, typically diesel-fired, could significantly enhance energy security and extend power supplies during prolonged commercial grid power outages. A simulation is insufficient to convince skeptics of the reliability of renewable resources, especially those that produce power only intermittently, like wind and solar. Therefore, Congress requested a field demonstration be performed using a wind turbine because wind power is the most erratic of all renewable resources. Following this direction, the Air Force identified a site for the wind turbine demonstration and contracted with the Idaho National Laboratory (INL) and PNNL to conduct the demonstration and implement other provisions in the appropriation bill. INL identified a wind turbine that met the legislative requirements (the Gamesa G-80), and with the support of PNNL and the Air Force, selected FE Warren Air Force Base for the demonstration. FE Warren has an excellent wind resource and was already a host to two wind turbines and could accommodate a third. The G-80 is rated at 2 MWs versus the two existing 660 kW turbines, consequently wind production would more than double. Procurement, siting, and acceptance testing of the new turbine was completed in early 2010. The field test was conducted in late April 2010

  12. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  13. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  14. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  15. Harmonization of domestic legislation in the field of civil law with the European Union law: Securing of claims by means of fiduciary agreements

    Directory of Open Access Journals (Sweden)

    Pajtić Bojan

    2012-01-01

    Full Text Available This paper analyses fiduciary agreements, which, as a form of contract, that is the means of securing obligation and legal claims, are regulated by provisions of specific laws and codifications in some of the European Union countries. Even the Montenegrin legislator enacted a special law governing these legal matters, however in the Serbian law fiduciary agreements fall into the category of innominate contracts. Fiducia originates in the Roman Law and constitutes the first common form of the pledge law. The Latin term fiducia means 'trust', since these legal matters were, first of all, based on the trust between contractual parties. This paper addresses the institution of 'trust' as it is the Anglo-Saxon counterpart of the fiduciary agreement. Etymologically, 'trust' has the same meaning as the term fiducia - trust. Due to their advantages, fiduciary agreements are not even uncommon in the domestic legal practice, while there are certain, as we have already announced, theoretical, but also practical concerns arguing admissibility of this legal matter. These arguments mainly come down to the thesis (mentioned above that entering into the fiduciary agreement results in violation of the ban on performance of contract lex commissoria in the pledge law. Nevertheless, I provided explanation that differences between contracts of pledge and fiduciary agreements clearly point to the conclusion that fiduciary agreements may not be treated as a pledge, hence they are admissible, that is, they are concluded on the principle of contractual freedom as an imperative norm of the Law on Obligations. Fiduciary agreements (in relation to the realistic means of security offer to the creditor a higher level of security, reduce the period of payment of his claims, also providing practical benefits for the debtor himself. The paper presents the reasons supporting the view that it would be advantageous for the Serbian legislator, in the process of harmonization of the

  16. Response to nuclear and radiological terrorism - the viewpoint from the security forces

    International Nuclear Information System (INIS)

    Baciu, A.

    2005-01-01

    Full text: A threat of a malevolent act may be deemed to exist when information has been received that terrorists, criminals or other persons intend to: manufacture, use, transport, dispose radioactive materials in order to hide the nature of material; perpetrate a deliberate act to irradiate a person or persons; perpetrate a deliberate act to contaminate food or water supplies with radioactive materials; create and deploy a radiation dispersal device; perpetrate a deliberate act to contaminate a site or the environment with radioactive materials; or mount a sabotage attack upon a nuclear facility aimed at causing an uncontrolled release of radioactive materials. Security forces will be involved in all aspects of the response: at the scene, to lead, to control the crime scene and preserve evidence; at the hospitals, to identify and manage witnesses who may assist in the ensuing investigation, and to protect emergency medical personnel if perpetrators are part of the casualties; and at the regional and national coordination level, to manage the overall criminal investigation; to take under physical protection the seized materials. Law enforcement response: key considerations to all police (security and investigating) personnel at the scene of a terrorist act will include the following: do not approach the scene without proper radiological support; be aware of the possible presence of other radiological hazards; the radiological team will seek the removal of safety hazards. Work with that team to minimize hazards while not compromising the investigation. Minimize traffic through the scene: this will help reduce the spread of radioactive contamination, if present; people present at the scene need to be held for questioning. However, they will also have fears due to the presence of radiation. Work with the radiological team to minimize radiological hazards and fears while not compromising the investigation procedure. (author)

  17. Medical-legal issues in headache: penal and civil Italian legislation, working claims, social security, off-label prescription.

    Science.gov (United States)

    Aguggia, M; Cavallini, M; Varetto, L

    2006-05-01

    Primary headaches can be considered simultaneously as symptom and disease itself, while secondary headaches are expressions of a pathological process that can be systemic or locoregional. Because of its subjective features, headache is often difficult to assess and quantify by severity, frequency and invalidity rate, and for these reasons it has often been implicated in legal controversies. Headache has seldom been considered in the criminal law, except when it represents a typical symptom of a disease whose existence can be objectively assessed (i. e. raised intracranial pressure). Therefore, in civil legislation it is not yet coded to start claiming for invalidity compensation. In particular, one of the most debated medical-legal questions is represented by headaches occurring after head injury. Headache is often the principal symptom at the beginning of several toxic chronic syndromes, with many implications, especially in working claims, and, more recently, it may be referred to as one of the most frequent symptoms by victims of mobbing (i. e. psychological harassment in the workplace). The National Institute for Industrial Accident Insurance (INAIL) scales (instituted by the law 38/2000) mention the "Subjective cranial trauma syndrome" and give an invalidity rate evaluation. With reference to other headache forms, no legislation really exists at the present time, and headache is only considered as a symptom of a certain coded disease. Requests for invalidity social pension and the question of off-label prescriptions (drug prescription for a disease, without formal indication for it) are other controversial matters.

  18. National Security and Language Competence: US Armed Forces and Transnational Communication

    National Research Council Canada - National Science Library

    Muller, Kurt

    1983-01-01

    .... As operations in foreign areas also entail dealing with a population whose cultural background may differ from ours, language skill may be of command interest For its contribution to civil-military cooperation...

  19. Improving the Efficacy of Department of the Army Title 10 Forces Performing Defense Support of Civil Authorities

    Science.gov (United States)

    2013-06-13

    Standing Rules for the Use of Force ix TACON Tactical Control TF Task Force TIC Toxic Industrial Chemical TIM Toxic Industrial Material UCMJ...The sole maneuver entity under TF-Ops was the Military Police Battalion stationed at Fort Bliss , Texas. The MP battalion had a garrison requirement...at Fort Bliss having conflicting ideas of what the CCMRF requirements were. This resulted in multiple higher headquarters with differing

  20. 32 CFR 855.13 - Civil fly-ins.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Civil fly-ins. 855.13 Section 855.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.13 Civil fly-ins. (a) Civil...

  1. Nuclear energy and civilization

    International Nuclear Information System (INIS)

    Soentono, S.

    1996-01-01

    The role of energy is indeed very important since without it there will be no living-things in this world. A country's ability to cultivate energy determines the levels of her civilization and wealth. Sufficient energy supply is needed for economic growth, industrialization, and modernization. In a modern civilization, the prosperity and security of a country depends more on the capability of her people rather than the wealth of her natural resources. Energy supplies the wealth, prosperity and security, and sufficient reliable continuous supply of energy secures the sustainable development. The energy supply to sustain the development has to improve the quality of life covering also the quality of environment to support the ever increasing demand of human race civilization. Energy has a closer relationship with civilization in a modern society and will have to become even closer in the future more civilized and more modern society. The utilization of nuclear energy has, however, some problems and challenges, e.g. misleading information and understanding which need serious efforts for public information, public relation, and public acceptance, and possible deviation of nuclear materials for non-peaceful uses which needs serious efforts for technological and administrative barriers, precaution, prevention, safety, physical protection, safeguard, and transparency. These require cooperation among nuclear community. The cooperation should be more pronounced by heterogeneous growing Asian countries to reach harmony for mutual benefits toward better civilization. (J.P.N.)

  2. Reasons for medical evacuations of soldiers serving in International Security Assistance Force (ISAF) operation in Afghanistan.

    Science.gov (United States)

    Korzeniewski, Krzysztof; Gregulski, Robert

    2014-01-01

    The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for battle injuries, non-battle injuries and diseases. Each medically evacuated Polish soldier was subjected to statistical analysis. The study population comprised 25,974 soldiers assigned to the Polish Military Contingent Afghanistan in the given period. From 2007 to 2013, 1.9% of the Polish military personnel (n = 485) participating in the ISAF operation in Afghanistan were evacuated for medical reasons before the scheduled termination of their contract. 40.6% of all medical evacuations were due to battle injuries, 32.4% due to non-battle injuries, and 27.0% due to diseases. ISAF is an example of a combat operation, in which battle injuries remain the leading health problem in mission participants. 3 of 4 Polish soldiers who were medically evacuated from Afghanistan were no longer fit for military service in the area of operations due to the traumas they had suffered.

  3. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  4. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong

    2015-12-03

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI), conventional CJD using self-interference cancelation at the destination is efficient when the untrusted relay has no capability to suppress the jamming signal. However, if the source and destination are equipped with a single antenna and the only untrusted relay is equipped with N multiple antennas, it can remove the jamming signal from the received signal by linear filters and the full multiplexing gain of relaying cannot be achievable with the conventional CJD due to the saturation of the secrecy rate at the high transmit power regime. We propose in this paper new CJD scheme where neither destination nor relay can acquire CSI of relay-destination link. Our proposed scheme utilizes zero-forcing cancelation based on known jamming signals instead of self-interference subtraction, while the untrusted relay cannot suppress the jamming signals due to the lack of CSI. We show that the secrecy rate of the proposed scheme can enjoy a half of multiplexing gain in half-duplex relaying while that of conventional CJD is saturated at high transmit power for N ???2. The impact of channel estimation error at the destination is also investigated to show the robustness of the proposed scheme against strong estimation errors.

  5. Mobile Detection Assessment and Response Systems (MDARS): A Force Protection, Physical Security Operational Success

    National Research Council Canada - National Science Library

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-01-01

    ... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...

  6. Modernization of the Indian Air Force: Security Implications for South Asia

    National Research Council Canada - National Science Library

    2005-01-01

    This thesis analyzes the Indian Air Force's (IAF) robust modernization campaign and explores why the IAF is on the path to transforming itself from an air force dedicated to air defense to one capable of global force projection...

  7. The Role of the Armed Forces in the Americas: Civil-Military Relations for the 21st Century

    Science.gov (United States)

    1998-04-01

    support for their concerns about the destiny of their respective nations by being elected to office. They have sought election to Congress and even to...its military units in adequate operational form along our national territory. Secondly, there needs to be established a Core Force, "an embryo of the

  8. Civil partnerships five years on.

    Science.gov (United States)

    Ross, Helen; Gask, Karen; Berrington, Ann

    2011-01-01

    The Civil Partnership Act 2004, which came into force in December 2005 allowing same-sex couples in the UK to register their relationship for the first time, celebrated its fifth anniversary in December 2010. This article examines civil partnership in England and Wales, five years on from its introduction. The characteristics of those forming civil partnerships between 2005 and 2010 including age, sex and previous marital/civil partnership status are examined. These are then compared with the characteristics of those marrying over the same period. Further comparisons are also made between civil partnership dissolutions and divorce. The article presents estimates of the number of people currently in civil partnerships and children of civil partners. Finally the article examines attitudes towards same-sex and civil partner couples both in the UK and in other countries across Europe.

  9. On the history of codification of Hungarian civil law and the new Hungarian civil code

    Directory of Open Access Journals (Sweden)

    Salma Jožef

    2014-01-01

    Full Text Available The first part of the paper examines the basic tendencies in the development of the codification of Hungarian civil law in the period of representative and civil society. The second part deals with the new Hungarian Civil Code (2013/14 its content, methods of regulation and its relation to other civil legislation, temporal validity with the adherence to the idea of validity pro futuro, as well as its tendency to harmonize its norms with the guidelines of the European civil law. In accordance with the idea of completeness, the lawmakers incorporated all of the areas of civil law according to the pandecta system - personal law, corporate law with civil association law, family law, obligations and inheritance. The Code is based on the principle of equality of parties in civil relations, the principle of good faith, fraus legis prohibition. Family law is based on specific principles of protection of marriage, family and children. Contract law is based on the freedom of contract, limited by good customs and morality. Tort law is guided by the principle of prohibiting the harm to others, full compensation of material and imaterial damages. Contractual responsibility is regulated separately, so that the tort rules apply if the specific rules of contractual responsibility donot say otherwise. Other grounds for obligations are also regulated, as well as unjustified enrichment, doing business without order or authority, unilateral expression of intention and securities. The grounds for inheritance are contractual, statutory or based on the will. Freedom of disposition by will is limited by statutory rules regulating the forced share. The system of transfer of property ex lege after the death is adopted. The state is a successor if there are no testamentary, statutory or contractual inheritors.

  10. BUILDING THE FORCE OF THE FUTURE: A NEW CALL TO ATTRACT, HIRE AND RETAIN THE BEST AND BRIGHTEST TO AIR FORCE CIVIL SERVICE

    Science.gov (United States)

    2015-10-25

    Graduation Requirements Advisors: Dr . Gregory F. Intoccia and Dr . Patricia Lessane Maxwell Air Force Base, Alabama 25 October 2015 DISTRIBUTION A...support while I was diverting much of my free time and attention to this graduate program. I appreciate my research advisors Dr . Greg Intoccia and Dr ...underutilized USAJOBS, the federal government job search engine, as compare to LinkedIn , Career Builders and Monster. Only 8.8 percent of the

  11. Report on Progress Toward Security and Stability in Afghanistan and United States Plan for Sustaining the Afghanistan National Security Forces

    Science.gov (United States)

    2011-04-01

    105  8.2: INDIA ...2B Afghan Air Force 0 AMoD Education 3 ASOC 0 Gender Integration 0 Personnel Management 2B National Logistics 2B GS G1 2B AMoD AT&L 2B...award nomination package cites her determination to overcome Afghanistan’s cultural stereotypes and to serve in the military “as long as my country

  12. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    Science.gov (United States)

    2013-12-10

    should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies

  13. Forced Engagements: Water Security and Local Rights Formalization in Yanque, Colca Valley, Peru

    NARCIS (Netherlands)

    Boelens, R.A.; Seemann, M.

    2014-01-01

    For vulnerable groups in society, water insecurity and deficient water availability for food production commonly reflect unequal distribution of water volumes, quality, and services within unequal power structures. Water security is necessarily a political dilemma. Policy debates, however, tend to

  14. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  15. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  16. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI

  17. It’s Not New: Historical U.S. Army Security Forces Assistance Efforts

    Science.gov (United States)

    2012-12-06

    obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012

  18. A Security Compliance Study of the Air Force Data Services Center Multics System

    Science.gov (United States)

    1976-12-01

    with thPpate T DErscit requiyfremns oanswe this qungeeto AFysC comsinepo netk alestdroi cosms ivtisicn Afetrs oteAF)CMtcsyswIthteapial Manualm 52ir... effect on them, since AFDSC already has a secure environment. Therefore, requirements for physical security and administrative policy are only reviewed...if the addition of Multics might have some effect on the controls already in effect at the AFDSC. The remainder of this report is divided into two

  19. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  20. Independent Auditors Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund

    Science.gov (United States)

    2015-07-31

    Independent Auditor’s Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces...Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund (Report No. DODIG-2015-154) We are providing this...046, “Independent Auditor’s Report on the Examination of DoD Execution of North Atlantic Treaty Organization Contributing Countries’ Donations to

  1. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  2. Impact of market forces on security of supply; Markedsgoerelse af forsyningssikkerhed

    Energy Technology Data Exchange (ETDEWEB)

    Klinge Jakobsen, H.; Kromann, M.T.; Hoermann, M. (and others)

    2010-05-15

    Marketisation of security of supply can result in efficiency in the overall energy system and cost savings for end users. The analyses show that savings may be gained, particularly in connection with the part of security of supply which is about sufficiency. With modern metering and communication equipment, it is realistic that all consumers have the opportunity to express an upper limit on the price of electricity. In the near future, selected consumption may be turned off at extremely high prices. Those parts of the security of supply, that relates to local networks and that are of the nature of a collective benefit, may be more difficult to make market-oriented. There is, however, already some marketisation, as firms with particularly critical use of electricity invest in backup power plants. The report describes methods for the regulation of grid companies, including cost control, which gives them an incentive to balance the investment in improvements to the security of supply against the cost. Marketisation of security of supply can be done in several steps. Here the following steps are analyzed: a) Cost visibility and reduction; b) Establishment of level of security of supply based on consumer preferences (cost of losses); c) Security of supply varying between consumers, duration and timing; d) Individual level of security of supply. It is at present generally difficult to judge how many of these steps it is appropriate to take. 3 simplistic cases are made of power reserves, transmission and distribution, which indicate how the costs of security of supply can be weighed against advantages. In all three cases it is concluded that supply element has costs for the consumers, but in a magnitude which might well be justified in relation to the benefits. The level of detail in the cases does not, however, justify actual conclusions about the relationship between costs and benefits. It is confirmed in this project through model analysis that savings can be achieved

  3. What Roles and Missions for Europe’s Military and Security Forces in the 21st Century?

    Science.gov (United States)

    2005-08-01

    Studies Dr. John L. Clarke vi Executive Summary Are armies the dinosaurs of the 21st Century, soon to become extinct in the new security environment? What...and 40-year old weapons systems. Dr. John L. Clarke 6 For many reasons , Europe’s armed forces are in a long-term period of decline, and this trend is...in a reasonable period of time and on a high level of interoperability. The capability of carrying out sophisticated operations with a high operational

  4. Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)

    National Research Council Canada - National Science Library

    Alageel, Sami

    2003-01-01

    The Royal Saudi Naval Forces (RSNF) are vulnerable to the same kinds of threats to its information infrastructure as the rest of the industrialized nations, As an officer in the RSNF, I am familiar with the special information...

  5. Building Partner Capacity/Security Force Assistance: A New Structural Paradigm

    National Research Council Canada - National Science Library

    Wuestner, Scott G

    2009-01-01

    ...), which would function much like our military reserve. It would ease the burden on the Armed Forces by allowing the hiring of civilians with critical skills to serve on missions abroad when America needs...

  6. Civil law

    NARCIS (Netherlands)

    Hesselink, M.W.; Gibbons, M.T.

    2014-01-01

    The concept of civil law has two distinct meanings. that is, disputes between private parties (individuals, corporations), as opposed to other branches of the law, such as administrative law or criminal law, which relate to disputes between individuals and the state. Second, the term civil law is

  7. Consequence Management: A Disconnect Between National Security Policy and Force Structure?

    Science.gov (United States)

    2001-03-15

    effects or the consequences of a detonated and/or released weapon(s) has only recently been given much attention. Despite several warnings of the...with the exposure ? Second, the time required to establish and field a regional JTF would prevent the force from having a strong positive effect on the... outcome of the situation. One of the critical missions of a successful consequence management force is its ability to provide a strong deterrent

  8. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  9. Multiplying a Force for Good? the Impact of Security Sector Management Postgraduate Education in Ethiopia

    Science.gov (United States)

    Macphee, Paula-Louise; Fitz-Gerald, Ann

    2014-01-01

    This paper argues for the importance, benefits and wider impact of a donor-funded, locally supported postgraduate programme in security sector management (SSM) for government officials in Ethiopia. With the exception of specialised education and training programmes within the field of peace and conflict studies, the role of education in…

  10. Energy and Security: future-oriented studies for the Swedish Armed Forces; Energi och saekerhet: framtidsinriktade omvaerldsanalyser foer Foersvarsmakten

    Energy Technology Data Exchange (ETDEWEB)

    Oestensson, Malin; Jonsson, Daniel K.; Magnusson, Roger; Dreborg, Karl Henrik

    2009-01-15

    The report provides a basis for the Armed Forces long-term planning, and how changes in the global energy supply may mean new challenges and threats, as well as the advantages and disadvantages that can be associated with different future energy solutions for Armed Forces own activities, primarily relating to fuel and power during operation. One conclusion is that the potential conflict between energy security and climate-security can lead to far-reaching security implications and that continued global fossil dependency contributes to increased safety of political and military focus on a number of potential conflicts. A new such area may be the Arctic, as in the wake of climate change will become available for exploitation. Large scale global renewable energy can bring greater geographical spread - and reduced pressure on existing 'hot-spots'. Nuclear power is unlikely to be influential in the overall global energy security, but security problems associated with the production of nuclear materials can spread and be strengthened. Furthermore, the energy problems of connected to gaps between rich and poor, which may lead to social friction and conflict. The trend toward increased nationalisation and politicization of the energy is in contrast to free trade and market liberalism and may lead to further militarization of energy resources. Bilateral energy contracts may result in division within the EU and create a hindrance to joint positions and actions, such as in international efforts. As for Armed Forces own future energy solutions, the knowledge of alternative fuels (eg alcohols, diesel variants, gaseous fuels) and energy converters (eg hybrid vehicles, fuel cells) is reviewed. The following alternative principle solutions fuel and power are discussed: 1. Power from small-scale electricity generation via solar cells and small wind farms and power stations with liquid fuel as a supplement. Transport with plug-in hybrid vehicles, i.e. liquid propellants in

  11. Operationalising United Nations Security Council Resolution 1325 within the Australian Defence Force

    Science.gov (United States)

    2016-01-01

    responsibilities. In turn, she goes on to show the upsurge in sectarian violence since 2003 has intensified gender inequality and the future prospects for...security sector reform; disarmament, demobilisation and reintegration; transition assistance; and disaster response. Consideration of the gendered ...There are two key terms used throughout this literature review that need to be defined from the outset: sex and gender . Sex is the anatomy with which

  12. To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation

    Science.gov (United States)

    2015-02-01

    security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce

  13. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    Science.gov (United States)

    2008-12-01

    and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin

  14. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  15. modernization and professionalization of the nigerian armed forces

    African Journals Online (AJOL)

    Post civil war developments in Nigeria obviously provided the opportunity for the rebirth of discipline, order and esprit de corps in the Armed Forces. It would seem that the military came out of the war, more organized, more confident in its ability to cope with the problem of securing the territorial integrity of Nigeria and above ...

  16. Civil Society

    Science.gov (United States)

    Social Media Facebook @oasofficial Facebook Twitter @oas_official Twitter Newsletters Documents OAS Technology Social Development Summits of the Americas Sustainable Development T Telecommunications Terrorism Tourism Trade Treaties and Agreements W Women Y Youth Strategic Partners Permanent Observers Civil Society

  17. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  18. Civil War

    OpenAIRE

    Christopher Blattman; Edward Miguel

    2010-01-01

    Most nations have experienced an internal armed conflict since 1960. The past decade has witnessed an explosion of research into the causes and consequences of civil wars, belatedly bringing the topic into the economics mainstream. This article critically reviews this interdisciplinary literature and charts productive paths forward. Formal theory has focused on a central puzzle: why do civil wars occur at all when, given the high costs of war, groups have every incentive to reach an agreement...

  19. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  20. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  1. Civil Air Patrol (CAP) Aircraft Requirement Study

    National Research Council Canada - National Science Library

    Mercher, Christopher

    1999-01-01

    The Air Force Audit Agency (AFAA) concluded in its Report of Audit EB0980013 (13 May 98), Air Force Oversight of CY 1996 Civil Air Patrol Corporation Activities, CAP-USAF, Maxwell AFB, AL 36112-6323...

  2. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  3. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  4. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  5. Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR

    KAUST Repository

    Rezki, Zouheir

    2012-04-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secrecy multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secrecy diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secrecy diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secrecy diversity gain of the MIMO wiretap channel. © 2012 IEEE.

  6. Evaluation of Current Automated Civil Engineer System Non-Appropriated Funds Project Programming Procedures

    National Research Council Canada - National Science Library

    Ligday, Joshua

    2004-01-01

    ...) to support the changing needs of the organization. The Air Force civil engineering organization is no exception since they have drastically improved their Automated Civil Engineer System (ACES...

  7. Defense Civil Support: DOD Has Made Progress Incorporating the Homeland Response Force into the Chemical, Biological, Radiological, and Nuclear Response Enterprise

    Science.gov (United States)

    2016-06-01

    role supporting civil authorities in a CBRN incident. By 2012, DOD had established the HRF, comprising 10 geographically dispersed National Guard...HRF/CERFP) (Sept. 30, 2010). 44A concept of operation is a verbal or graphic statement that clearly and concisely expresses what a Commander

  8. Civil Disobedience.

    Science.gov (United States)

    Martz, Carlton

    2000-01-01

    This theme issue looks at three historical and recent instances of civil disobedience. The first article examines the Free Speech Movement, which arose on the Berkeley campus of the University of California in the 1960s. The second article recounts the struggle of Mahatma Gandhi to free India from the British Empire. The final article explores the…

  9. 6 CFR 13.43 - Collection of civil penalties and assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Collection of civil penalties and assessments. 13.43 Section 13.43 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.43 Collection of civil penalties and assessments. Sections 3806 and 3808...

  10. 6 CFR 13.3 - Basis for civil penalties and assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Basis for civil penalties and assessments. 13.3 Section 13.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.3 Basis for civil penalties and assessments. (a) Claims. (1) Except as provided in...

  11. 46 CFR 80.40 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Civil penalty. 80.40 Section 80.40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS DISCLOSURE OF SAFETY STANDARDS AND COUNTRY OF REGISTRY § 80.40 Civil penalty. For each violation of the regulations in this part, the owner, operator...

  12. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  13. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  14. NATIONAL INTERESTS AND THE ROLE OF THE RUSSIAN CIVILIZATION OF MODERN CIVILIZATION SPACE

    Directory of Open Access Journals (Sweden)

    Svetlana Vladimirovna Popova

    2015-02-01

    Full Text Available One of Russia’s national security is the security in the spiritual realm. It is destructive tendencies in the spiritual sphere lead to such dangerous phenomena as terrorism, extremism, crime in all its manifestations and sectarianism. Destructive stereotypes introduced from the outside into the public consciousness, are one of the main threats to Russia’s national security. The answer to these processes Dol wives become, from our point of view, the approach and strategy of integration, based on the dialectics of cultural samoopyleniya, which is the only al-ternatively logic of domination and conflict. The activation of the process of integration of migration in modern Russia it is necessary to create a strategically important subject of international relations, without which it is impossible multipolar world.At the same time, the effectiveness of the provision of spiritual security and the boards of the national interests of modern Russia depends not only on the degree-penalty protection inner space of the country, but also from the realization of the spiritual expansion in the global space. This means active participation in the spiritual evolution of the world to prevent the influence of destructive forces, based on the system of antivalues and the cult of violence.In modern Russia, it may have to determine the direction common to modern civilization development. For this purpose there are all prerequisites. Russia today are able to exert an influence on the global geopolitical processes, using their cultural, historical, spiritual, natural, political, and other resources.

  15. 10 CFR 824.15 - Collection of civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Collection of civil penalties. 824.15 Section 824.15 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.15 Collection of civil penalties. If any person fails to pay an...

  16. Civil liberties and nuclear terrorism

    International Nuclear Information System (INIS)

    Goldberg, S.

    1987-01-01

    The importance of preventing nuclear terrorism is so great that it is easy to believe that the usual concern with civil liberties must take a back seat. But it is precisely when emergencies are invoked that the authors must not forget the importance of freedoms. Emergency powers are easily abused, and, even in the absence of abuse, mistakes can be made. It is hard to understand why they care about civil liberties if every suspect is guilty, every wiretap is necessary, and every search is justified. But sometimes suspects are innocent, wiretaps are used for political ends, and searches disrupt lives to no end. Civil liberties do not exist in a vacuum. If society is destroyed, civil liberties are likely to be destroyed as well. Virtually every legal doctrine this study addresses involves a recognition that individual rights must be balanced against valid social needs. The civil liberties focus on here fall under the general headings of freedom of speech and association, privacy, due process rights for suspects, and freedom from unreasonable searches and seizures. One essential point applied to all these areas: although a counterterrorist activity is legal, that does not mean the activity has no impact on civil liberties. It may be legal, for example, to have a massive federal police force that provides hundreds of guards for every shipment of plutonium. Even so, that procedure still raises civil liberties concerns, since many Americans would feel less free in a society of that type

  17. Security Force Assistance

    Science.gov (United States)

    2009-05-01

    themselves isolated with great autonomy and no The Advisor 1 May 2009 FM 3-07.1 7-3 supervision. These conditions present moral and ethical dilemmas daily...Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture, people are raised from

  18. Institutionalizing Security Force Assistance

    Science.gov (United States)

    2008-05-19

    long before current conflicts developed. An Australian Armoured [sic] Corps Officer with experience in both the Solomon Islands and Iraq noted...and the national level policy. Despite some turnover and changes among the senior military and civilian leadership, the underlying tone has not

  19. Allegiance: Egypt Security Forces

    Science.gov (United States)

    2013-12-01

    Sadat began a policy of economically opening Egypt to the West which led to mandatory subsidy reductions on cooking fuel, rice , bread and other...by a distance from one another. The Emergency Law was not violated, but protestors could look around and see others wearing a black or white shirt...expected after the uprising of 2011 never truly materialized; the Interior Ministry instituted various cosmetic changes, but its basic construct and

  20. Myths and Realities of Minimum Force in British Counterinsurgency Doctrine and Practice

    Science.gov (United States)

    2013-03-01

    into a cinema .127 The list goes on. Administratively, the local civil authorities did little to deter security forces from fighting the...the bandits.” This puts in a nutshell the problem of how to convince somebody who thinks like this without descending to Japanese methods. On the

  1. Gender aspects of civil marriage risks

    Directory of Open Access Journals (Sweden)

    M. S. Khrustalova

    2014-07-01

    In comparison with the representatives of matrimonies the civil ones value significantly higher the equality of spent forces for family and «save» on the development of relations extinguishing personal development of both.

  2. Investors Perception on Civil Remedies and Civil Action under the Capital Markets and Services Act 2007

    OpenAIRE

    Yeon, Asmah Laili; Yaacob, Nurli

    2016-01-01

    The Capital Markets and Services Act 2007 provides civil action and remedies for the victim of securities crimes. Whether these remedies are sufficient to protect investors’ interest when dealing in securities transaction is an issue to be discussed in the paper? This paper aims to analyze investors’ perception on civil remedies and action. This paper based on the legal research findings where a systematic method of exploring, investigating, analyzing and conceptualizing legal issues pertaini...

  3. [Formula: see text]Determination of the smoking gun of intent: significance testing of forced choice results in social security claimants.

    Science.gov (United States)

    Binder, Laurence M; Chafetz, Michael D

    2018-01-01

    Significantly below-chance findings on forced choice tests have been described as revealing "the smoking gun of intent" that proved malingering. The issues of probability levels, one-tailed vs. two-tailed tests, and the combining of PVT scores on significantly below-chance findings were addressed in a previous study, with a recommendation of a probability level of .20 to test the significance of below-chance results. The purpose of the present study was to determine the rate of below-chance findings in a Social Security Disability claimant sample using the previous recommendations. We compared the frequency of below-chance results on forced choice performance validity tests (PVTs) at two levels of significance, .05 and .20, and when using significance testing on individual subtests of the PVTs compared with total scores in claimants for Social Security Disability in order to determine the rate of the expected increase. The frequency of significant results increased with the higher level of significance for each subtest of the PVT and when combining individual test sections to increase the number of test items, with up to 20% of claimants showing significantly below-chance results at the higher p-value. These findings are discussed in light of Social Security Administration policy, showing an impact on policy issues concerning child abuse and neglect, and the importance of using these techniques in evaluations for Social Security Disability.

  4. Report on the behalf of the Commission for Foreign Affairs, Defence and Armed Forces on the bill proposition adopted by the National Assembly, related on the strengthening of the protection of civil installations containing nuclear materials. Nr 446

    International Nuclear Information System (INIS)

    Pintat, Xavier

    2015-01-01

    In its first part, this report presents the nuclear sector as a sensitive sector under strict surveillance: a sector of critical importance (safety policy with its actors and its multi-level planning, a safety arrangement for the nuclear energy sector), a regulation specific to the nuclear sector, and specialised protection forces. It also addresses the issues of intrusions and over-flights (overview of intrusions, unsuitable penal repression, and new dimension of air safety due to the development of civil uses of drones). The next part comments the content of the bill proposition, and addresses the lack of a suitable penal regime for the protection of nuclear materials and of areas regarding defence. The scope of application of the bill proposition is discussed, as well as the applicable and additional penalties. A list of hearings is provided as well as non adopted amendments and a table proposing a comparison between different versions of the text

  5. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  6. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  7. Securing Healthcare’s Quantified-Self Data: A Comparative Analysis Versus Personal Financial Account Aggregators Based on Porter’s Five Forces Framework for Competitive Force

    Science.gov (United States)

    2016-09-01

    PORTER’S FIVE FORCES FRAMEWORK FOR COMPETITIVE FORCES Catherine H. Chiang Management Program Analyst, United States Citizenship and Immigration...2009): 454–66, doi:10.1377/hlthaff.28.2.454. 34 Catherine L. Anderson and Ritu Agarwal, “The Digitization of Healthcare: Boundary Risks, Emotion...allows patterns of distinctive characteristics to be tracked. As more behaviors are digitized , these unique characteristics could easily be used to

  8. High technology and civil rights

    International Nuclear Information System (INIS)

    Lerche, P.

    1982-01-01

    Court decision reflect the widely felt lack of clarity about the present legal situation in the field of high technology. This confusion is also due to the fact that this legal situation is surrounded by civil rights constellations, which have more and more eroded the contours of our legal system in recent years: Today, civil rights are no longer specific, well-definable bulwarks for the citizen, but are more and more frequently interpreted by the supreme courts as sources of procedural requirements with more or less certain often vague consequences. This shifting of the accent in civil rights towards procedural matters is due to an innate logical necessity, however: The same civil right considered in the same situation, e.g., in planning for high technology, may give rise to very different, even contradictory individual claims. Therefore, one of the main modern objectives of civil rights becoming more and more apparent is the need to reconcile conflicting positions, which makes civil rights a driving force in balancing interests in the easiest possible way. Yet, one of the main deficiencies in this rapidly growing procedural approach is the one-sidedness often to be found as a result of isolated, punctual actions. This misses the objective of achieving adequate harmonization. As examples of such one-sided, isolated civil rights approaches, legal opinions are cited on the so-called public participation (possibility to object for those concerned) in the licensing procedures under the German Atomic Energy Act and for protection against environmental impacts. Quity rightly, this participation of the public is interpreted as an advance protection of civil rights. However, its consequences quite often are exaggerated. (orig.) [de

  9. An Examination of the Roles of Medical Units in Support of Chemical, Biological, Radiological, or Nuclear Event (CBRN) under Joint Task Force Civil Support (JF-CS)

    Science.gov (United States)

    2012-05-16

    diabetes, obesity, pediatrics, geriatrics, obstetrics , are some of the areas that the military medical response forces are currently not capable of...rebellion or unlawful “assemblage” precludes enforcement of the law through judicial proceedings; and to suppress “any insurrection, domestic violence

  10. 17 CFR Table IV to Subpart E of... - Civil Monetary Penalty Inflation Adjustments

    Science.gov (United States)

    2010-04-01

    ... Inflation Adjustments IV Table IV to Subpart E of Part 201 Commodity and Securities Exchanges SECURITIES AND... Table IV to Subpart E of Part 201—Civil Monetary Penalty Inflation Adjustments Table IV to Subpart E U.S. Code citation Civil monetary penalty inflation adjustments Civil monetary penalty description Year...

  11. Counterintelligence Screening Needed lo Reduce Security Threat That Unscreened Local National Linguists Pose to U.S. Forces (REDACTED)

    Science.gov (United States)

    2012-12-07

    Logistics Civil Augmentation Program MEP Mission Essential Personnel MFR Memorandum for Record OCI Organizational Conflict of Interest OCONUS Outside...reports would draw conclusions and recollllllel1dations on the retention, hir.ing, or threat posed by the LNs. MEP would send thjl MFRs to tlie...office responsible for issning badges on the local installations if the MFRs had no negative CI infonnation. If the MFRs had CI exploitable information

  12. THE MILITARY STATE IN SOUTH AMERICA: INTERVENTIONISM, CAUDILLOS AND ARMED FORCES

    OpenAIRE

    PEDRO RIVAS NIETO

    2018-01-01

    In this work the author analyzes the elements of the Military State, which was the result of National Security Regimes. They ruled South America during the last third of the 20th century. The behaviour of the Armed Forces is compared with that of the classic caudillos. The Armed Forces-Civil Society relationship is studied too. And, of course, the intervention in political issues by the military and their relationship with political parties is also analyzed, as well. The conclusion ends with ...

  13. 78 FR 32241 - U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment

    Science.gov (United States)

    2013-05-29

    ..., seeks industry views and perspectives to inform an on-going strategic National Security Space Launch... the U.S. Government. 2. What are the critical issues that concern current and prospective launch...

  14. Corruption in the Kenya Police Force and Impacts on Kenyan Security: Investigating the Need for Police Reforms

    Science.gov (United States)

    2017-03-21

    been using the police culture, philosophy , and organization structure in the Police Service based on the British colonial security system. Such...reflects on the police corruption that wreaks the moral authority of law enforcement; thus, undermining the public trust and confidence in the law...economic growth emphasized in the Kenya’s vision 2030. Since independence, Kenya’s security structure, philosophy , and systems have been inherited and

  15. Civil liability for nuclear damage

    International Nuclear Information System (INIS)

    1963-01-01

    An international Convention on Civil Liability for Nuclear Damage was adopted in Vienna on 19 May 1963 by a sixty-nation conference convened by the International Atomic Energy Agency. The Convention, which is subject to ratification by the States signing it, will come into force three months after the deposit of the fifth instrument of ratification. The Convention is designee only to establish minimum rules regarding civil liability for nuclear damage; it may thus well be described as a framework convention, the main provisions of which represent the essential common denomination acceptable to as many States as possible. It leaves wide scope for national legislation and regional arrangements with a view to implementing these provisions The Convention does not purport to create a uniform civil law in this field, but it contains the minimal essential for protection of the public and forms the legal basis for uniform world-wide liability rules

  16. Pending crisis in Russian civil military relations

    Energy Technology Data Exchange (ETDEWEB)

    Ball, D.Y.

    1997-10-01

    A key issue in the study of civil-military relations has been how to create a military sufficiently strong to ensure security from external threats while simultaneously preventing the military from using its preponderance of power in the domestic arena. This dilemma arises from the fear engendered by a large armed force created to combat foreign threats, but which is also inherently a threat to the society that created it. In Russia, however, the question is not how the civilian leadership can keep the military out of politics, but how the military can keep the leadership from politicizing the armed forces. The Russian military has no interest in resolving Russia`s domestic political problems. It is a professional military that prefers to leave politics to the politicians, and to carry out its mission of defending the nation against external attack. But the lack of responsible central leadership and the poor state of the economy are driving the military toward involvement in domestic politics if for no other reason than to ensure its own survival.

  17. Environmental Assessment: Conversion of the 820th Security Forces Group at Moody AFB, Georgia to a Contingency Response Group

    Science.gov (United States)

    2003-08-01

    Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton

  18. 17 CFR Table III to Subpart E of... - Civil Monetary Penalty Inflation Adjustments

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Civil Monetary Penalty Inflation Adjustments III Table III to Subpart E of Part 201 Commodity and Securities Exchanges SECURITIES..., Table III Table III to Subpart E of Part 201—Civil Monetary Penalty Inflation Adjustments U.S. Code...

  19. Twenty Years of Evolutionary Change in the Department of Defense’s Civil Support Mission

    Science.gov (United States)

    2013-05-23

    Joint Task Force – National Capitol Region MACA Military Assistance to Civil Authorities MSCA Military Support to Civil Authorities NCR National...Assistance to Civil Authorities ( MACA ). MSCA was defined as civil support consisting of support for natural or manmade disasters, chemical, biological...consequence management, and other support as required.16 MACA was defined as

  20. Stasis and Bellum Civile

    DEFF Research Database (Denmark)

    Lange, Carsten Hjort

    2017-01-01

    David Armitage’s new monograph Civil Wars: A History in Ideas (2017) will undoubtedly long remain a standard reference work. It presents readers with a vision of civil war as part of the longue durée. The argument might be further strengthened, however, if a more inclusive Greco-Roman approach...... to ancient civil war is accepted. This essay focuses on stasis vs. bellum civile, the origins of the concept of civil war, the approach of later Roman writers (such as Appian and Cassius Dio) to the concepts of stasis and bellum civile, and, finally, the question of what makes a civil war a civil war....... Whatever concepts were used, the Romans were not the first to experience internal war as a civil war—that is, a war between the citizens of a polity....

  1. Lift force fluctuations of magnetically levitated vehicles with an integrated synchronous linear motor and their significance for the technical security

    Energy Technology Data Exchange (ETDEWEB)

    Mnich, P; Huebner, K D

    1980-07-15

    In this paper the influence of the motor current on the magnetic force is investigated by an analytical method. With the integrated synchronous linear motor the reactions of the current sheet on the excitation field are depending on the pole angle and the amplitude of the current sheet. For an undisturbed operation - current sheet and induction wave in phase - the influence of the motor current on the magnetic force can be neglected. In case of a disturbed performance, i.e. when the pole angle is changing periodically, fluctuations of the magnetic force will be found. This effect has to be compensated by a reserve magnetic force in the levitation control. With the technical data for the new magnetic levitation pilots plants (International Traffic Fair 1979 at Hamburg and Transrapid - Pilot Plant Emsland) the stated relations are evaluated. Approximated relations for the levitation force are derived. For comparison, a finite-difference computer programme from the 'Institut fuer elektrische Maschinen, Antriebe und Bahnen, Technische Universitaet Braunschweig' is applied. The approximated relations developed in this paper are verified - with a sufficient precision - by the numerical calculations.

  2. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  3. The Visiting Forces Agreement (VFA in the Philippines: Insights on Issues of Sovereignty, Security and Foreign Policy

    Directory of Open Access Journals (Sweden)

    Mark Anthony M. Velasco

    2015-11-01

    Full Text Available The study intends to compare the Visiting Forces Agreement (VFA between the Philippines and the United States of America and the VFA between the Philippines and Australia. The research piece is arranged in the following flow of ideas. The first and the second part provides the foundations by highlighting issues on definition, historical background, provisions of the agreement and concerns faced by the agreement of the Visiting Forces Agreement (VFA between the Republic of the Philippines and the United States of America and the Status of the Visiting Forces Agreement (SOVFA between the Republic of the Philippines and Australia. The third part is an analysis of the VFA and the SOVFA under the tutelage of the framework on the non-intervention principle. As a result, the provisions of SOVFA were in consonance with the legal arrangement in the Philippines than the VFA with the United States of America.

  4. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  5. There is possible damages on the nuclear power plants (NPP) of so-frontiers states and operations of the forces of the civil defense (cd) in these situations

    International Nuclear Information System (INIS)

    Ocaqov, H.O.

    2002-01-01

    same footing as the personnel working with ethnogeny sources of ionizing radiation or those who work in conditions under the influence of latter. At accidents with vast territories pollution on a basis of the control and forecast of a radiation situation (RS) a zone of radiation accident (ZRA) i.e. the territory on which total external and internal radiation in terms of ED can exceed 5 mSv/year is established. Main problems and measures of radioprotection are outlined in the appropriate normative documents of the Republic. At different stages of an accident the interference is regulated by zoning of the polluted territories which is based on the value of annual ED which can be received by the inhabitants in absence of measures of irradiation protection. On the territories where an annual ED does not exceed 1m 3v the usual control of radioactive pollution of objects of an environment and agricultural production is made and by its results an irradiation dose of the population on this territory is not restricted by the radiation factor. This territory is not considered as a zone of a radioactive pollution. Applying the security system in all cases the limits are applied to a sum of all appropriate doses from external radiation for an established period of time and half - century doses from receipts for the same time. Based on the stated above principles which are used as guidance at acceptance of the decisions about character of an interference (protective measures) at planning protective measures on a case of radiation accidence the derivative levels of interference: doses and power of radiation doses levels of radioactive pollution and other characteristics RP with reference to concrete radio dangerous objects and conditions of their accommodation in view of probable types of emergencies scripts of development of emergency situations and forming RC, can be established. The realization of principles and norms of maintenance of radiation safety in extraordinary situations

  6. Civil Law Glossary.

    Science.gov (United States)

    Update on Law-Related Education, 1997

    1997-01-01

    Presents a glossary of civil law terms originally compiled for journalists by the American Bar Association. Defines many essential civil law concepts and practices including compensatory damages, jurisdiction, motion to dismiss, discovery, and remedy. (MJP)

  7. Civil Society In Tanzania: An Analytical Review Of Sources Of ...

    African Journals Online (AJOL)

    Sixty percent of civil societies deal with social development programmes. Additionally, results show that most civil societies had disproportionate staffing problems; and sixty six percent depended on international sources of funding while 46% reported that they secured funds from both local and foreign sources of financing.

  8. Civil Society in the Shadow of the Neoliberal State

    DEFF Research Database (Denmark)

    Hein Jessen, Mathias

    . With globalization and neoliberal policies and the dismantling of the Western welfare states, civil society has increasingly been mobilized for securing governmental and social aims that the states could or would no longer provide, and now the freedom, autonomy and critical role of civil society organizations...

  9. Civil Society and Public Powers : Partners for Social Economy and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Civil Society and Public Powers : Partners for Social Economy and Solidarity ... Working paper : food security and sovereignty ... to announce the results of its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  10. Citizenship in civil society?

    NARCIS (Netherlands)

    Ossewaarde, Marinus R.R.

    2007-01-01

    This article seeks to provide a conceptual framework to complement and guide the empirical analysis of civil society. The core argument is that civil society must be understood, not as a category of (post)industrialized society, but as one of individualized society. Civil society is characterized by

  11. Civil-Military Relations: A Selected Bibliography

    Science.gov (United States)

    2011-05-01

    Society 29, no. 3 (Spring 2003): 373-391. Sage Rosen , Frederik. "Third-Generation Civil-Military Relations: Moving Beyond the Security- Development Nexus... Barak , Oren. The Lebanese Army: A National Institution in a Divided Society. Albany: State University of New York Press, 2009. 272pp. (UA853 .L4B37

  12. Post-civil war adaptation and need in Managua, Nicaragua.

    Science.gov (United States)

    Ahearn, Frederick L; Noble, John H

    2004-07-01

    Within seven years after the end of the Nicaraguan civil war in 1990, forced migrants, whose lives had been most disrupted by the conflict, were self-settled in a squatter community in the capital city of Managua and lived in extreme poverty with minimal health, education, security and social service supports. Compared with voluntary migrant neighbours, whose lives had been less affected by the conflict, forced migrants exhibited equal clinically significant symptoms of physical and mental health and psychosocial maladaptation. These findings run counter to generally held theory and assumptions about the negative long-lasting effects of the trauma and stress of war, forced migration and resettlement. Explanations are offered to explain the discrepancies between theory and the study findings as well as the dominance of poverty and socioeconomic status. Implications are also drawn for increasing social support and other durable forms of assistance that emerge from the study as important to meeting the needs of equally poor and unhealthy forced and voluntary migrants in proliferating squatter communities throughout the Third World.

  13. Effectiveness and Internal Security. A Comparative Analysis of El Salvador and Nicaragua

    Directory of Open Access Journals (Sweden)

    Geoffrey Ellis

    2016-06-01

    Full Text Available Nicaragua and El Salvador share many commonalities, including geographical vulnerabilities, widespread poverty, the experience of civil conflict in the 1980s, and a transition to democracy in the early 1990s. Nevertheless, each state has drastically divergent levels of violence, as measured particularly by homicide rates, with Nicaragua among the lowest in Latin America and El Salvador among the highest in the world. This paper assesses the historical and institutional variables that account for this divergence and evaluates each state’s security structures using a civil-military relations analysis. In particular, the author uses Bruneau and Matei’s criterion of effectiveness. The findings demonstrate that Nicaragua’s security forces consolidated during the 1980s in a manner more capable of sustaining the democratic transition and confronting new security threats like gangs and organized crime.

  14. Dignity and Dawn: Libya’s Escalating Civil War

    Directory of Open Access Journals (Sweden)

    Daveed Gartenstein-Ross

    2015-02-01

    Full Text Available In this Research Paper, ICCT Associate Fellow Dr. Daveed Gartenstein-Ross and Nathaniel Barr provides a detailed examination of the armed conflict in Libya between the Operation Dignity and Libya Dawn military coalitions. The conflict erupted in May 2014, when Dignity leader Khalifa Hifter announced the launch of his campaign, which was aimed at ridding eastern Libya of Islamist militias, beginning with Benghazi. This offensive shattered a fragile status quo. Revolutionary forces concentrated in the city of Misrata and Islamist politicians perceived Hifter’s offensive as a direct affront and, following parliamentary elections that these factions lost, the Misrata-Islamist bloc announced the launch of the Libya Dawn offensive, aimed at driving pro-Dignity forces out of Tripoli. More broadly, the Dawn offensive was an effort to change facts on the ground in order to ensure that the Misrata-Islamist bloc retained political influence. The Dignity and Dawn offensives have contributed to the continuing political and geographic fragmentation of Libya. Libya now has two separate parliaments and governments, while much of the country has been carved into spheres of influence by warring factions. The Dignity-Dawn conflict has also caused a deterioration of security, which has played into the hands of a variety of violent non-state actors, including al-Qaeda and Islamic State affiliates that have capitalized on Libya’s security vacuum to establish bases of operation. This report provides a blow-by-blow account of the military conflict between Dignity and Dawn forces, then assesses the implications of the Libyan civil war on regional security and potential policy options for Western states.

  15. The Evolution of the Civil Affairs Force

    Science.gov (United States)

    2013-12-01

    significant cost is associated with printed material for the students. The FLETC has piloted a program to implement the use of electronic tablets in...order to reduce the cost associated with traditional law enforcement textbooks (Federal Law Enforcement Training Center, 2012). In addition to

  16. Basic legal provisions concerning the activities of industrial security personnel

    International Nuclear Information System (INIS)

    Eberstein, H.H.

    1980-01-01

    The author confines himself to sabotage and espionage. Necessary counter-measures are determined by the respective type of activities. Sect. 618 of the German Civil Code and Sect. 120 a of the Industrial Code give basic legal provisions for the protection of industrial personnel. The legal position held by owner or occupant forms the legal basis for 'vulnerable point protection'. The owner's rights are assigned to the industrial police and are exercised in correspondence with the service or employment contract set up according to Sect. 611 and the following sections of the German Civil Code. Outside guards work according to the performance contract given int the Sections 675, 611, 631 of the German Civil Code. The security personnel has the common right of self-help: self-defence, civil rights concerning the state of national emergency and self-defence under criminal law, rights derived from ownership and property. The author critically argues views held by Mr. Hoffmann-Riem who thinks that police powers have been assigned to private persons. He definitely answers in the negative to the execution of, or encroachment on, sovereign (police) powers by industrial security personnel. A special legal regulation is not necessary, since private protection in form of professional selfdefence is admissible under the law in force. (HSCH) [de

  17. A Concise Analysis of Argentina’s Post-Junta Reform of Its Major Security Services

    Science.gov (United States)

    2006-12-01

    Carlos Menem (1989–99), respectively a radical and a Peronist, implemented civil-military reform of the security forces. Initially, the reforms...purging the ranks, while Menem used indirect methods, while pointing to the on-going economic crisis to legitimize continuation of his reforms. In all...Politics 35, no. 1 (October 2002): 1. 93 Ibid., 2 94 David Pion-Berlin, 110. 39 civilian government, whereas Menem took advantage of the general

  18. 17 CFR 143.8 - Inflation-adjusted civil monetary penalties.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Inflation-adjusted civil... JURISDICTION General Provisions § 143.8 Inflation-adjusted civil monetary penalties. (a) Unless otherwise amended by an act of Congress, the inflation-adjusted maximum civil monetary penalty for each violation of...

  19. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  20. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  1. Joining forces for food security - Linking earth observation and crowd-sourcing for improved decision-support to aid organizations

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Pham, P.

    2013-12-01

    Droughts statistically exceed all other natural disasters in spatio-temporal extent, number of people affected or financial loss. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. Consequently, this study is focused on two complementary developments - a new satellite-derived agricultural drought index and a mobile phone application. The Combined Drought Index (CDI) is enhanced by replacing field measurements of temperature and rainfall modelled/assimilated data. The vegetation component is replaced by a smoothed NDVI dataset. A soil moisture component is introduced to close the gap between rainfall deficiencies and the first visible impacts of atmospheric anomalies on vegetation. The mobile phone application enables the validation of drought index outputs and gives aid organizations an opportunity to increase the speed of socio-economic vulnerability assessments. Supported by Doctors without Borders (MSF) this approach aims at decreasing uncertainties in decision-making via a more holistic risk framework.

  2. Direct carbon dioxide emissions from civil aircraft

    Science.gov (United States)

    Grote, Matt; Williams, Ian; Preston, John

    2014-10-01

    Global airlines consume over 5 million barrels of oil per day, and the resulting carbon dioxide (CO2) emitted by aircraft engines is of concern. This article provides a contemporary review of the literature associated with the measures available to the civil aviation industry for mitigating CO2 emissions from aircraft. The measures are addressed under two categories - policy and legal-related measures, and technological and operational measures. Results of the review are used to develop several insights into the challenges faced. The analysis shows that forecasts for strong growth in air-traffic will result in civil aviation becoming an increasingly significant contributor to anthropogenic CO2 emissions. Some mitigation-measures can be left to market-forces as the key-driver for implementation because they directly reduce airlines' fuel consumption, and their impact on reducing fuel-costs will be welcomed by the industry. Other mitigation-measures cannot be left to market-forces. Speed of implementation and stringency of these measures will not be satisfactorily resolved unattended, and the current global regulatory-framework does not provide the necessary strength of stewardship. A global regulator with ‘teeth' needs to be established, but investing such a body with the appropriate level of authority requires securing an international agreement which history would suggest is going to be very difficult. If all mitigation-measures are successfully implemented, it is still likely that traffic growth-rates will continue to out-pace emissions reduction-rates. Therefore, to achieve an overall reduction in CO2 emissions, behaviour change will be necessary to reduce demand for air-travel. However, reducing demand will be strongly resisted by all stakeholders in the industry; and the ticket price-increases necessary to induce the required reduction in traffic growth-rates place a monetary-value on CO2 emissions of approximately 7-100 times greater than other common

  3. Security Force Assistance and Security Sector Reform

    Science.gov (United States)

    2013-09-01

    regional trade, on the region’s tourism and fish- ing industries, and on food prices.”42 Other ungoverned maritime territory attractive to illicit...Verde, Mali, Benin, Togo, and Ghana. Drugs from Colombia and Peru , which often transit through Brazil, are shipped across the Atlantic and enter...intrastate struggles that pitted ideological movements against regimes they sought to change. These included Sendero Luminoso in Peru , the Farabundo

  4. Civil Rights for Trafficked Persons: Recommendations for a More Effective Federal Civil Remedy

    OpenAIRE

    Shannon Lack

    2008-01-01

    In response to increasing public awareness of human trafficking in the United States, the Victims of Trafficking and Violence Protection Act (TVPA) was signed into law by President Bill Clinton in October of 2000. The TVPA consolidated existing legislation to create a comprehensive civil remedy; this ensures that trafficking victims are no longer forced to seek redress under multiple criminal and civil statutes that target only components of the human trafficking offense. However, despite its...

  5. Civil Society and Governance

    DEFF Research Database (Denmark)

    Hulgård, Lars

    An illustration of how important the relationship is between civil society anbd governance. A short historic journey with four snapshots of times and situations that have provided interesting evidence about the connection between civil society and governance. My goal for the short historic journey...... is to make clear and hopefully even verify that providing knowledge about the impact of civil society and citizens’ participation on governance is one of the most urgent research tasks in the current period of time....

  6. Legalisation of Civil Wars

    DEFF Research Database (Denmark)

    Buhl, Kenneth Øhlenschlæger

    2009-01-01

    This article is concerned with the legal challenges of regulating civil wars in international humanitarian law. Civil war is not a term used in international law; it falls however, withing the context of the legal term 'armed conflicts not of an international character', although the shorter 'non......-international armed conflict' is used here. Civil wars are usually limited to the territory of a state. Considering that international law is generally concerned with the legal relations between states – being a legal system based on the system of states with states as its subjects – the main question is how civil...... wars as internal conflicts have become subject to international humanitarian law....

  7. Forced Shortsightedness: Security Force Assistance Missions

    Science.gov (United States)

    2014-06-01

    accomplished something no other al-Qaeda franchise has ever been able to pull off: conquering and governing a broad swath of a sovereign country, then...marginalized and disadvantaged .”58 Boko Haram has capitalized on the increasing north-south divide and subsequently has increased the frequency and...groups.”70 VENs, such as AQIM and Boko Haram, are internal threats competing for victory over the people and taking advantage of the lack of

  8. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  9. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  10. Strengthening the Role of Civil Society in Water Governance in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Strengthening the Role of Civil Society in Water Governance in African Cities - Durban, Maputo, Nairobi. Achieving water security in Africa remains a major challenge for policymakers. Moreover, there is evidence linking climate variability to deteriorating water security in the region, particularly its cities. This project aims to ...

  11. Peace, Security, Globalisation & Cultural Diplomacy

    Directory of Open Access Journals (Sweden)

    Ashok Natarajan

    2017-06-01

    Full Text Available This article argues for a positive, comprehensive conception of peace that goes beyond the mere absence of war and a more integrated conception of human security that encompasses a wider range of issues than threats of physical violence. Education is one of humanity’s most effective social institutions for redirecting the violent physical energies of destruction into higher avenues of civilization and culture as an instrument of conscious social evolution. Organization is knowledge of higher accomplishment. Organization has the power to vastly accelerate and multiply the potentials of education for the promotion of peace and security. Peace and Security have a mutually reinforcing effect on each other in the sense that peace results in security while security results in peace. Physical violence eventually led to the development of the knowledge needed for the avoidance of violence by means of diplomacy, trade and cultural exchanges, marking the beginning of the transition from the physical to the mental level of evolution. Trade requires travel, transport, human interaction, exchange, trust with respect to products, and reliable mechanisms for the exchange of a stable currency that can only be effectively founded on an enduring peace that generates confidence among the traders. Isolated communities evolve a communal consciousness as they mature into organized social units founded on shared customs and culture, which later develop into a common legal framework. What began as diplomacy so many centuries ago has now evolved into a near universal recognition of fundamental human rights and the rule of law. The evolution of diplomacy in previous centuries is the foundation for the remarkable betterment of human life witnessed in recent times. The world is in the process of evolving a unifying global culture founded on universal values and recognition of the rich contributions of different cultures to humanity’s progress. As physical force once

  12. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    system force and structure reliance – are discovered and tantamount with EU nations. Thusly I indicated reason viewpoints and figures of security of data structures it additionally relates to the reason of estimation of transient dangers of security of frameworks for that I begin my proposal with one of the fundamental class of data security which is Cyber security. Keyword : Cyber Security, IT

  13. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  14. Apps for Ancient Civilizations

    Science.gov (United States)

    Thompson, Stephanie

    2011-01-01

    This project incorporates technology and a historical emphasis on science drawn from ancient civilizations to promote a greater understanding of conceptual science. In the Apps for Ancient Civilizations project, students investigate an ancient culture to discover how people might have used science and math smartphone apps to make their lives…

  15. Refractions of Civil Society

    DEFF Research Database (Denmark)

    Kuzmanovic, Daniella

    The thesis investigates various perceptions of civil society among civic activists in Turkey, and how these perceptions are produced and shaped. The thesis is an anthropological contribution to studies of civil society in general, as well as to studies on political culture in Turkey....

  16. Civil engineering work

    International Nuclear Information System (INIS)

    Cousyn, Rene; Goubin, Jean.

    1977-01-01

    Although it does not require a specifically new technicality, the Civil Engineering site of a nuclear power plant is a complex work. Considering as an example the power plant currently in construction at Tricastin, the authors describe the main Civil Engineering work and task organization applied to carry it out [fr

  17. Civil War and Inoperativity

    DEFF Research Database (Denmark)

    Flohr, Mikkel

    2017-01-01

    This article analyses the penultimate publication in Giorgio Agambens Homo Sacer-series Stasis: Civil War as a Political Paradigm. It compares and contrasts the paradigm of civil war with the preceding paradigm of the exception, and identifies a significant displacement in the relationship between...... civil war and the sovereign state, in spite of Agamben’s insistence on their continuity. Agamben’s decoupling of civil war and the sovereign state facilitates novel political possibilities that unfortunately remain underdeveloped in the book. The article proceeds to develop Agamben’s brief intimations...... of inoperativity towards a concept of destituent power drawing on his other writings. It makes the argument for thinking civil war and inoperativity – stasis and stasis – together to derive a concept of destituent power as a form of revolution against the sovereign state, which does not constitute a new sovereign...

  18. Reconceptualizing Civil Regulation

    DEFF Research Database (Denmark)

    Galang, Roberto Martin; Castello, Itziar

    2011-01-01

    This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility litera....... Finally, we argue that, in Asia, governments act as a structuration mechanism which challenges the current understanding of CSR.......This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility...... and environmental standards; but also that local, small and medium companies play a key role in the development of Asian civil regulation. We call this second finding the “CSR importation trap”. Our findings are supported by evidence on the limitations in the interchangeable properties of business and governments...

  19. Civil Society, Democratic Space, and Social Work

    Directory of Open Access Journals (Sweden)

    Neelmani Jaysawal

    2013-10-01

    Full Text Available Civil Society envisages the growth of civilization in a way that the society is in “civilized form.” It has been prominent in Social science since time immemorial. Till 18th century, it was synonymous with the state or political society. It was more or less direct translation of Cicero’s Societas’ Civilis and Aristotle’s Koinonia politike. According to Karl Marx, “Civil Society embraces the whole material intercourse of individuals within a definite stage of development of productive forces.” Civil Society is an arena where modern man legitimately gratifies his self-interest and develops his individuality, but also learns the value of group action, social solidarity which educates him for citizenship and equips him to participate in the political sphere of the state. It provides “networks of civic engagement” within which reciprocity is learned and enforced, trust is generated. An active and diverse civil society plays a valuable role in advancement of democracy. It seeks to ensure that citizen’s interests are taken seriously. The social work intervention may not be democratically envisaged until it is promulgated by civic engagement through Civil Society. Methodology: This is a descriptive study which consists of secondary source of data collection based on reports, books, periodic journals, web-based articles. There have been utilized three case studies for reaching the findings of study. This article will highlight on role of civil society in providing democratic space and assisting social workers to ensure inclusive growth through conglomeration of state and individuals.

  20. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  1. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  2. The possible contribution of civil society in the moral edification of South African society: The example of the ‘United Democratic Front’ and the ‘Treatment Action Campaign’ (1983–2014

    Directory of Open Access Journals (Sweden)

    Jakobus M. Vorster

    2015-03-01

    Full Text Available In spite of much candid protest and overt criticism against the service delivery record and corruption of the South African government, the governing party, the African National Congress (ANC, once again secured a persuasive victory in the 2014 national elections. This situation begs the question whether the ballot box is really the only efficient instrument for disgruntled voters to influence government policy and behaviour. This article examines the possibilities that the mobilisation of civil society offers in this regard. The central theoretical argument is that civil society can be an important instrument through which the citizenry can exercise their critical function with regard to the government in an effort to address poor service delivery and corruption and to influence government policy. Christian organisations can play a crucial role in this process. Two examples of past efficient action by civil society serve to illustrate this argument. With the assistance of churches and Christian organisations,these organisations profoundly influenced government policy and are consequently presented as models for action today. The first example is the ‘United Democratic Front’ (UDF that forced the pre-1994 South African apartheid government to a negotiated settlement despite the strict security laws that the state utilised to keep the UDF in check. The second example is the ‘Treatment Action Campaign’ (TAC that forced the post-1994 Thabo Mbeki government to adopt a policy of free provision of antiretroviral drugs to HIV-positive patients. These two influential civil organisations offer models of how civil society can act as critical watchdog. In future, these models can be used to mobilise civil society, including churches and Christian organisations, to act correctively in defining and enacting government policy, despite the ANC’s strong position in government and the large majority that the governing party can secure at the voting

  3. Civil Liability for Environmental Damages

    Directory of Open Access Journals (Sweden)

    Daniela Ciochină

    2012-05-01

    Full Text Available We debated in this article the civil liability for environmental damages as stipulated in ourlegislation with reference to Community law. The theory of legal liability in environmental law is basedon the duty of all citizens to respect and protect the environment. Considering the importance ofenvironment in which we live, the liability for environmental damages is treated by the Constitution as aprinciple and a fundamental obligation. Many human activities cause environmental damages and, in linewith the principle of sustainable development, they should be avoided. However, when this is notpossible, they must be regulated (by criminal or administrative law in order to limit their adverse effectsand, according to the polluter pays principle, to internalize in advance their externalities (through taxes,insurances or other forms of financial security products. Communication aims to analyze these issues andlegal regulations dealing with the issue of liability for environmental damage.

  4. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  5. Why Security Force Assistance Fails

    Science.gov (United States)

    2016-05-26

    military intervention, along with Rumsfeld’s vision of transformation, permeated the philosophy behind the planning process for invading Iraq.66...accessed March 23, 2016, http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. 37...Martin Smith. Aired October 28, 2014. Accessed March 23, 2016. http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. Paul, Christopher et al. What Works

  6. Civil Military Relations and Defense Reform in Poland

    National Research Council Canada - National Science Library

    Tomaszycki, Marek

    2006-01-01

    .... From the beginning, these changes in the European order included security problems. This paper describes changes in the national security of Poland since 1989 with a focus on the Polish Armed Forces (PAF...

  7. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  8. Civil & Criminal Penalties

    Data.gov (United States)

    US Consumer Product Safety Commission — When CPSC is involved in a civil or criminal investigations into violations of the Consumer Products Safety Act the Commission publishes final determinations and...

  9. Civil Procedure In Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    scientific activities conducted by the author, partly based on the author's experience as a member, through a number of years, of the Danish Standing Committee on Procedural Law (Retsplejeraadet), which on a continuous basis evaluates the need for civil procedural reforms in Denmark, and finally also based......The book contains an up-to-date survey of Danish civil procedure after the profound Danish procedural reforms in 2007. It deals with questions concerning competence and function of Danish courts, commencement and preparation of civil cases, questions of evidence and burden of proof, international...... procedural questions, including relations to the Brussels I Regulation and Denmark's participation in this Regulation via a parallel convention with the EU countries, impact on Danish civil procedure of the convention on human rights, preparation and pronouncement of judgment and verdict, questions of appeal...

  10. The humaneness of our technical civilization

    International Nuclear Information System (INIS)

    Bieri, E.

    1981-01-01

    It is good facing our civilization with a critical distance. It keeps away self-complacency and hybris. What we need is a potential of renewal which must be raised by doubts and challenges. A critical distance is based on the determined approval of our civilization which tries to comply with mankind in a high degree. Civilization is the expression of a realistic picture of man. According to this view freedom shall only be possible because of continuous changes and changes are only possible if there is freedom. Propagating confidence in the undestroyable basic forces of human nature and thus enjoying the present as well as trusting the future: this is our message, our moral task. (orig./HP) [de

  11. UGV: security analysis of subsystem control network

    Science.gov (United States)

    Abbott-McCune, Sam; Kobezak, Philip; Tront, Joseph; Marchany, Randy; Wicks, Al

    2013-05-01

    Unmanned Ground vehicles (UGVs) are becoming prolific in the heterogeneous superset of robotic platforms. The sensors which provide odometry, localization, perception, and vehicle diagnostics are fused to give the robotic platform a sense of the environment it is traversing. The automotive industry CAN bus has dominated the industry due to the fault tolerance and the message structure allowing high priority messages to reach the desired node in a real time environment. UGVs are being researched and produced at an accelerated rate to preform arduous, repetitive, and dangerous missions that are associated with a military action in a protracted conflict. The technology and applications of the research will inevitably be turned into dual-use platforms to aid civil agencies in the performance of their various operations. Our motivation is security of the holistic system; however as subsystems are outsourced in the design, the overall security of the system may be diminished. We will focus on the CAN bus topology and the vulnerabilities introduced in UGVs and recognizable security vulnerabilities that are inherent in the communications architecture. We will show how data can be extracted from an add-on CAN bus that can be customized to monitor subsystems. The information can be altered or spoofed to force the vehicle to exhibit unwanted actions or render the UGV unusable for the designed mission. The military relies heavily on technology to maintain information dominance, and the security of the information introduced onto the network by UGVs must be safeguarded from vulnerabilities that can be exploited.

  12. The pending crisis in Russian civil-military relations

    International Nuclear Information System (INIS)

    Ball, D.Y.

    1997-01-01

    A key issue in the study of civil-military relations has been how to create a military sufficiently strong to ensure security from external threats while simultaneously preventing the military from using its preponderance of power in the domestic arena. This dilemma arises from the fear engendered by a large armed force created to combat foreign threats, but which is also inherently a threat to the society that created it. In Russia, however, the question is not how the civilian leadership can keep the military out of politics, but how the military can keep the leadership from politicizing the armed forces. The Russian military has no interest in resolving Russia's domestic political problems. It is a professional military that prefers to leave politics to the politicians, and to carry out its mission of defending the nation against external attack. But the lack of responsible central leadership and the poor state of the economy are driving the military toward involvement in domestic politics if for no other reason than to ensure its own survival

  13. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  14. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  15. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  16. Liberia: National Security Interests in Transformational Development

    National Research Council Canada - National Science Library

    Coleman, Carolyn I

    2008-01-01

    Liberia is of national security interest to the United States of America. Liberia's 14-year civil war ended in 2003, leaving the country with a collapsed government and failing economic, physical, and social infrastructures...

  17. Canadian International Food Security Research Fund | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Food Security Research Fund (CIFSRF) invests in scaling up ... for farming families, and improve nutrition throughout the Global South. ... universities, civil society organizations, governments, and the private sector, ...

  18. The Reluctance of Civil Law Countries in Adopting “the Without Breach of Peace” Standard of UCC Article 9: Evidence from National and International Legal Instruments Governing Secured Transactions

    DEFF Research Database (Denmark)

    Gikay, Asress Adimi; Stanescu, Catalin Gabriel

    2017-01-01

    been shaped by courts on a case-by-case basis. In reforming their secured transactions laws and to enhance access to credit, continental legal systems have shown great reception to Article 9 by adopting the unitary concept and functional approach to security interests, introducing private enforcement....... This article concludes that the alternatives of the “without breach of peace” standard prevailing in continental legal systems undermine the privilege of the secured creditor, pose enforcement problems (such as uncertainty of creditors’ rights and possible abuses against consumer debtors), and restrain out...... international legal instruments), this article demonstrates that continental European legal systems are generally apprehensive with the “without breach of peace” standard. Thus, they are reluctant to transplant it to their legislation and try to either modify it or replace it with different legal requirements...

  19. Civil society sphericules

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2014-01-01

    the organization strategizes about and seeks to articulate amongst Tanzanian youth. Situated in the ‘perverse confluence’ (Dagnino, 2011) between neoliberal and radical democratic agendas in the communicative practices of civil society-driven media platforms, Femina navigates between identities as an NGO, a social...... movement and a media initiative. In the context of the growing literature on social networking sites and their affordances, dynamics and structures, the case of Femina illustrates how a civil society sphericule emerges within the dynamic co-evolution of new and old media platforms. The study is furthermore...... an example of the difficult shift in civil society practice, from service provision to an agenda of public service monitoring, social accountability and community engagement....

  20. Producing Civil Society

    DEFF Research Database (Denmark)

    Feldt, Liv Egholm; Hein Jessen, Mathias

    Since the beginning of the 1990’s, civil society has attracted both scholarly and political interest as the ‘third sphere’ outside the state and the market not only a normatively privileged site of communication and ‘the public sphere’, but also as a resource for democratization processes...... and social cohesion, as well as a provider of welfare services from a welfare state in dire straits. However, such a view upholds a sharp distinction between the three sectors and their distinct logic. This article claims that the separation of spheres is a fundamental part of our ‘social imaginary......’ and as such dominates our way of thinking about civil society. Yet, this view hinders the understanding of how civil society is not a pre-existing or given sphere, but a sphere which is constantly produced both discursively, conceptually and practically. Through two examples; 1,the case of philanthropy in the beginning...

  1. Infrastructure development through civil nuclear cooperation

    International Nuclear Information System (INIS)

    Humphrey, A.M.; Burkart, A.R.

    2010-01-01

    Due to growing concerns over electricity demand, energy security, and climate change, numerous countries are considering the construction of new nuclear power plants. Most of these will be built in nations with existing nuclear power programs, but an increasing number of States have expressed serious interest in developing new nuclear power programs. These countries will be faced with many challenges in establishing the robust infrastructures necessary for the safe, secure, and safeguarded deployment of nuclear power. Fortunately, there is much a State can gain through cooperation with other States with more developed programs. By sharing information on previous experience and established best practices, an emerging nuclear energy State can benefit from the lessons learned by its partners. Through a broad range of civil nuclear cooperation, the United States is helping new entrants develop the sound infrastructure necessary to deploy nuclear power plants with the highest standards of safety, security, and nonproliferation

  2. CIVIL RIGHTS AND MINORITIES.

    Science.gov (United States)

    HARTMAN, PAUL

    A MAJOR INTENT OF THE CONSTITUTION AND ITS AMENDMENTS, TO GUARANTEE EQUAL RIGHTS TO ALL CITIZENS REGARDLESS OF RACE, CREED, OR COLOR, HAS BEEN REINFORCED BY THE CIVIL RIGHTS STATUTES OF MANY STATES. IN SOME STATES SUCH LAWS HAVE BEEN ON RECORD FOR THREE-QUARTERS OF A CENTURY. IN OTHER STATES THE SAME CONSTITUTIONAL INTENT HAS BEEN DENIED BY…

  3. Civil Law and Neuroscience

    NARCIS (Netherlands)

    de Kogel, C.H.; Schrama, W.M.; Smit, M.

    2014-01-01

    The relationship between the brain and human behaviour is receiving increasing attention in legal practice. Much has already been published about the role of neuroscience in criminal law, but surprisingly little is known about its role in civil law. In this contribution, the relevance of

  4. Nuclear damage - civil liability

    International Nuclear Information System (INIS)

    Simoes, A.C.

    1980-01-01

    An analysis is made of the civil liability for nuclear damage since there is a need to adjust the existing rules to the new situations created. The conventions that set up the new disciplining rules not considered in the common law for the liability of nuclear damage are also mentioned. (A.L.) [pt

  5. Creative Ventures: Ancient Civilizations.

    Science.gov (United States)

    Stark, Rebecca

    The open-ended activities in this book are designed to extend the imagination and creativity of students and encourage students to examine their feelings and values about historic eras. Civilizations addressed include ancient Egypt, Greece, Rome, Mayan, Stonehenge, and Mesopotamia. The activities focus upon the cognitive and affective pupil…

  6. Civil defence abroad. Pt. 3: The Warsaw Pact countries

    International Nuclear Information System (INIS)

    Schirrmeister, K.G.; Hofmann, H.

    1988-01-01

    Civil defence forms part of the national defence of the G.D.R., and belongs since 1976 to the responsibility of the Defence Ministry. Civil defence service is equal to military service. Civil defence services are organised on a territorial basis and a production-oriented basis: Double concept. Construction of shelters is propagated for 30 years now, maintenance of existing buildings is an obligation since 1965. Principles (triage) of military medical service are applied, and are valid for students and post-graduate medical training. Civil defence training is required in school and industry. Civil defence expenditure is increasing, although there is little acceptance by the population. The issue presents extensive documentation. - Civil defence in the Soviet Union covers services in times of peace and of war. Defence measures are prepared and held up to date in the entire territory. The civil defence service belongs to the responsibility of the Council of Ministers, and the deputy minister of defence is the head of services. The training schedules and principles are laid down by the Central Committee of the Communist Party, the government, and local party organisations and governmental authorities. Civil defence training is a general obligation for all citizens over 8 years of age. The main goal is: Protection of the population as the production force, of the economy, and resources. (orig.) [de

  7. GPS Civil Monitoring Performance Specification

    Science.gov (United States)

    2009-02-10

    This Civil Monitoring Performance Specification (CMPS) is published and maintained at : the direction of the Program Manager for Civil Applications, Global Positioning Systems : Wing (GPSW). The purpose of this document is to provide a comprehensive ...

  8. Re-thinking civil disobedience

    Directory of Open Access Journals (Sweden)

    Theresa Züger

    2013-11-01

    Full Text Available This article points out a struggle of today’s societies with the traditional concepts of civil disobedience and stresses the need for reevaluation of the concept of civil disobedience for policy making and public discourse. Starting with a minimal definition of civil disobedience, the article introduces Hannah Arendt’s approach for a legitimisation of civil disobedience and discusses her ideas for digital actions, which are increasingly framed as digital forms of civil disobedience. Addressing WikiLeaks as an example of digital civil disobedience, the author problematises the internal secrecy of WikiLeaks and the focus on Julian Assange as a single decision-maker. Both aspects challenge Arendt’s understanding of legitimate civil disobedience. Even though traditional criteria of civil disobedience need to be revisited in the digital age, organisations or disobedience actors might themselves in their actions be well-advised to comply with the principles they fight for.

  9. Civil Society Engagement in the Sulu Archipelago: Mobilizing Vibrant Networks to Win the Peace

    Science.gov (United States)

    2013-06-14

    The revolutions of 1989 in Eastern Europe revitalized the idea of civil society. In the collapse of communist states, civil society played a...Security 26, no. 1 (Summer): 93-128. Arrow, Ruaridh. 2011. How to start a revolution. iTunes APP and Documentary. Produced by The Project Factory and

  10. Croatian Civil-Military Reform and Its Impact on NATO Membership

    National Research Council Canada - National Science Library

    Donahoe, John

    2003-01-01

    Croatia emerged from war in the mid- 1990s to embark on a path of accession to Euro-Atlantic institutions, The present thesis examines the connections between civil military and security sector reform...

  11. 32 CFR 632.4 - Deadly force.

    Science.gov (United States)

    2010-07-01

    ..., is substantially important to national security. (See paragraph (b) of this section.) (iii) Escape of... security or an essential national defense mission. (2) Substantially important to national security based... INVESTIGATIONS USE OF FORCE BY PERSONNEL ENGAGED IN LAW ENFORCEMENT AND SECURITY DUTIES § 632.4 Deadly force. (a...

  12. 77 FR 55175 - Civil Penalties

    Science.gov (United States)

    2012-09-07

    ... [Docket No. NHTSA-2012-0131; Notice 1] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations of motor vehicle safety requirements... and consumer information provisions. Specifically, this proposes increases in maximum civil penalty...

  13. 75 FR 79978 - Civil Penalties

    Science.gov (United States)

    2010-12-21

    ... [Docket No. NHTSA-2010-0114; Notice 2] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for related series of violations of the National Traffic and Motor Vehicle Safety... Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as amended by the Debt Collection...

  14. 75 FR 5244 - Civil Penalties

    Science.gov (United States)

    2010-02-02

    ... [Docket No. NHTSA-2009-0066; Notice 2] RIN 2127-AK40 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements involving school buses, bumper... theft protection requirements. This action is taken pursuant to the Federal Civil Monetary Penalty...

  15. 77 FR 70710 - Civil Penalties

    Science.gov (United States)

    2012-11-27

    ... [Docket No. NHTSA-2012-0131; Notice 2] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements for the National Traffic and... provisions. Specifically, this increases the maximum civil penalty amounts for single violations of motor...

  16. 75 FR 49879 - Civil Penalties

    Science.gov (United States)

    2010-08-16

    ... [Docket No. NHTSA-2010-0114; Notice 1] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations covering a related series of... action would be taken pursuant to the Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as...

  17. SOUTH AFRICA AND THE SADC STAND-BY FORCE

    African Journals Online (AJOL)

    hennie

    Such institutions depict the power relations prevailing at .... ministers responsible for foreign affairs, defence, public security and state security from each ...... 15 Force-to-force ratios measure how big an international force has to be to balance.

  18. Force Protection Common Operational Picture/Common Tactical Picture

    National Research Council Canada - National Science Library

    Peter, Russell

    1998-01-01

    ... has taken an integrated approach to Force Protection. There is a recognition that Force Protection is not a Security Police operation; but is a Security Force oDeration. This exemplifies a mindset change and a movement away from pure.

  19. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  20. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  1. Departamento de Obras Civiles

    Directory of Open Access Journals (Sweden)

    Director Departamento de Obras Civiles

    1984-12-01

    Full Text Available Es la unidad académica que se crea como estructura básica para la formación profesional del Constructor Civil. El departamento está orientado a las siguientes áreas: Obras Viales, Fluviales y Marítimas; Hormigones y Mecánica de Suelos; Laboratorios y Control de Calidad; Planificación y Programación; Administración; Organización y Gestión Financiera, conocimientos insertos en un total de 33 asignaturas, prácticas y seminarios siendo equivalentes a más de 100 créditos, lo cual representa un 42% del total de las asignaturas correspondientes al Plan de Estudios de la Carrera de Construcción Civil.

  2. Insolvencias. Civil y societaria

    Directory of Open Access Journals (Sweden)

    Gustavo Bordes Leone

    2014-01-01

    Full Text Available El deudor civil que, para substraerse al pago de sus obligaciones, ocultara sus bienes, simulara enajenaciones o créditos, se trasladara al extranjero o se ocultare sin dejar persona que lo represente, o bienes a la vista en cantidad suficiente para responder al pago de sus deudas, será castigado con pena de tres meses de prisión a tres años de penitenciaría. La acción penal no podrá ser ejercitada sino a denuncia de parte, y sólo en el caso de que la insolvencia del deudor resulte comprobada por actos infructuosos de ejecución en la vía civil.Antecedentes históricas. La insolvencia fraudulenta. Insolvencia societaria fraudulenta: Análisis crítico.

  3. What DoD Homeland Security Roles Should the National Guard Fulfill during This Time of Persistent Conflict?

    Science.gov (United States)

    2010-06-11

    JFHQ Joint Forces Headquarters JFHQ-State Joint Forces Headquarters-State JTF Joint Task Force MACA Military Assistance for Civil Authorities...continuously uses defense support for civil authorities (DSCA) and military assistance for civil authorities ( MACA ) interchangeably with the term

  4. [Viruses and civilization].

    Science.gov (United States)

    Chastel, C

    1999-01-01

    A few million years ago, when primates moved from the east African forest to the savannah, they were already infected with endogenous viruses and occultly transmitted them to the prime Homo species. However it was much later with the building of the first large cities in Mesopotamia that interhuman viral transmission began in earnest. Spreading was further enhanced with the organization of the Egyptian, Greek, Roman, and Arab empires around the Mediterranean. Discovery of the New World in 1492 led to an unprecedented clash of civilizations and the destruction of pre-Columbian Indian civilizations. It also led to a rapid spread of viruses across the Atlantic Ocean with the emergence of yellow fever and appearance of smallpox and measles throughout the world. However the greatest opportunities for worldwide viral development have been created by our present, modern civilization. This fact is illustrated by epidemic outbreaks of human immunodeficiency virus, Venezuela hemorrhagic fever, Rift valley fever virus, and monkey pox virus. Close analysis underscores the major role of human intervention in producing these events.

  5. Effects of Security actions

    Science.gov (United States)

    Bergman, Ramona; Andersson-Sköld, Yvonne; Nyberg, Lars; Johansson, Magnus

    2010-05-01

    In a project funded by the Swedish Civil Contingencies Agency, the effort and work to reduce different kinds of accidents are being evaluated. The project wants to illuminate the links between actions and outcome, so we can learn from today's performance and in the future select more effective measures and overall deal with accidents more efficiently. The project ESS covers the field of frequent accidents such as sliding accidents at home, in house fires and less common accidents such as chemical and land fill accidents up to even more rare accidents such as natural accidents and hazards. In the ESS project SGI (Swedish geotechnical institute) will evaluate the work and effort concerning various natural hazards limited to landslides, erosion and flooding. The aim is to investigate how municipalities handle, especially prevention, of such natural disasters today. The project includes several aspects such as: • which are the driving forces for risk analysis in a municipality • do one use risk mapping (and what type) in municipal risk analysis • which aspects are most important when selecting preventive measures • in which way do one learn from past accidents • and from previous accidents elsewhere, by for example use existing databases • etc There are many aspects that play a role in a well-functioning safety promotion work. The overall goal is to examine present work and activities, highlight what is well functioning and identify weak points. The aim is to find out where more resources are needed and give suggestions for a more efficient security work. This includes identification of the most efficient "tools" in use or needed. Such tools can be education, directives, funding, more easily available maps and information regarding previous accidents and preventive measures etc. The project will result in recommendations for more effective ways to deal with landslides, erosion and flooding. Since different kinds of problems can occur depending on level of

  6. Evaluating the Effectiveness of Waterside Security Alternatives for Force Protection of Navy Ships and Installations Using X3D Graphics and Agent-Based Simulation

    National Research Council Canada - National Science Library

    Sullivan, Patrick J

    2006-01-01

    The individuals charged with the task of planning, developing and implementing force protection measures both at the unit and installation level must consider numerous factors in formulating the best defensive posture...

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  9. The Idea to Promote the Development of E-Government in the Civil Aviation System

    Science.gov (United States)

    Renliang, Jiang

    E-government has a significant impact on the organizational structure, working mechanism, operating methods and behavior patterns of the civil aviation administration department.The purpose of this research is to find some countermeasures propelling the electronization, network and office automation of the civil aviation system.The method used in the study was field and literature research.The studies showed that government departments in the civil aviation system could promote the development of e-government further by promoting open administration and implementing democratic and scientific decision-making, strengthening the popularization of information technology and information technology training on civil servants, paying attention to the integration and sharing of information resources, formulating a standard e-government system for the civil aviation system, developing the legal security system for the e-government and strengthening the network security.

  10. Analysis of the Construction of Ecological Civilization in the Western Ethnic Areas

    Institute of Scientific and Technical Information of China (English)

    Wang Yongli

    2017-01-01

    Ecological civilization is a mode of civilization which is constructed on the concept of multiple-wins, such as economic benefit, social benefit and environmental benefit, etc. It requires that a harmonious relationship between man and nature permeate various aspects of civilization, such as material civilization, spiritual civilization, and political civilization, forming an ecological mode for production, living, consumption, and other behaviors. The theories and practices of eco ̄logical civilization both at home and abroad, as well as the strategic planning for the construction of ecological civilization in China, have constituted important theoretical and practical guidelines for the construction of ecological civilization in the western ethnic areas of China. Constructing ecological civilization in the western ethnic areas has important theoretical and practical significance. Compared with the eastern part of China or the whole country, the level of e ̄conomic and social development in the western eth ̄nic areas still lags behind; energy consumption is generally high , and the number of national key ecologically functional areas is large. Furthermore, these areas face a daunting task for their environ ̄mental protection and energy saving. In addition, the most concentrated areas of desertification in China are found in the western ethnic areas, espe ̄cially Xinjiang, Inner Mongolia, Tibet and Qing ̄hai. Therefore, the construction of ecological civi ̄lization in the western ethnic areas has an impor ̄tant role for the sustainable development of the e ̄conomy and society, ecological security, energy saving and emission reduction, and the prevention of land desertification. Generally speaking, the western ethnic areas actively participate in the national demonstration areas of the construction of ecological civilization, and constantly improve the level of ecological civi ̄lization construction. However, their overall level is low, and the

  11. The Civil War Diet

    OpenAIRE

    Brennan, Matthew Philip

    2005-01-01

    The soldierâ s diet in the Civil War has been known as poor, and a number of illnesses and disorders have been associated with it. However, a nutritional analysis placed within the context of mid-nineteenth century American nutrition has been lacking. Such an approach makes clear the connection between illness and diet during the war for the average soldier and defines the importance of nutritionâ s role in the war. It also provides a bridge from the American diet to the soldier diet, ou...

  12. Transnationalising Civil Society?

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    The paper takes a transnational perspective on developing an analytical framework for understanding how transnationalism interacts with civil society and how immigrant organisations use transnational strategies to challenge the pre-given positions of immigrants within given integration......- and citizenship-regimes. Locating transnationalism as part of the political opportunity structure also indicates that the state(s) to some degree can facilitate transnationalism, directly and indirectly. A substantial part of political engagement now occurs via transnational channels. What is uncertain is to what...

  13. 14 CFR 1203b.106 - Use of deadly force.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Use of deadly force. 1203b.106 Section... AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.106 Use of deadly force. Deadly force shall be used only in those circumstances where the security force officer reasonably believes that...

  14. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  15. Zaštita računarskih mreža Ministarstva odbrane i Vojske Srbije primenom virtuelnog honeyneta / Security of computer network of the Ministry of Defence and the Serbian Armed Forces using virtual honeynets

    Directory of Open Access Journals (Sweden)

    Zoran Bobar

    2009-07-01

    Full Text Available U ovom radu obrađena je zaštita računarskih mreža u Ministarstvu odbrane i Vojsci Srbije primenom virtuelnog honeyneta. Zaštita je obrađena sa aspekta arhitekture računarskih mreža koje imaju pristup internetu. Predloženi koncept primene virtuelnog honeyneta uzima u obzir dostignuća nauke u ovoj oblasti u svetu, ostale primenjene metode i tehnike zaštite, mogućnosti i potrebe korisnika i elemente delova računarskog sistema Ministarstva odbrane i Vojske koji bi mogli biti meta napada sa udaljenih mesta globalne (internet mreže. / This paper covers the proposed solution for security of computer network in the Ministry of Defence and the Serbian Armed Forces using virtual honeynets. The security is covered from the aspect of the architecture of computer networks with Internet access. The proposed usage of virtual honeynets for protection takes into account the accomplishments of science in this field as well as security methods and techniques, users' needs and opportunities along with the computer network components of the MoD and the SAF that can be targets for attack.

  16. Strategic Studies Quarterly. An Air Force-Sponsored Strategic Forum on National and International Security. Winter 2009. Volume 3, Number 4

    Science.gov (United States)

    2009-01-01

    by George Shultz, William Perry, Henry Kissinger, and Sam Nunn. These seasoned policy experts shocked many with their advocacy of a “world free of...NY: Kennikat Press, 1956); Alexander George and Richard Smoke , Deterrence in American Foreign Policy: Theory and Practice (New York: Columbia...practiced abstinence in defense and security policy matters through the end of the 1990s—and why development of ESDP has proceeded only sluggishly since

  17. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    specific climatic challenge or clean the air. With nanotechnology, the artificial and the natural move closer together; this is the perspective for civil engineer Chris McCarthy’s work all over the world. And what is new is not just the way the construction materials are put together; they also require......Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...

  18. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...... theme in twentieth century architecture. Together, civil engineer Peter Rice and architect Ian Ritchie created a paradigm shift with their revolutionary ideas for glass facades supported by cables. Glued and bolted constructions made entirely of glass are now a reality in small-scale projects, yet...

  19. How persistent is civilization growth?

    OpenAIRE

    Garrett, Timothy J.

    2011-01-01

    In a recent study (Garrett, 2011), I described theoretical arguments and empirical evidence showing how civilization evolution might be considered from a purely physical basis. One implication is that civilization exhibits the property of persistence in its growth. Here, this argument is elaborated further, and specific near-term forecasts are provided for key economic variables and anthropogenic CO2 emission rates at global scales. Absent some external shock, civilization wealth, energy cons...

  20. The role of civil society in conflict resolution in the Democratic ...

    African Journals Online (AJOL)

    Civil society organisations were directly involved in both the peace process and the subsequent transitional dispensation designed to resolve the conf lict, providing some sort of popular legitimacy to these two processes clearly dominated by politico-military forces. The central argument of this article is that while civil society ...

  1. Civil society organizations' roles in health development in Vietnam: HIV as a case study

    NARCIS (Netherlands)

    Hoang, T.A.

    2013-01-01

    Civil society in contemporary Vietnam has been recognised as an important force in public health. Based on qualitative interviews and observations of 30 organisations and networks in Hanoi and Ho Chi Minh City, this paper argues that civil society organisations (CSOs) focus almost exclusively on

  2. 东北老工业区生态安全动态演变过程及驱动力%Dynamic evolution and driving forces of ecological security in the Traditional Industrial Area of northeastern China

    Institute of Scientific and Technical Information of China (English)

    唐呈瑞; 逯承鹏; 杨青; 姜璐; 任婉侠; 薛冰

    2017-01-01

    Ecological security is as important as national,economic,and financial security and has become the main constraint of future socio-economic security.The Traditional Industrial Area of northeastern China is an important traditional industrial and grain production base of China,and its ecological security is related to the implementation of sustainable development strategies.Based on the emergy-ecological footprint model,the ecological security in Traditional Industrial Area of northeastern China was quantitatively evaluated from 2000 to 2014,followed by a scenario analysis on the driving forces of the ecological security using a principal component analysis method.The results showed that,the value of emergy ecological-capacity per capita decreased from 0.66 to 0.64 hm2/cap,whereas the emergy-ecological footprint increased from 10.58 to 19.85 hm2/cap,which indicated that an ecological deficit existed in the Traditional Industrial Area of northeastern China.The ecological pressure in this area increased,showing an unsustainable development trend from 2000 to 2014.The ecological pressure index and ecological security levels gradually increasing,ecological security situation is deteriorating,ecological security issues to be urgent resolved.The ecological stress tended to be serious as a result of a combination of several factors,such as social,economic,population,resource,environmental,technological level,and land use degree.Finally,effective management strategies and suggestions to improve the ecological security of the Traditional Industrial Area of northeastern China were proposed.%生态安全与国防安全、经济安全、金融安全等已具有同等重要的战略地位,并成为未来经济社会安全的主要约束.东北老工业区作为我国重要的老工业基地及粮食生产基地,其生态安全状况关系着中国可持续发展战略的实施.采用能值-生态足迹模型,对东北老工业区2000-2014年生态安全动态演变过程进行

  3. An Operational Utility Assessment: Measuring the Effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)

    Science.gov (United States)

    2008-12-01

    time- on-task in deploying a patrol force, for example. In its most basic form, an FOB consists of a ring of barbed wire around a position with a...Modernizing The Marine Corps’ CH- 53 Super Stallion Helicopter,” Thesis, NPS (December 2001). HIGH LEVEL OF IMPORTANCE LOW 62 TASKS

  4. Vienna convention on civil liability for nuclear damage

    International Nuclear Information System (INIS)

    1996-01-01

    The Vienna Convention on Civil Liability for Nuclear Damage was adopted on 21 May 1963 and was opened for signature on the same day. It entered into force on 12 November 1977, i.e. three months after the date of deposit with the Director General of the fifth instrument of ratification, in accordance with Article 23

  5. Vienna convention on civil liability for nuclear damage

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-20

    The Vienna Convention on Civil Liability for Nuclear Damage was adopted on 21 May 1963 and was opened for signature on the same day. It entered into force on 12 November 1977, i.e. three months after the date of deposit with the Director General of the fifth instrument of ratification, in accordance with Article 23.

  6. Kingdom, church and civil society: A theological paradigm for civil ...

    African Journals Online (AJOL)

    This article deals with the role that churches can and should play in civil society to develop societal morally. The central-theoretical argument is that the biblical notion of the kingdom of God can, when it is systematically and theologically developed, offer an acceptable foundation for the civil action of churches. In light of this ...

  7. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  8. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  9. 21 CFR 1404.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Civil judgment. 1404.920 Section 1404.920 Food and...) Definitions § 1404.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  10. 22 CFR 208.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil judgment. 208.920 Section 208.920 Foreign...) Definitions § 208.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  11. 34 CFR 85.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Civil judgment. 85.920 Section 85.920 Education Office...) Definitions § 85.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  12. 28 CFR 31.202 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Civil rights. 31.202 Section 31.202....202 Civil rights. (a) To carry out the State's Federal civil rights responsibilities the plan must: (1) Designate a civil rights contact person who has lead responsibility in insuring that all applicable civil...

  13. 2 CFR 180.915 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Civil judgment. 180.915 Section 180.915... § 180.915 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  14. 22 CFR 1006.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1006.920 Section 1006.920...) Definitions § 1006.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  15. 22 CFR 1508.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1508.920 Section 1508.920...) Definitions § 1508.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  16. Social Security, Cash Payments and Awards to Servicemen of the Red Army Air Force in the Great Patriotic War of 1941–1945

    Directory of Open Access Journals (Sweden)

    Alexander P. Abramov

    2016-07-01

    Full Text Available On the basis of the historical and sociological material presented materials about the Soviet state measures during the Great Patriotic War for the implementation of social policy in respect of the military air force of the Red Army, expressed in monetary incentives, rewards and social guarantees. The author notes that the implementation of social management practices at each stage of warfare timely adjustments depending on acquired combat experience and the strategic objectives of war. Existing wartime monetary awards system and social guarantees in respect of the personnel of the Red Army Air Force was not a major, but significant moral incentive for both pilots, as for representatives of other arms and services.

  17. The paradox of civilizing

    DEFF Research Database (Denmark)

    Gilliam, Laura

    As in most other European Countries, immigrants from “non-Western” countries are increasingly perceived as a threat to integration, equality and harmony in Danish society. Especially the immigrant boys are depicted as aggressive, troublesome and in lack of social competencies. This makes this group...... minority youngsters, which are seen as a threat to the stability and harmony of Danish society. Based on ethnographic material from 11 months of fieldwork among ethnic minority pupils in two schools in Copenhagen, this paper will look into the schools’ effort to civilize youth of outsider status. Through....... For their part, the boys - in search of alternative strength and recognition - invert the image of good behavior presented to them by the school, and come to identify strongly with aggression, rude language and tough masculinity. Drawing on Elias’ discussions of dominant group’s efforts to both integrate...

  18. Departamento de Obras Civiles

    OpenAIRE

    Director Departamento de Obras Civiles

    1984-01-01

    Es la unidad académica que se crea como estructura básica para la formación profesional del Constructor Civil. El departamento está orientado a las siguientes áreas: Obras Viales, Fluviales y Marítimas; Hormigones y Mecánica de Suelos; Laboratorios y Control de Calidad; Planificación y Programación; Administración; Organización y Gestión Financiera, conocimientos insertos en un total de 33 asignaturas, prácticas y seminarios siendo equivalentes a más de 100 créditos, lo cual representa un 42%...

  19. Journal of Civil Engineering, JKUAT

    African Journals Online (AJOL)

    The Journal of Civil Engineering, JKUAT aims to publish definitive and original research papers of high standard, containing material of broad interest and of significant contribution to civil engineering, with emphasis being placed on material that is applicable to the solution of practical problems. It provides a forum for ...

  20. Civil works for NPPs construction

    International Nuclear Information System (INIS)

    Portenseigne, Christophe

    2014-01-01

    Christophe Portenseigne, Technical Director of Bouygues Travaux Publics, provided explanations on the main challenges of Civil work for the construction of the 3. generation of NPPs. He then provided an overview of the new Civil Work concepts for the 4. generation of NPPs

  1. Environmental Ethics and Civil Engineering.

    Science.gov (United States)

    Vesilind, P. Aarne

    1987-01-01

    Traces the development of the civil engineering code of ethics. Points out that the code does have an enforceable provision that addresses the engineer's responsibility toward the environment. Suggests revisions to the code to accommodate the environmental impacts of civil engineering. (TW)

  2. Civil Engineering Technology Needs Assessment.

    Science.gov (United States)

    Oakland Community Coll., Farmington, MI. Office of Institutional Planning and Analysis.

    In 1991, a study was conducted by Oakland Community College (OCC) to evaluate the need for a proposed Civil Engineering Technology program. An initial examination of the literature focused on industry needs and the job market for civil engineering technicians. In order to gather information on local area employers' hiring practices and needs, a…

  3. Sustainability issues in civil engineering

    CERN Document Server

    Saride, Sireesh; Basha, B

    2017-01-01

    This compilation on sustainability issues in civil engineering comprises contributions from international experts who have been working in the area of sustainability in civil engineering. Many of the contributions have been presented as keynote lectures at the International Conference on Sustainable Civil Infrastructure (ICSCI) held in Hyderabad, India. The book has been divided into core themes of Sustainable Transportation Systems, Sustainable Geosystems, Sustainable Environmental and Water Resources and Sustainable Structural Systems. Use of sustainability principles in engineering has become an important component of the process of design and in this context, design and analysis approaches in civil engineering are being reexamined to incorporate the principles of sustainable designs and construction in practice. Developing economies are on the threshold of rapid infrastructure growth and there is a need to compile the developments in various branches of civil engineering and highlight the issues. It is th...

  4. Salazar et la guerre civile espagnole

    Directory of Open Access Journals (Sweden)

    Gonçalves Cécile

    2011-07-01

    Full Text Available The Spanish Question determined the foreign policy of Salazar’s regime between February 1936 and March 1939. Because of ideological affinity and fear of red contamination, Salazar decides to bring his support to the Franco’s Spain during the Civil War. However, the luso-british alliance, the leader of the Estado Novo knew indispensable to the preservation of the Portuguese colonial empire against the aggressive expansionism of the axis, did not go ahead hinder efforts the Estado Novo in Spain to promote the establishment of an authoritarian and nationalistic like hers and who no longer represent a threat to its survival. 20 000 Portuguese officially volunteers, the Viriatos, would fight alongside Franco against the Republic. After the victory of nationalist forces against loyal forces to the Republic, Salazar exclaimed from São Bento: « We won! ».

  5. Individual Decisions to Migrate During Civil Conflict

    Science.gov (United States)

    Bohra-Mishra, Pratikshya; Massey, Douglas S.

    2012-01-01

    The existing literature on forced migration limits our understanding of how violence affects migration to competing destinations. This article adds to the literature on forced migration by studying how armed violence during a period of civil conflict in south-central Nepal influenced the likelihood of local, internal, and international migration. We find that violence has a nonlinear effect on migration, such that low to moderate levels of violence reduce the odds of movement, but when violence reaches high levels, the odds of movement increase. We also find that the effect of violence on mobility increases as the distance of the move increases. When we consider the influence of violence on microlevel decision-making, we find that the effects of individual and household-level determinants were mostly consistent with hypotheses derived from contemporary theories of voluntary migration and that no predictor of migration influenced the decision to migrate differently in the presence of violence. PMID:21541805

  6. The future of the French civil nuclear sector. Report synthesis

    International Nuclear Information System (INIS)

    2010-01-01

    Considering the evolution of the French civil nuclear industry by 2030, this study examines its different dimensions: energy policy, safety and security of uranium supplies, nuclear competitiveness, environmental and safety issues, public acceptance, consequences of non proliferation international and French policies, industrial, human and research capacities, and so on. Thus, this report presents the actors involved in the French civil nuclear sector, gives an overview of the reactor market, highlights the main aspects of the fuel cycle and of the waste management, stresses the need of a new organisation for this sector to face the domestic as well as the international challenges. It discusses the possible ways for a wider financing and a higher competitiveness. It identifies new means for an ambitious civil nuclear policy. Fifteen recommendations are proposed

  7. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  8. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  9. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  10. Lineage of global civil engineering. Global civil engineering no keifu

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, M

    1994-04-15

    This paper considers which way the global civil engineering should go in the future. Civil engineering has now a paradigm with a new dimension debuted as the global environmental problems are taken up specifically. Achieving the target of civil engineering requires a critical review that how the cost effect and efficiency discussions in only the dimensions of the conventional technologies and economies can be incorporated into the dimensions and measures of new fields to create the new horizons. Conceiving the relationship between civil engineered structures and environmental climate encounters the indispensable judgment criterion on how such social scientific conditions as weather, culture, religion, economy, and politics are combined to reach a judgment. The global civil engineering is desired to have the ideas and directional role to work on the ultimate assignment of environment and development called a global environmental problem analytically, comprehensively, innovatively and creatively as the civil engineering science, rather than as a mere existence of one area of the advanced civil engineering science. 5 refs., 1 tab.

  11. Evaluating Options for Civil Space Situational Awareness (SSA)

    Science.gov (United States)

    Lal, B.; Carioscia, S. A.

    In recent years, the number of active satellites and human-made orbital space debris has increased dramatically. An expansion of activities in space, as is currently being proposed by many commercial and international entities, is expected to further exacerbate this challenge. The 18th Space Control Squadron under the Department of Defense (DOD) United States Strategic Command provides space situational awareness (SSA) services to users outside the national security community at no cost. International and commercial users demand better SSA service than is currently feasible, and the demand comes at a time when DOD is under pressure to better prepare for and respond to growing space-based threats to national security. Concerned about the possibility of overextending across conflicting missions in a fiscally constrained environment, some DOD officials have publicly noted a desire to move SSA services not related to national security out of DOD purview. Responding to a request from the Federal Aviation Administration (FAA) Office of Commercial Space Transportation (AST), researchers at the Science and Technology Policy Institute (STPI) identified and evaluated potential approaches for providing SSA services for civil and commercial operations in space. In this paper, we summarize the report [1] and present the pros and cons of four approaches to the provision of civil SSA services in the United States: (1) maintaining status quo through continued provision by DOD; (2) provision by a civil government entity; (3) industry self-provision; and (4) provision by an international organization. Within the second approach, assuming the provision of SSA by a civil agency, STPI further identified and discussed four options: (1) civil agency service capability embedded within DOD; (2) independent civil service capability, using DOD software and systems; (3) independent civil service capability, using commercial software and systems; and (4) the government certifies non

  12. Humanization of the civil service in the context of the European integration of Ukraine

    Directory of Open Access Journals (Sweden)

    O. A. Lyndyuk

    2017-03-01

    Full Text Available European integration of Ukraine requires new philosophy of governance modernization and organization, an effective functioning of the civil service system. The urgency of the implementation of humanization approach is a priority for modernization of the national civil service system. The problem of humanization of the civil service in the context of the European integration of Ukraine has been studied in the article. The essence of concepts of «humanism» and «humanization of the civil service» has been considered. Humanism is understood as reflected anthropocentrism, with the human being the object with the highest value. The term «humanization of the civil service» means a deliberate reorientation of the civil service and its objects to recognize a human as an absolute value, «a measure of all things» and to meet the vital needs of society, creating conditions for its full self-realization and ensuring sustainable human development. The civil service must guarantee the security and stability of life and protect rights, freedoms and interests of each individual. Humanization of civil service is also determined as strengthening the rights and freedoms of civil servants, special protection of their dignity and the formation of new humanistic principles of civil service. The features of humanization of the national civil service have been analyzed. It has been found that the human is considered to be the highest value and the content and direction of civil servants activity is determined by ensuring his rights and freedoms. The necessity of changing the priorities of civil service modernization on the basis of humanization, orientation on meeting the needs of human and citizen, as well as creating conditions for closer implementation of national civil service standards to those used in the European Union has been proved. Changes in the philosophy of the civil service of Ukraine should be directed to «serving people», functioning of

  13. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  14. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  15. Securing Failed Inner-City Communities: The Military's Role

    National Research Council Canada - National Science Library

    Khan, Oral

    1997-01-01

    .... Civil authorities were found to be in breach of the social contract which required that, in return for the loyalty of citizens, they would provide that important social good--security--in accordance...

  16. Forced Dependency and Legal Barriers: Implications of the UK’s Immigration and Social Security Policies for Minoritized Women Living in Abusive Intimate Relationships in Northern Ireland

    Directory of Open Access Journals (Sweden)

    Monica McWilliams

    2015-12-01

    Full Text Available This paper examines the complexities of the help-seeking process of minoritized women (primarily asylum-seekers and immigrants experiencing domestic violence in Northern Ireland. The term ‘minoritized’ is used here to emphasize that “minority” status is not a static or innate trait of certain groups but instead is the outcome of a process of being positioned as a minority. The paper addresses the intersections of ethnicity, nationality, class and gender and shows how state policies in relation to immigration and social security reinforce inequalities in gendered power relations. Despite attempts to improve the social security and immigration systems, the findings from a Northern Ireland study show how recent policy changes have not addressed the systemic institutional racism and institutionalised patriarchy in these agencies. Where avenues for action are undermined by such practices, the policies raise concerns about the safety and protection of minoritized women living in abusive relationships. We argue that the UK is failing to meet its human rights responsibilities to provide adequate support and assistance to minoritized women in abusive relationships and conclude that delivering state accountability alongside a human rights framework based on security, autonomy, liberty and equality is what is needed. Este artículo analiza las complejidades del proceso de búsqueda de ayuda en Irlanda del Norte para mujeres pertenecientes a minorías (principalmente solicitantes de asilo e inmigrantes que sufren violencia doméstica. El término 'minoritarizadas' se utiliza aquí para hacer hincapié en que la situación de "minoría" no es un rasgo estático o innato de ciertos grupos, sino que es el resultado de un proceso de ser posicionado como una minoría. El artículo aborda las intersecciones de origen étnico, nacionalidad, clase y género y muestra cómo las políticas estatales en relación a la inmigración y la seguridad social

  17. Material civilization: things and society.

    Science.gov (United States)

    Dant, Tim

    2006-06-01

    This paper argues that although classical sociology has largely overlooked the importance of social relations with the material world in shaping the form of society, Braudel's concept of 'material civilization' is a useful way to begin to understand the sociological significance of this relationship. The limitations of Braudel's historical and general concept can be partially overcome with Elias's analysis of the connection between 'technization' and 'civilization' that allows for both a civilizing and a de-civilizing impact of emergent forms of material relation that both lengthen and shorten the chains of interdependence between the members of a society. It is suggested that the concept of the 'morality of things' employed by a number of commentators is useful in summarizing the civilizing effects of material objects and addressing their sociological significance. From the sociology of consumption the idea of materiality as a sign of social relationships can be drawn, and from the sociology of technology the idea of socio-technical systems and actor-networks can contribute to the understanding of material civilization. It is argued that the concept of 'material capital' can usefully summarize the variable social value of objects but to understand the complexity of material civilization as it unfolds in everyday life, an analysis of 'material interaction' is needed. Finally the paper suggests some initial themes and issues apparent in contemporary society that the sociological study of material civilization might address; the increased volume, functional complexity and material specificity of objects and the increased social complexity, autonomy and substitutability that is entailed. A theory of 'material civilization' is the first step in establishing a sociology of objects.

  18. Inter-organisational communication in civil-military cooperation during complex emergencies: a case study in Afghanistan.

    Science.gov (United States)

    Rietjens, Sebastiaan J H; Verlaan, Kirsten; Zaalberg, Thijs W Brocades; de Boer, Sirp J

    2009-07-01

    This paper seeks to contribute to an improved information management and exchange between humanitarian organisations and military agents in complex emergencies. To do so, a theoretical information management process model was developed and applied to the case of information management between International Security Assistance Force troops and humanitarian organisations such as Cordaid, DACAAR and the International Office for Migration in Kabul, Afghanistan. Based on this analysis the main shortcomings and problems in each stage of the information management process were identified. These include a lack of structured information databases, the absence of identification of information needs, and an over-classification of documents by the military. Using a logical framework analysis, six major improvement tactics were developed, including the creation of more overlap in rotations of personnel, the specification of aims and tasks regarding information management, the improvement of skills and competences of personnel involved, and the introduction of regular joint civil-military evaluations.

  19. Julgamentos parciais no processo civil

    OpenAIRE

    Antonio Carlos Nachif Correia Filho

    2015-01-01

    Este trabalho trata fundamentalmente da admissibilidade dos julgamentos parciais do mérito e de questões de mérito no sistema processual civil brasileiro, considerando especialmente o modelo constitucional de processo civil, bem como no sistema processual prospectivo previsto no Projeto de Novo Código de Processo Civil, que deve entrar vigor em breve. Com este objetivo, será abordado no início da dissertação o dogma da unidade estrutural da sentença, sua origem, fundamentos e aplicabilidade n...

  20. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  1. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  2. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  3. Civil liability on nuclear activities; Responsabilidade civil nas atividades nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Bittar, C A

    1983-12-31

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs.

  4. Information report on the behalf of the foreign affairs, defence and armed forces Commission on France security, nuclear disarmament and non proliferation

    International Nuclear Information System (INIS)

    2010-01-01

    This report first gives an overview of nuclear disarmament and non proliferation twenty years after the end of Cold War: evolution and status of Russia's and United States' nuclear weapon arsenals, France's and United Kingdom's trend to reduce their nuclear armament, reinforcement of China's nuclear armament, effects and limitations of the Non Proliferation Treaty (NPT). It notices that the new international context gave birth to some expectations and may lead to a lower nuclear pressure, notably with the influence of START negotiations between Russia and the United States, provided that the Comprehensive Nuclear Test Ban Treaty is ratified by more countries, and that negotiations promote a Fissile Material Cut-off Treaty. The report also outlines the importance of the promotion of better controlled peaceful uses of nuclear energy. It discusses the relationship between maintaining the world nuclear order and the reduction of international and regional tensions, and the importance of struggle against all forms of proliferation. It analyses the French nuclear posture in terms of security requirements, and in front of the zero nuclear option, in a context of ballistic missile proliferation, and in relationship with the issue of tactical nuclear weapons in Europe

  5. Security analysis of optical encryption

    OpenAIRE

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-01-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  6. Security analysis of optical encryption

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-10-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  7. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  8. Civil Engineering Construction of Underground Works

    CERN Document Server

    Rammer, H

    1999-01-01

    For the first time at CERN, new shafts and caverns will be excavated inside a surface building. The LHC civil engineering construction for the ATLAS experiment has been designed such that the experimental hall will be completed to the extent that it can provide a secure, weatherproof and sound insulated covering to the shaft excavation area. The construction of the two access shafts and the experimental cavern will follow and will be carried out inside the building. This unconventional method of working allows the excavation of the Molasse rock in the dry, which is essential for this type of rock, and ensures reduced environmental pollution by noise and dust. The paper will present the technical infrastructure required for this particular construction method, explain its advantages and disadvantages, and compare it with a conventional method of underground excavations to be used on the same work site for the construction of the service cavern.

  9. Strategic Culture and Energy Security Policy of South Korea: The Case of Nuclear Energy

    International Nuclear Information System (INIS)

    Kim, Taehyun

    2012-01-01

    The U. S. - ROK Civil Nuclear Cooperation Agreement highlights the dilemma of contemporary international non-proliferation regime. Non-Proliferation Treaty has represented an awkward balance between the ideal of nuclear energy and the reality of nuclear weapons. It is neither complete nor effective. It is not complete because it does not cover all the issues with respect to nuclear energy, which have become increasingly complex. Nuclear security, for example, is not an issue that it addresses, and it is precisely why President Obama called for the unprecedented Nuclear Security Summit. It is not effective. It has failed in preventing proliferation of nuclear weapons states, India, Israel, Pakistan and North Korea, who remain outside of the regime. An international regime is defined as 'a set of principles, norms, rules, and decision-procedures around which actors' expectations converge. The extents to which actors' expectations converge and forceful measures in the name of international community against any violation are justified will measure its effectiveness. NPT regime is sub-par on that. The world is in dire need of a comprehensive and integrated regime for nuclear energy regime, where proliferation, security, and safety concern are effectively addressed. South Korea, if it truly wants to become a key player in the field, has to be one of its architects. The ability to meet the challenge of revising Civil Nuclear Cooperation Agreement will show if it is a qualified architect

  10. Strategies for the safeguarding of civil rights in the age of plutonium

    International Nuclear Information System (INIS)

    Narr, W.D.

    1984-01-01

    This contribution examines our age from the point of view of 'safeguarding' civil rights. The author discusses the concept of privacy and the conditions in industrial establishments which, in this context, are described as areas where the validity of civil rights is interrupted or diluted, and shows that the number of spheres of life where civil rights loose in validity are increasing, as e.g. research centres, and power generating industrial plants. The current concept of risk acceptance and security is discussed as well as the possibility and necessity to safeguard civil rights. The author concludes that security in the social meaning cannot be achieved by establishing a more or less rigid surveillance system. (orig./HSCH) [de

  11. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  12. Radiation protection in civil defence

    International Nuclear Information System (INIS)

    Ahlborn, K.

    The brochure contains the information given to the participants of an advanced training course in civil defence, on the subject of radiation protection. The course was held by teachers of Bundesverband fuer den Selbstschutz (BVS). (orig.) [de

  13. Teaching Mathematics to Civil Engineers

    Science.gov (United States)

    Sharp, J. J.; Moore, E.

    1977-01-01

    This paper outlines a technique for teaching a rigorous course in calculus and differential equations which stresses applicability of the mathematics to problems in civil engineering. The method involves integration of subject matter and team teaching. (SD)

  14. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  15. Algeria: An Uncivilized Civil War

    National Research Council Canada - National Science Library

    Robling, Terry

    1995-01-01

    .... Moderates on both sides are seeking peace from the undeclared civil war that resulted when the military-backed regime canceled elections that Islamic fundamentalists were certain to win in 1992...

  16. Civil liability on nuclear activities

    International Nuclear Information System (INIS)

    Bittar, C.A.

    1982-01-01

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs

  17. L'union fait la force : des universités africaines se regroupent pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2 févr. 2011 ... Civil society must get up to speed on cyber security, watchdog warns. A Canadian Internet watchdog that recently helped uncover a vast suspected cybe. View moreCivil society must get up to speed on cyber security, watchdog warns ...

  18. Common Operating Picture: UAV Security Study

    Science.gov (United States)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  19. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  20. 30 CFR 947.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 947.845 Section 947.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE WASHINGTON § 947.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  1. 30 CFR 941.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 941.845 Section 941.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE SOUTH DAKOTA § 941.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  2. 30 CFR 912.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 912.845 Section 912.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE IDAHO § 912.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  3. 30 CFR 921.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 921.845 Section 921.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MASSACHUSETTS § 921.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  4. 30 CFR 939.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 939.845 Section 939.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE RHODE ISLAND § 939.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  5. 30 CFR 937.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 937.845 Section 937.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE OREGON § 937.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  6. 30 CFR 942.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 942.845 Section 942.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE TENNESSEE § 942.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  7. 30 CFR 903.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 903.845 Section 903.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE ARIZONA § 903.845 Civil penalties. Part 845 of this chapter, Civil Penalties, applies to the assessment of civil penalties for violations...

  8. 30 CFR 910.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 910.845 Section 910.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE GEORGIA § 910.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  9. 30 CFR 922.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 922.845 Section 922.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MICHIGAN § 922.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  10. 30 CFR 933.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 933.845 Section 933.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE NORTH CAROLINA § 933.845 Civil penalties. Part 845 of this chaper, Civil Penalties, shall apply when civil penalties are assessed for...

  11. 30 CFR 905.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 905.845 Section 905.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE CALIFORNIA § 905.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  12. 5 CFR 919.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Civil judgment. 919.920 Section 919.920 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 919.920 Civil judgment. Civil judgment...

  13. 29 CFR 98.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Civil judgment. 98.920 Section 98.920 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction...

  14. 7 CFR 3017.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil judgment. 3017.920 Section 3017.920 Agriculture... AGRICULTURE GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 3017.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether...

  15. 14 CFR 1274.924 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil rights. 1274.924 Section 1274.924... FIRMS Other Provisions and Special Conditions § 1274.924 Civil rights. Civil Rights July 2002 Work on NASA cooperative agreements is subject to the provisions of Title VI of the Civil Rights Act of 1964...

  16. 29 CFR 1471.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Civil judgment. 1471.920 Section 1471.920 Labor Regulations... SUSPENSION (NONPROCUREMENT) Definitions § 1471.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  17. 31 CFR 19.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil judgment. 19.920 Section 19.920... SUSPENSION (NONPROCUREMENT) Definitions § 19.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  18. Communication Needs of Thai Civil Engineering Students

    Science.gov (United States)

    Kaewpet, Chamnong

    2009-01-01

    This article reports on an examination of the communication needs of a group of Thai civil engineering students. Twenty-five stakeholders helped identify the communication needs of the students by participating in individual interviews. These included employers, civil engineers, civil engineering lecturers, ex-civil engineering students of the…

  19. RELEVANT ISSUES CONCERNING THE RELOCATION OF CIVIL PROCEEDINGS UNDER THE NEW CODE OF CIVIL PROCEDURE (NCPC

    Directory of Open Access Journals (Sweden)

    Andrei Costin GRIMBERG

    2015-07-01

    Full Text Available The change of the new code of civil procedure and obvious the entry of the new provisions at 15th February 2013, has been thought with the hope to accelerate the procedures related to judgement with a noticeable simplification of procedures, all designed with the aim of unifying the case law and to lower the costs generated by lawsuits , costs both borne by the State as well by citizens involved the cases in court . Thus, the implementation of the New Code of Civil Procedure, desired the compliance right to a fair trial within a optimal time and predictable by the court, by judging the trial in a speedy way , avoiding unjustified delays of the pending cases and to the new petitions introduced, by excessive and unjustified delays often. By the noticeable changes that occurred following the entry into force of the new Code of Civil Procedure, it identify and amend the provisions regarding requests for displacement, in terms of the grounds on which it may formulate the petition of displacement and the court competent to hear such an application.

  20. Nuclear proliferation: what are the limits to Iran forced march?

    International Nuclear Information System (INIS)

    Drouhaud, P.

    2006-01-01

    Since 9 March 2006 the United Nations Security Council has been examining the report on Iran by the IAEA, which noted the failure of years of negotiations between Iran and the EU3 nations representing Europe (Britain, France and Germany). Following the June 2005 election of Mr Ahmadinejad, relations with the international community have become notably tense, with the resumption of nuclear activity (reprocessing, enrichment, etc.). The West is now convinced that this civil programme is enabling Iran to conceal a military programme, which, if it is completed, will shatter relationships, political and economic, in an area of strategic importance. The tensions generated by the policy adopted by Iran, in its forced march towards a nuclear capability, brings to the fore the nuclear proliferation problem, which is likely to become one of the major threats of the twenty-first century. (author)

  1. Space civil engineering - A new discipline

    Science.gov (United States)

    Sadeh, Willy Z.; Criswell, Marvin E.

    1991-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding the Civil Engineering know-how and practice to the development and maintenance of infrastructure on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University under a recently established NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts of the curriculum in the Space Civil Engineering Option at both undergraduate and graduate levels are presented. The role of Space Civil Engineering in the Space Program is discussed.

  2. El actor aglutinante: Nacionalismo y sociedad civil en Quebec.

    Directory of Open Access Journals (Sweden)

    Pablo Giori

    2016-10-01

    Full Text Available This article aims to reconstruct the history of civil society in Quebec (Canada to relate it with nationalism, the rise of the welfare state, trade unions, Catholic Church and civil society, the dynamic forces of society. Through in-depth interviews with key leaders, exploration of institutional archives and specific literature, we work with a particular case that, when compared to Catalonia, will allow us to evaluate the importance of civil society within nationalism. This actor is not usually considered as the central subject of researches and rarely token into account, unlike political parties, their leaders or intellectuals. Currently, in a context of crisis of the state and political parties, it has begun to be considered that civil society can be a key factor for its ability to produce alliances between sectors, build hegemony and dialogue directly with the population. The study is divided into four parts: 1 the development of the theoretical framework along with the construction of the object of study and the hypotheses; 2 an analysis about the importance of the involvement of civil society in the construction of the nationalist movement in Quebec; 3 a comparison with the Catalan case; and, 4 finally some conclusions.

  3. A civil engineering approach to ideal MHD

    International Nuclear Information System (INIS)

    Jensen, V.O.

    1992-01-01

    It is well known that a magnetic field can be conceived as a medium where an isotropic compressive stress, B 2 /2μ 0 , is superimposed on a tensile stress, B 2 /μ 0 , parallel to the lines of force. When a stationary ideal MHD plasma is present in the magnetic field, the particle pressure adds to the magnetic stresses to form a combined stress tensor. Calculations of plasma equilibria based on this concept are very similar to calculations in civil engineering of static structures based on compressive, tensile, and shear stresses. Therefore the very simple physical pictures known from civil engineering when used in plasma physics provide simple physical understanding and facilitate the physical interpretation of the results. In an earlier paper the concept was used to derive and discuss the equilibrium equations for θ-, Z-, and screw pinches and the Grad-Shafranov shift in a tokamak plasma with circular cross sections of the flux surfaces. Here the concept is used to discuss the virial theorem and to obtain a simple physical interpretation of this theorem. We also reconsider the Grad-Shafranov shift in a tokamak plasma and show that a situation where all flux surfaces have circular cross sections cannot be an exact solution to the ideal MHD equations. (author) 3 refs., 3 figs

  4. Simulation of a force on force exercise

    International Nuclear Information System (INIS)

    Terhune, R.; Van Slyke, D.; Sheppard, T.; Brandrup, M.

    1988-01-01

    The Security Exercise Evaluation System (SEES) is under development for use in planning Force on Force exercises and as an aid in post-exercise evaluation. This study is part of the development cycle where the simulation results are compared to field data to provide guidance for further development of the model. SEES is an event-driven stochastic computer program simulating individual movement and combat within an urban terrain environment. The simulator models the physics of movement, line of sight, and weapon effects. It relies on the controllers to provide all knowledge of security tactics, which are entered by the controllers during the simulation using interactive color graphic workstations. They are able to develop, modify and implement plans promptly as the simulator maintains real time. This paper reports on how SEES will be used to develop an intrusion plan, test the security response tactics and develop observer logistics. A Force on Force field exercise will then be executed to follow the plan with observations recorded. An analysis is made by first comparing the plan and events of the simulation with the field exercise, modifying the simulation plan to match the actual field exercise, and then running the simulation to develop a distribution of possible outcomes

  5. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  6. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  7. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  8. Structural Control Systems Implemented in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Cristian Pastia

    2005-01-01

    Full Text Available Over the past three decades, a great interest has been generated by the use of protection systems to mitigate the effects of dynamic environmental hazards on civil engineering structures, such as earthquakes and strong wind. These control systems develop controllable forces to add or dissipate energy in a structure, or both, due to specific devices integrated with sensors, controllers and real – time process to operate. The paper includes the advantages of these technologies consisting of the following sections: 1 represents an introduction, 2 deals with passive control system, 3 regards some control techniques, 4 concerns hybrid control techniques, 5 contains semi – active control techniques, and 6 is dedicated to general conclusions.

  9. Human Resources Management within Civil Service

    Directory of Open Access Journals (Sweden)

    Victor Teodor Alistar

    2012-12-01

    Full Text Available The main objective of this article is to examine the notion of management, as an area of study which analyses, regulates and renders the theoretical and technical support in order to provide rationality within the processes that unfold in the civil service. In order to accomplish this task, human resources management will be analyzed as a process which relies in exerting four main functions: ensuring, developing, motivating and maintaining the human resources, which are conditioned by external factors that must be taken into consideration, such as: legislative framework, labor force, unions, cultural context (here one includes management practices and philosophy, and economic circumstances. All these factors are considered to have a significant impact on the management of human resources.

  10. Artificial Intelligence in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Pengzhen Lu

    2012-01-01

    Full Text Available Artificial intelligence is a branch of computer science, involved in the research, design, and application of intelligent computer. Traditional methods for modeling and optimizing complex structure systems require huge amounts of computing resources, and artificial-intelligence-based solutions can often provide valuable alternatives for efficiently solving problems in the civil engineering. This paper summarizes recently developed methods and theories in the developing direction for applications of artificial intelligence in civil engineering, including evolutionary computation, neural networks, fuzzy systems, expert system, reasoning, classification, and learning, as well as others like chaos theory, cuckoo search, firefly algorithm, knowledge-based engineering, and simulated annealing. The main research trends are also pointed out in the end. The paper provides an overview of the advances of artificial intelligence applied in civil engineering.

  11. Global Standards of Market Civilization

    DEFF Research Database (Denmark)

    Global Standards of Market Civilization brings together leading scholars, representing a range of political views, to investigate how global 'standards of market civilization' have emerged, their justification, and their political, economic and social impact. Key chapters show how as the modern...... thought, as well as its historical application part II presents original case studies that demonstrate the emergence of such standards and explore the diffusion of liberal capitalist ideas through the global political economy and the consequences for development and governance; the International Monetary...... Fund's capacity to formulate a global standard of civilization in its reform programs; and problems in the development of the global trade, including the issue of intellectual property rights. This book will be of strong interest to students and scholars in wide range of fields relating to the study...

  12. On civil engineering disasters and their mitigation

    Science.gov (United States)

    Xie, Lili; Qu, Zhe

    2018-01-01

    Civil engineering works such as buildings and infrastructure are the carriers of human civilization. They are, however, also the origins of various types of disasters, which are referred to in this paper as civil engineering disasters. This paper presents the concept of civil engineering disasters, their characteristics, classification, causes, and mitigation technologies. Civil engineering disasters are caused primarily by civil engineering defects, which are usually attributed to improper selection of construction site, hazard assessment, design and construction, occupancy, and maintenance. From this viewpoint, many so-called natural disasters such as earthquakes, strong winds, floods, landslides, and debris flows are substantially due to civil engineering defects rather than the actual natural hazards. Civil engineering disasters occur frequently and globally and are the most closely related to human beings among all disasters. This paper emphasizes that such disasters can be mitigated mainly through civil engineering measures, and outlines the related objectives and scientific and technological challenges.

  13. Adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2018-04-01

    The Hash security algorithm was analyzed in order to mitigate information security in a distributed architecture. The objective of this research is to develop a prototype for the Adoption of the algorithm Hash in a conceptual model for the Civil Registry of Ecuador. The deductive method was used in order to analyze the published articles that have a direct relation with the research project "Algorithms and Security Protocols for the Civil Registry of Ecuador" and articles related to the Hash security algorithm. It resulted from this research: That the SHA-1 security algorithm is appropriate for use in Ecuador's civil registry; we adopted the SHA-1 algorithm used in the flowchart technique and finally we obtained the adoption of the hash algorithm in a conceptual model. It is concluded that from the comparison of the DM5 and SHA-1 algorithm, it is suggested that in the case of an implementation, the SHA-1 algorithm is taken due to the amount of information and data available from the Civil Registry of Ecuador; It is determined that the SHA-1 algorithm that was defined using the flowchart technique can be modified according to the requirements of each institution; the model for adopting the hash algorithm in a conceptual model is a prototype that can be modified according to all the actors that make up each organization.

  14. Air Force Civil Engineer, Volume 16, Number 2, 2008

    Science.gov (United States)

    2008-01-01

    factors to consider before deciding on a vegetative roof include wind and climate. Wind uplift resistance must be carefully evaluated. Green roofing...brighten any mood . He touched us all and left a part of him with us all. He is and will always be a great part of our EOD family.” TSgt Capra was

  15. Customer Satisfaction with Air Force Civil Engineering Support

    Science.gov (United States)

    1988-09-01

    organization seeking to promote customer satisfaction. The answer is yes to both. Through advertising and interaction with consumers , companies...Many companies manage customer expectations by overpromising performance through unreliable and sometimes intentionally misleading advertising . Many... customers ’ expectations by only advertising and making commitments they can meet. Then they do whatever it takes to keep their word (Lele, 1987: 148

  16. Air Force Civil Engineer, Volume 10, Number 1, Spring 2002

    Science.gov (United States)

    2002-01-01

    gone into the 823rd Expeditionary RED HORSE Squadron�s military construction (MILCON) funded ramp project at Al Udeid Air Base, Qatar , and the main...AE W P ub lic A ff ai rs an Air Base RED HORSE builds MILCON project in Qatar SSgt Chuck Risinger, 823rd RHS, operates a slip form paver March 24...and were not designed to limit or contain the migration of lead into the environ- ment and sub-surface groundwater aquifers . An estimated 2,000

  17. House Divided: The Splitting of Active Duty Civil Affairs Forces

    Science.gov (United States)

    2009-12-01

    first phase is violence of political partisanship that began in 1945 and ended in 1953. The violence ignited during the electoral campaigns of 1945...rather than just the Violencia and all else that follows. This gives a transitional insight to the formations of the various groups of this period

  18. Transforming Civil Engineering. Air Force Civil Engineer, Volume 15, Number 1, 2007

    Science.gov (United States)

    2007-01-01

    family would all be worth it if she could help someone and come back here,” said her father, Mr. Stephen Loncki. She was buried with military honors in...responsibility and for getting the job done. He never backed away from the challenge, never backed away from work,” said Mr. Dale Grawe , SrA...Mr. Matthew D. LaPlante, The Salt Lake Tribune; Ms. Jane Carlson and Ms. Rebecca O’Halloran, Galesburg Register-Mail; Mr. Stephen Speckman

  19. Civil liability concerning nuclear accidents

    International Nuclear Information System (INIS)

    Anon.

    2013-01-01

    France and the USA wish to cooperate in order to promote an international regime of civil liability in order to give a fair compensation to victims of nuclear accidents as it is recommended by IAEA. On the other hand the European Commission has launched a consultation to see the necessity or not to harmonize all the civil liability regimes valid throughout Europe. According to the Commission the potential victims of nuclear accidents would not receive equal treatment at the European scale in terms of insurance cover and compensation which might distort competition in the nuclear sector. (A.C.)

  20. OVERVIEW OF RUSSIAN CIVIL JUSTICE

    Directory of Open Access Journals (Sweden)

    D. Maleshin

    2016-01-01

    Full Text Available Contemporary Russian civil procedure is not a pure Continental model because it also has procedural features of the common law system, as well as some other original and exceptional features. This article examines the main aspects of Russian civil justice: its main principles; judicial organization, including the structure of the courts and the division between courts of general jurisdiction and arbitrazh (commercial courts, and the Intellectual Property Court; sources of procedural law; bar organization; the jurisdiction of the courts; actions and proceedings; legal costs; evidence; administrative procedure; class actions; enforcement proceedings; and arbitration and mediation.

  1. Regulating the Role of PMCs in Shaping Security and Politics

    DEFF Research Database (Denmark)

    Leander, Anna

    2006-01-01

    This paper focuses on the way PMCs shape security policies and more generally political priorities. Linking up with classical thinking about "civil-military relations", it suggests that preoccupation with security professionals' role in shaping politics is as important when these professionals...

  2. The Death of Democracy and the Forces of Power and Control: The Case of Europe

    Directory of Open Access Journals (Sweden)

    Theo Gavrielides

    2016-08-01

    Full Text Available At the time of writing, the United Kingdom is grabbling with its decision to abandon its European Union membership. As the country is divided and hate incidents are increased by almost 50%, this think-piece presents a critical analysis of Europe’s missed opportunity for social justice. The paper presents evidence by analysing the civil and political rights jurisprudence of the European Court of Human Rights in order to explore the potential of what it calls the “human rights project” for a regional democracy. The paper shows that a key objective of the European Convention of Human Rights was the development of case law that would construct a regional democracy for bringing consistency in the enjoyment of civil and political rights across the continent. This “human rights project” was well underway, but is now hampered by contemporary forces of power and control that are ridiculing the work and status of the Council of Europe. The paper identifies three levers that move these forces, namely: financial and security terror as well as nationalism. The paper warns that if these forces are not managed, the backlash in social justice will continue while the human rights project for a regional democracy will come to its demise.

  3. Space Civil Engineering option - A progress report

    Science.gov (United States)

    Criswell, Marvin E.; Sadeh, Willy Z.

    1992-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding Civil Engineering to the development, operation, and maintenance of infrastructures on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University and with support of the NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts and the current status of the curriculum in the Space Civil Engineering Option primarily at the undergraduate level are presented.

  4. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition

    National Research Council Canada - National Science Library

    Murray, S

    1999-01-01

    The Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems...

  5. DEFENCE, DEMOCRACY AND SOUTH AFRICA’S CIVIL-MILITARY GAP

    OpenAIRE

    Lindy Heinecken

    2011-01-01

    Civil-military relations theory suggests that a functional and effective military requires a unique culture, separate from its parent society. This is based on the assumption that a “gap” between the military and society is inevitable as the military’s function, the lawful application of military force in accordance with government direction, is fundamentally different from civilian business. Those interested in civil-military relations are essentially concerned with determining when the “gap...

  6. PROBLEMS PERTAINING TO DIVERSIFICATION OF CIVIL EQUIPMENT IN EQUIPMENT OF MILITARY PURPOSE

    OpenAIRE

    A. I. Kotlabay; V. A. Korobkin; V. F. Tamelo; I. V. Kostko; S. V. Kondratiev

    2009-01-01

    Study of directions concerning development of military equipment, its modernization with the purpose to improve its military efficiency is an actual problem for the Armed Forces, military science, designers and researchers.The paper analyzes and estimates possibilities to use civil equipment for military purpose. Problems pertaining to technologies of double application, diversification of civil equipment in military engineering machinery are considered in the paper.

  7. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...... in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also...

  8. Rosatom Corporation at the All-Russian civil defence training exercise

    International Nuclear Information System (INIS)

    Glukhikh, E.N.; Glazunov, A.V.; Tyurin, R.L.

    2012-01-01

    The 80th anniversary of civil defence in Russia was marked by the All-Russian civil defence exercise attended by representatives of federal executive authorities, regional and local executive authorities. During the exercise performance of the following activities was verified: introduction of increased preparedness mode for local air-defence emergency-response forces, activities of emergency-response and fire safety commissions, information collection and exchange during implementation of top-priority civil defence measures, etc. The paper describes the activities carried out during the exercise [ru

  9. Quality control of Ling'ao nuclear power station civil construction

    International Nuclear Information System (INIS)

    Lu Buliang; Ye Changyuan

    2001-01-01

    Based on the quality control model adopted during Ling'ao Nuclear Power Station construction, the author briefly introduces quality control process of some main civil construction activities (reinforced concrete, steel liner, steel works and prestressing force) of nuclear power station, and makes some descriptions on non-conformance control of civil works. These quality control processes described come from the concrete practice during civil construction of Ling'ao Nuclear Power Station, and are based on Daya Bay Nuclear Power Station construction experience

  10. The Civil War and Iowa.

    Science.gov (United States)

    Gore, Deborah, Ed.

    1987-01-01

    This journal issue explores Iowa's participation in the U.S. Civil War and primarily focuses on what happened to the men, women, and children who remained at home. A number of social, political, and economic changes are examined, including: (1) the increased responsibilities of women and children; (2) the growth of abolitionism; (3) the role of…

  11. Governance and European Civil Society

    DEFF Research Database (Denmark)

    Kutay, Acar

    This book provides a critical analysis of the European Union’s approach to ‘governance’, focusing on the way in which civil society is incorporated within the EU decision-making process and arguing that it is not conducive to the democratisation of EU governance.\

  12. Promoting Civil Discourse on Campus

    Science.gov (United States)

    Bornstein, Rita

    2010-01-01

    During the past several decades, off campus and on, much of the discourse on controversial issues has been personal, vicious, and divisive. On the national scene, politics has become permeated with incivility. It now appears that Americans have been naive about their ability and willingness to engage in civil discourse and compromise. How can…

  13. Measuring competition in civil aviation

    NARCIS (Netherlands)

    Lijesen, M.G.; Nijkamp, P.; Rietveld, P.

    2002-01-01

    Markets in civil aviation are characterized by large differences in the level of competition, both between time periods as between regions. To measure competition, several indicators are available, such as the number of competitors, the C4-index and the Herfindahl index. We use these measures in

  14. Ancient Civilization in Contemporary Contexts.

    Science.gov (United States)

    Natunewicz, Chester F.

    The development of more than 325 short radio talks, designed to inform the general public, on the relevance and contemporaneity of classical civilization to our times, is discussed in this address. Materials are derived from a wide range of sources and include such writers as Cicero, Plautus, Horace, Ovid, Quintillian, Aeschylus, and Plutarch.…

  15. Job Prospects for Civil Engineers.

    Science.gov (United States)

    Basta, Nicholas

    1985-01-01

    Government programs and renewed industrial activity have combined with stable enrollments to create bright job prospects for civil engineers. Areas with good opportunities include highway reconstruction and rehabilitation, water-resource management, and new factory construction. The subspecialty of structural engineering has a growing need in…

  16. Civil Engineering Technology Program Guide.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This program guide presents civil engineering technology curriculum for technical institutes in Georgia. The general information section contains the following: purpose and objectives; program description, including admissions, typical job titles, and accreditation and certification; and curriculum model, including standard curriculum sequence and…

  17. World atlas of nuclear industry: civil and military; Atlas mondial du nucleaire: Civil et militaire

    Energy Technology Data Exchange (ETDEWEB)

    Alexandre, Nicolas

    2011-07-01

    Todays, with the energy supplies and global warming concerns, nuclear energy in making a come-back, witness the numerous nuclear programs launched or re-launched in the US, in Europe, China and India. In parallel, on the military side, the deterrence strategy remains in the center of security politics of big powers. This atlas takes stock of the overall issues linked with the nuclear technology: production, civil applications (power generation, medicine etc..), military usages (naval propulsion, weapons). It answers the main questions of this complex world, often dominated by secrecy: who does what in the nuclear domain in France? Is an accident, like the Chernobyl's one, possible today in Europe? What solutions for radioactive wastes? Do we take risks when we export our reactor technologies to Middle-East countries? Are we at the dawn of a new arms rush? What do international agreements foresee in this domain? Taking into account the costs, the hazards and the advantages of nuclear industry, the atlas shows that it is possible to establish solid technical and legal barriers between its civil and military sides. (J.S.)

  18. A Novel Surveillance System Applied in Civil Airport

    Directory of Open Access Journals (Sweden)

    Sun Hua Bo

    2016-01-01

    Full Text Available Conventional security monitoring of civil airport usually uses a fixed camera to acquire images. There are several problems with performance including difficulties introduced in the information transmission, storage, and analysis of the process. Insect compound eyes offer unique advantages for moving target capture and these have attracted the attention of many researchers in recent years. This paper contributes to this research by proposing a new surveillance system applied in civil airport. We discuss the finished bionic structure of the system, the development of the bionic control circuit, and introduce the proposed mathematical model of bionic compound eyes for data acquisition and image mosaic. Image matching for large view is also illustrated with different conditions. This mode and algorithm effectively achieve safety surveillance of airport with large field of view and high real-time processing.

  19. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  20. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  1. SEVERAL OBSERVATIONS REGARDING THE REGULATION OF THE CONTRACT OF PARTNERSHIP IN THE NEW CIVIL CODE

    Directory of Open Access Journals (Sweden)

    IOLANDA-ELENA CADARIU-LUNGU

    2012-05-01

    Full Text Available Following the model of the Italian Civil Code, of the Civil Code from Quebec, the Swiss and the Dutch ones, the new Romanian Civil Code has adopted the monist conception of regulating the private law relationships, gathering in the same normative act traditional civil law dispositions as well as dispositions that are specific to the commercial relationships among professionals. In this regulating context, one of the fundamental changes the new Civil Code brings is the unification of the legal regime applicable to civil and commercial contracts, with all the consequences that derive from this new legislative approach. This fundamental modification is first determined by the profound change of the character of social, economic and juridical relationships, by the change of the cultural level of the Romanian society, by the closeness of the two branches of civil and commercial law and, last but not least, by the evolution of the business environment. In this line of thought, we can identify important changes in the matter of the contract of partnership which, as regulated by the new Civil Code, constitutes the common law both for the simple partnerships (former civil societies as well as for the commercial companies, to which the special legislation still in force in the matter still applies. In this study we aimed at analyzing the general common features of all associative forms listed by art. 1.888 Civil Code and the new elements in the matter, with critical observations where needed, which take the form of a comparison with the specific legislation in the field from the Civil Codes that served as a source of inspiration for the Romanian legislator.

  2. Climate Change and Civil Violence

    Science.gov (United States)

    van der Vink, G.; Plancherel, Y.; Hennet, C.; Jones, K. D.; Abdullah, A.; Bradshaw, J.; Dee, S.; Deprez, A.; Pasenello, M.; Plaza-Jennings, E.; Roseman, D.; Sopher, P.; Sung, E.

    2009-05-01

    The manifestations of climate change can result in humanitarian impacts that reverse progress in poverty- reduction, create shortages of food and resources, lead to migration, and ultimately result in civil violence and conflict. Within the continent of Africa, we have found that environmentally-related variables are either the cause or the confounding factor for over 80% of the civil violence events during the last 10 years. Using predictive climate models and land-use data, we are able to identify populations in Africa that are likely to experience the most severe climate-related shocks. Through geospatial analysis, we are able to overlay these areas of high risk with assessments of both the local population's resiliency and the region's capacity to respond to climate shocks should they occur. The net result of the analysis is the identification of locations that are becoming particularly vulnerable to future civil violence events (vulnerability hotspots) as a result of the manifestations of climate change. For each population group, over 600 social, economic, political, and environmental indicators are integrated statistically to measures the vulnerability of African populations to environmental change. The indicator time-series are filtered for data availability and redundancy, broadly ordered into four categories (social, political, economic and environmental), standardized and normalized. Within each category, the dominant modes of variability are isolated by principal component analysis and the loadings of each component for each variable are used to devise composite index scores. Comparisons of past vulnerability with known environmentally-related conflicts demonstrates the role that such vulnerability hotspot maps can play in evaluating both the potential for, and the significance of, environmentally-related civil violence events. Furthermore, the analysis reveals the major variables that are responsible for the population's vulnerability and therefore

  3. American Society of Civil Engineers | ASCE

    Science.gov (United States)

    Membership Your New Membership: Getting Started Member Value Civil Engineering Salaries Manage Your Account Vote Now Education & Careers Training & Courses Getting Licensed & Certified Live Exam Reviews Specialty Certifications Civil Engineering Body of Knowledge Volunteer Opportunities Jobs Ethics

  4. Journal of Civil Engineering Research and Practice

    African Journals Online (AJOL)

    The Journal of Civil Engineering Research and Practice aims to publish original research papers of high standard, containing material of significant contribution to civil engineering, with emphasis being placed on material that is applicable to the solution of practical problems.

  5. Journal of Civil Engineering, JKUAT: Journal Sponsorship

    African Journals Online (AJOL)

    Journal of Civil Engineering, JKUAT: Journal Sponsorship. Journal Home > About the Journal > Journal of Civil Engineering, JKUAT: Journal Sponsorship. Log in or Register to get access to full text downloads.

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  8. Developing Sustainable Afghan National Security Forces

    Science.gov (United States)

    2012-06-08

    codifies approved methods and techniques throughout an organization. “Doctrine is accepted corporate knowledge; it is authoritative . By definition...doctrine provides authoritative guidance on how the organization ought to operate with current capabilities. It therefore provides the basis for...nutrition; and infant, child, and maternal mortality. . . . Furthermore, Afghanistan’s prospects for growth are severely limited by weak economic

  9. Forced displacement and women's security in Colombia.

    Science.gov (United States)

    Meertens, Donny

    2010-04-01

    In the protracted Colombian conflict, assistance to internally displaced persons has developed in the context of contradictory political processes. The Colombian government's launching of a transitional justice process in the midst of armed conflict has generated a complex situation displaying both conflict and post-conflict characteristics. The progressive Constitutional Court rulings on internal displacement, in particular the gender-sensitive Auto 092, constitute an attempt to bring together humanitarian interventions and transitional justice measures in a rights-based framework. However, the national government is reluctant to adopt them fully and local realities still hamper their integrated implementation. Displaced women, therefore, remain in an especially vulnerable position. This paper argues that gender-sensitive humanitarian interventions must take into account all of these complexities of scale and political process in order to make legal frameworks more effective at the local level. In these contexts, interventions should pay particular attention to strategies that contribute to transforming pre-existing gender regimes.

  10. Security Forces of the Kurdistan Regional Government

    Science.gov (United States)

    2009-02-26

    crisp uniforms. Those in the lower...ur o M em be r. G en er al S ta ff R eg io na l C om m an ds Fu nc tio na l C om m an ds P re si de nc y C ou nc il O pe ra tio ns (G 3) A dm in is...nc y C ou nc il O pe ra tio ns (G 3) A dm in is tra tio n/ Lo gi st ic s (G 1/ G 4) P es hm er ga M in is te r* Fi na nc e In sp ec to r G en er al

  11. Features of upbringing children in civil law

    OpenAIRE

    Лобжанідзе, Давид

    2014-01-01

    The paper analyzes the features of upbringing children in civil law, in particular under the Civil Code of Georgia. The author examines the concept of the family as a social phenomenon and its underlying principles. Attention is paid also to the court practice of upbringing children and determining the place of their residence. English abstract D. Lobzhanidze Features of upbringing children in civil law. The paper analyzes the features of upbringing children in civil law, in particular u...

  12. Subatomic forces

    International Nuclear Information System (INIS)

    Sutton, C.

    1989-01-01

    Inside the atom, particles interact through two forces which are never felt in the everyday world. But they may hold the key to the Universe. These ideas on subatomic forces are discussed with respect to the strong force, the electromagnetic force and the electroweak force. (author)

  13. Nuclear security and law

    International Nuclear Information System (INIS)

    Gozal, Y.

    1999-01-01

    The aim of this study is to show that the classical distinction between the military nuclear law and the civil nuclear law is outdated. The technologies are dual and might be misused from a pacific to a military goal. The central element of the nuclear law is thus the integration of the safety rules: the nuclear risk being universal, it has created an universal law (first part) that reflects our scientific knowledge and might thus evaluate. This universal law has been a factor of nuclear security (part 2), as in 50 years, there had been only one major nuclear accident and no nuclear conflict. The horizontal proliferation has been limited and the international community has understood that time had come to reduce our arsenals. (author)

  14. 50 CFR 300.40 - Civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil penalties. 300.40 Section 300.40... South Pacific Tuna Fisheries § 300.40 Civil penalties. The procedures of 15 CFR part 904 apply to the assessment of civil penalties, except as modified by the requirements of section 8 of the Act. ...

  15. 49 CFR 233.11 - Civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalties. 233.11 Section 233.11..., DEPARTMENT OF TRANSPORTATION SIGNAL SYSTEMS REPORTING REQUIREMENTS § 233.11 Civil penalties. Any person (an... subject to a civil penalty of at least $650 and not more than $25,000 per violation, except that...

  16. 7 CFR 1435.201 - Civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Civil penalties. 1435.201 Section 1435.201... Recordkeeping Requirements § 1435.201 Civil penalties. (a) Any processor, refiner, or importer of sugar, syrup... false data required under § 1435.200(a) through (e), is subject to a civil penalty of no more than $10...

  17. 12 CFR 215.11 - Civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Civil penalties. 215.11 Section 215.11 Banks... OFFICERS, DIRECTORS, AND PRINCIPAL SHAREHOLDERS OF MEMBER BANKS (REGULATION O) § 215.11 Civil penalties... subject to civil penalties as specified in section 29 of the Federal Reserve Act (12 U.S.C. 504). [Reg. O...

  18. 39 CFR 233.12 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Civil penalties. 233.12 Section 233.12 Postal... Civil penalties. False representation and lottery orders— (a) Issuance. Pursuant to 39 U.S.C. 3005, the... be liable to the United States for a civil penalty in an amount not to exceed $11,000 for each day...

  19. 12 CFR 229.21 - Civil liability.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Civil liability. 229.21 Section 229.21 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM... Availability Policies § 229.21 Civil liability. (a) Civil liability. A bank that fails to comply with any...

  20. 14 CFR 1212.800 - Civil remedies.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil remedies. 1212.800 Section 1212.800... Comply With Requirements of This Part § 1212.800 Civil remedies. Failure to comply with the requirements of the Privacy Act and this part could subject NASA to civil suit under the provisions of 5 U.S.C...

  1. 49 CFR 221.7 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 221.7 Section 221.7 Transportation... TRANSPORTATION REAR END MARKING DEVICE-PASSENGER, COMMUTER AND FREIGHT TRAINS General § 221.7 Civil penalty. Any... requirement is subject to a civil penalty of at least $650 and not more than $25,000 per violation, except...

  2. 38 CFR 21.7310 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Civil rights. 21.7310... Bill-Active Duty) Administrative § 21.7310 Civil rights. (a) Delegation of authority concerning Federal... her jurisdiction. See part 18 of this chapter. These equal opportunity laws are: (1) Title VI, Civil...

  3. 13 CFR 302.20 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Civil rights. 302.20 Section 302... TERMS AND CONDITIONS FOR INVESTMENT ASSISTANCE § 302.20 Civil rights. (a) Discrimination is prohibited... 601 of Title VI of the Civil Rights Act of 1964, as amended (42 U.S.C. 2000d et seq.) (proscribing...

  4. 7 CFR 761.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Civil rights. 761.3 Section 761.3 Agriculture... SPECIAL PROGRAMS GENERAL PROGRAM ADMINISTRATION General Provisions § 761.3 Civil rights. Part 15d of this title contains applicable regulations pertaining to civil rights and filing of discrimination complaints...

  5. 30 CFR 880.16 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil rights. 880.16 Section 880.16 Mineral... LAND RECLAMATION MINE FIRE CONTROL § 880.16 Civil rights. State and local authorities shall comply with Title VI of the Civil Rights Act of 1964 (Pub. L. 88-352) and all requirements imposed by or pursuant to...

  6. 31 CFR 103.57 - Civil penalty.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil penalty. 103.57 Section 103.57... REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.57 Civil penalty. (a) For any... willfully participates in the violation, a civil penalty not to exceed $1,000. (b) For any willful violation...

  7. 49 CFR 235.9 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...

  8. 30 CFR 881.12 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil rights. 881.12 Section 881.12 Mineral... LAND RECLAMATION SUBSIDENCE AND STRIP MINE REHABILITATION, APPALACHIA § 881.12 Civil rights. State or local authorities shall comply with Title VI of the Civil Rights Act of 1964 (Pub. L. 88-352) and all...

  9. 7 CFR 3560.2 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil rights. 3560.2 Section 3560.2 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS General Provisions and Definitions § 3560.2 Civil rights. (a... prohibition under Title VI of the Civil Rights Act of 1964, 42 U.S.C. 2000d and Title VI regulations against...

  10. 76 FR 71431 - Civil Penalty Calculation Methodology

    Science.gov (United States)

    2011-11-17

    ... DEPARTMENT OF TRANSPORTATION Federal Motor Carrier Safety Administration Civil Penalty Calculation... is currently evaluating its civil penalty methodology. Part of this evaluation includes a forthcoming... civil penalties. UFA takes into account the statutory penalty factors under 49 U.S.C. 521(b)(2)(D). The...

  11. 7 CFR 3550.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil rights. 3550.3 Section 3550.3 Agriculture... DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS General § 3550.3 Civil rights. RHS will administer its... amended by Executive Order 12259, as applicable. The civil rights compliance requirements for RHS are in 7...

  12. 28 CFR 33.52 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Civil rights. 33.52 Section 33.52... Block Grants Additional Requirements § 33.52 Civil rights. The Justice Assistance Act provides that “no... the provisions of title VI of the Civil Rights Act of 1964; section 504 of the Rehabilitation Act of...

  13. 22 CFR 127.10 - Civil penalty.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil penalty. 127.10 Section 127.10 Foreign... Civil penalty. (a) The Assistant Secretary of State for Political-Military Affairs is authorized to impose a civil penalty in an amount not to exceed that authorized by 22 U.S.C. 2778, 2779a and 2780 for...

  14. 32 CFR 310.46 - Civil actions.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil actions. 310.46 Section 310.46 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.46 Civil actions. An individual may file a civil suit...

  15. 34 CFR 303.424 - Civil action.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Civil action. 303.424 Section 303.424 Education... Civil action. Any party aggrieved by the findings and decision regarding an administrative complaint has the right to bring a civil action in State or Federal court under section 639(a)(1) of the Act...

  16. 34 CFR 300.516 - Civil action.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Civil action. 300.516 Section 300.516 Education... DISABILITIES Procedural Safeguards Due Process Procedures for Parents and Children § 300.516 Civil action. (a... aggrieved by the findings and decision under § 300.514(b), has the right to bring a civil action with...

  17. 7 CFR 250.21 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Civil rights. 250.21 Section 250.21 Agriculture... TERRITORIES AND POSSESSIONS AND AREAS UNDER ITS JURISDICTION General Operating Provisions § 250.21 Civil... Department's nondiscrimination regulations (7 CFR parts 15, 15a, and 15b) and the FNS civil rights...

  18. 33 CFR 401.102 - Civil penalty.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Civil penalty. 401.102 Section... TRANSPORTATION SEAWAY REGULATIONS AND RULES Penalties-Violations of Seaway Regulations § 401.102 Civil penalty. (a) A person, as described in § 401.101(b), who violates a regulation is liable to a civil penalty of...

  19. 50 CFR 82.20 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Civil rights. 82.20 Section 82.20 Wildlife... (MARINE MAMMAL PROTECTION ACT OF 1972) Administration § 82.20 Civil rights. Each cooperative agreement... Civil Rights Act of 1964, 42 U.S.C. 2000d-2000d-4, and with the Secretary's regulations promulgated...

  20. 7 CFR 1709.18 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Civil rights. 1709.18 Section 1709.18 Agriculture... ASSISTANCE TO HIGH ENERGY COST COMMUNITIES General Requirements § 1709.18 Civil rights. This program will be administered in accordance with applicable Federal Civil Rights Law. All grants made under this subpart are...

  1. 49 CFR 228.21 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 228.21 Section 228.21..., DEPARTMENT OF TRANSPORTATION HOURS OF SERVICE OF RAILROAD EMPLOYEES Records and Reporting § 228.21 Civil... requirement is subject to a civil penalty of at least $650 and not more than $25,000 per violation, except...

  2. 49 CFR 218.9 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 218.9 Section 218.9 Transportation... TRANSPORTATION RAILROAD OPERATING PRACTICES General § 218.9 Civil penalty. Any person (an entity of any type... requirement of this part or causes the violation of any such requirement is subject to a civil penalty of at...

  3. 28 CFR 65.52 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Civil rights. 65.52 Section 65.52... Additional Requirements § 65.52 Civil rights. The Act provides that “no person in any state shall on the... funds under the Act are also subject to the provisions of title VI of the Civil Rights Act of 1964...

  4. 50 CFR 401.22 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil rights. 401.22 Section 401.22..., DEVELOPMENT AND ENHANCEMENT § 401.22 Civil rights. Each application for Federal assistance, grant-in-aid award... Assisted Programs of the Civil Rights Act of 1964 and with the Secretary's regulations promulgated...

  5. 78 FR 672 - Civil Monetary Penalties

    Science.gov (United States)

    2013-01-04

    ... Part 3560 RIN 0575AC93 Civil Monetary Penalties AGENCY: Rural Housing Service, USDA. ACTION: Proposed rule. SUMMARY: The Rural Housing Service (RHS or Agency) proposes to implement two civil monetary... civil monetary penalties under the authority of 42 U.S.C. 1490s (section 543 of the Housing Act of 1949...

  6. 10 CFR 110.64 - Civil penalty.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Civil penalty. 110.64 Section 110.64 Energy NUCLEAR... Enforcement § 110.64 Civil penalty. (a) In response to a violation, the Commission may institute a proceeding to impose a civil penalty under section 234 of the Atomic Energy Act by issuing a notice to the...

  7. 10 CFR 1017.29 - Civil penalty.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Civil penalty. 1017.29 Section 1017.29 Energy DEPARTMENT... INFORMATION Violations § 1017.29 Civil penalty. Link to an amendment published at 74 FR 66033, Dec. 14, 2009... subject to a civil penalty under this part: (1) 10 CFR Part 1017—Identification and Protection of...

  8. History of Civil Engineering Modal Analysis

    DEFF Research Database (Denmark)

    Brincker, Rune

    2008-01-01

    techniques are available for civil engineering modal analysis. The testing of civil structures defers from the traditional modal testing in the sense, that very often it is difficult, or sometimes impossible, to artificially excite a large civil engineering structure. Also, many times, even though...

  9. DISPOSSESSION OF ASSETS IN THE NEW ROMANIAN CIVIL CODE. COMPARATIVE LAW

    Directory of Open Access Journals (Sweden)

    Silvia Cristea

    2014-11-01

    Full Text Available This article deals with the legal status of pledge, in view of the new romanian civil code. Besides regulation, definition and subject collateral (section 1,2 and 3, the focus of the analysis is on the institution dispossession of assets, which marks the time difference between pledge and mortgage (section 4.Original in the doctrinal approach is the analysis of pledge in different systems of law (French law and Canadian law, in section 5. If the purpose of the legislature was that the Roman civil pledge without dispossession come under the regulation of mortgage securities and dispossession remain at the borders of the Civil Code, we believe that achievement is threatened by the expansion of civilian collateral objectof pledge to the marketable securities, especially over the nominative one (forms synthesized in the conclusions of the article.

  10. 76 FR 30497 - Armed Forces Day, 2011

    Science.gov (United States)

    2011-05-25

    ... are willing to sacrifice their lives for the security of our Nation and the freedoms of their fellow... its people. From our earliest days as a fledgling republic, the United States has relied on the... civil authorities and private citizens. I invite the Governors of the States, the Commonwealth of Puerto...

  11. Art and Civil Action : Cultural Organizations in the European Civil Domain

    NARCIS (Netherlands)

    Gielen, Pascal; Lijster, Thijs

    2017-01-01

    In this article, the place of new cultural organizationsin the civil domain is analysed. The authors describe a theoretical model that they call the ‘civil chain’, describing the different phases in which civil organizations develop themselves. The civil chain delivers analytic insights into the

  12. The design of automatic software testing module for civil aviation information system

    Science.gov (United States)

    Qi, Qi; Sun, Yang

    2018-05-01

    In this paper, the practical innovation design is carried out according to the urgent needs of the automatic testing module of civil aviation information system. Firstly, the background and significance of the automatic testing module of civil aviation information system is expounded, and the current research status of automatic testing module and the advantages and disadvantages of related software are analyzed. Then, from the three aspects of macro demand, module functional requirement and module nonfunctional demand, we further study the needs of automatic testing module of civil aviation information system. Finally, from the four aspects of module structure, module core function, database and security, we have made an innovative plan for the automatic testing module of civil aviation information system.

  13. The Proof of the Heir Quality in the New Civil Code

    Directory of Open Access Journals (Sweden)

    Ilioara Genoiu

    2011-05-01

    Full Text Available Similar to the Civil Code in force, Law no. 287/2009 regarding the Civil Code, published in theOfficial Gazette, but whose date of entry in force has not been established yet, regulates, as a main proof ofthe heir quality, the heir certificate. Like de lege lata the proof of the heir quality may be realised, integratedin the petition of heredity, and by other means of evidence. In the present paper we aim to analyze theproblem of the heir quality’s proof, under all its aspects in the light of the Law no. 287/2009 and to reveal thenovelties brought by this governmental decree in the matter subjected to our analysis and to appreciate uponits correctness. We consider our scientific approach, through which we intend to contribute to the knowledgeof the new Civil Code dispositions on successional matter, until its entry in force, is current and useful.

  14. 20 CFR 405.505 - Extension of time to file a civil action.

    Science.gov (United States)

    2010-04-01

    ....505 Section 405.505 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Judicial Review § 405.505 Extension of time to file a civil... judicial review in a Federal district court. Your request must be in writing and explain why the action was...

  15. 32 CFR 245.17 - U.S. civil and military air traffic control facilities.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false U.S. civil and military air traffic control facilities. 245.17 Section 245.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Procedures for Implementation of ESCAT §...

  16. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  17. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  18. Reflections on Africa's Security Situation: An Examination of Nigeria ...

    African Journals Online (AJOL)

    One of the greatest challenges that twenty-first century African states face is that of security. Of the four arms of the state security system, namely, the Army, Air Force, Navy and Police, the latter has been the most taunted. Ordinarily, the Police Force, being the closest of all the forces to civilians, is expected to be the protector ...

  19. Practical Guide to Civil Mediation

    CERN Document Server

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that the Département des Institutions of the Republic and Canton of Geneva and the Groupement suisse des Magistrats pour la médiation (GEMME) - Swiss Association of Magistrates for Mediation have published a multilingual Practical Guide to Civil Mediation (including English). In this context, the Swiss Mission has underlined the benefits of resorting to mediation, especially for the personnel of international organizations, and which the Secretary-General of the GEMME has summarised as follows: it is a private process not requiring the waiver of the parties' immunities; the confidentiality of the mediation process is guaranteed both by the mediator and the parties to it; the search for an amicable settlement does not need to be determined by reference to law (provided that public order is respected); the process is faster (2 to 3 sessions), less costly and more flexible than civil or arbitration procedures; in order to reinforce the agreeme...

  20. Practical Guide to Civil Mediation

    CERN Multimedia

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that the Département des Institutions of the Republic and Canton of Geneva and the Groupement suisse des Magistrats pour la médiation (GEMME) - Swiss Association of Magistrates for Mediation have published a multilingual Practical Guide to Civil Mediation (including English). In this context, the Swiss Mission has underlined the benefits of resorting to mediation, especially for the personnel of International Organizations, and which the Secretary-General of the GEMME has summarised as follows: it is a private process not requiring the waiver of the parties' immunities; the confidentiality of the mediation process is guaranteed both by the mediator and the parties to it; the search for an amicable settlement does not need to be determined by reference to law (provided that public order is respected); the process is faster (2 to 3 sessions), less costly and more flexible than civil or arbitration procedures; in order to reinforce the agreem...