WorldWideScience

Sample records for cooperative border security

  1. Cooperative Monitoring Center Occasional Paper/7: A Generic Model for Cooperative Border Security

    Energy Technology Data Exchange (ETDEWEB)

    Netzer, Colonel Gideon

    1999-03-01

    This paper presents a generic model for dealing with security problems along borders between countries. It presents descriptions and characteristics of various borders and identifies the threats to border security, while emphasizing cooperative monitoring solutions.

  2. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options

    Energy Technology Data Exchange (ETDEWEB)

    Qojas, M.

    1999-03-01

    This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

  3. Cross-border innovation cooperation

    DEFF Research Database (Denmark)

    Hjaltadóttir, Rannveig Edda; Makkonen, Teemu; Sørensen, Nils Karl

    2017-01-01

    Finding a suitable partner is paramount for the success of innovation cooperation. Thus, this paper sets out to analyse the determinants of cross-border innovation cooperation in Denmark by focusing on partner selection. The aim of the article is to investigate determinants of partner selection...... by taking the location of the partners into account. In particular, the discussion is tied to the notion of varying knowledge bases firms utilize in their innovation creation processes. Firm level data from the 2010 Community Innovation Survey in Denmark was utilized to analyse cross-border innovation...... of innovativeness increase the likelihood of cross-border innovation cooperation. Accordingly, geographical proximity to international borders is found to have a significant, positive effect on selecting partners within the European Union. The multivariate probit model shows that the decision of choosing a domestic...

  4. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  5. Cooperative Monitoring Center Occasional Paper/13: Cooperative monitoring for confidence building: A case study of the Sino-Indian border areas

    Energy Technology Data Exchange (ETDEWEB)

    SIDHU,WAHEGURU PAL SINGH; YUAN,JING-DONG; BIRINGER,KENT L.

    1999-08-01

    This occasional paper identifies applicable cooperative monitoring techniques and develops models for possible application in the context of the border between China and India. The 1993 and 1996 Sino-Indian agreements on maintaining peace and tranquility along the Line of Actual Control (LAC) and establishing certain confidence building measures (CBMs), including force reductions and limitation on military exercises along their common border, are used to examine the application of technically based cooperative monitoring in both strengthening the existing terms of the agreements and also enhancing trust. The paper also aims to further the understanding of how and under what conditions technology-based tools can assist in implementing existing agreements on arms control and confidence building. The authors explore how cooperative monitoring techniques can facilitate effective implementation of arms control agreements and CBMS between states and contribute to greater security and stability in bilateral, regional, and global contexts.

  6. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  7. Cross-Border Cooperation as a Tool of Escaping Crisis Conditions in Slovenia

    Directory of Open Access Journals (Sweden)

    Simona KUKOVIČ

    2018-02-01

    Full Text Available The article puts an emphasis on cross-border cooperation between Slovenian municipalities and municipalities in neighboring countries of Croatia, Austria, Hungary and Italy. The aim is to analyze different paths and methods of cross-border cooperation Slovenian municipalities are using in order to further own development and somewhat escape fi nancial crisis conditions autonomously. In Slovenia every third municipality is border municipality, which means that at least small part of their territory borders with the territory of municipality in one of the neighboring four countries. Since the central government does not rigidly regulate cross-border cooperation, but allows municipalities autonomy, each municipality can in its own way develop various forms and degrees of cooperation which are more or less intensively refl ected in the proper functioning of these municipalities. In this sense we present our thesis that cross-border cooperation is becoming one of the important sources of investment and economic development of otherwise heavily crisis-affected local communities in Slovenia.

  8. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  9. Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?

    Science.gov (United States)

    Linnell, John D. C.; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Kusak, Josip; Skrbinsek, Tomaz; Buuveibaatar, Bayarbaatar; Bischof, Richard; Breitenmoser, Urs

    2016-01-01

    The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures. PMID:27331878

  10. Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?

    Science.gov (United States)

    Linnell, John D C; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Huber, Djuro; Reljic, Slaven; Kusak, Josip; Majic, Aleksandra; Skrbinsek, Tomaz; Potocnik, Hubert; Hayward, Matt W; Milner-Gulland, E J; Buuveibaatar, Bayarbaatar; Olson, Kirk A; Badamjav, Lkhagvasuren; Bischof, Richard; Zuther, Steffen; Breitenmoser, Urs

    2016-06-01

    The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures.

  11. Cross-border Co-operation and Policy Networks in West Africa

    DEFF Research Database (Denmark)

    Trémolières, Marie; Walther, Olivier

    This publication examines how policy actors involved in cross-border co-operation contribute to the regional integration process in West Africa. It uses a pioneering methodology, known as social network analysis, to visualise the formal and informal relationships between actors involved in cross...... West Africa to develop cross-border initiatives in a number of ways. Combining these two analyses with the perceptions of regional policy makers as to which border areas they consider as priorities for regional integration, the publication concludes with the analytical foundations for more effective......-border policy networks, showing that borders have notable and diverse impacts on exchanges of information and the relative power of networks. The report then analyses a range of regional indicators of co-operation potential, visually demonstrating that borders can also affect the ability of sub-regions within...

  12. Study on the Flexibility in Cross-Border Water Resources Cooperation Governance

    Science.gov (United States)

    Liu, Zongrui; Wang, Teng; Zhou, Li

    2018-02-01

    Flexible strategy is very important to cross-border cooperation in international rivers water resources, which may be employed to reconcile contradictions and ease conflicts. Flexible characters of cross-border cooperation in international rivers water resources could be analyzed and revealed, using flexible strategic management framework, by taking international cooperation protocols related to water from Transboundary Freshwater Disputes Database (TFDD) as samples from the number of cooperation issues, the amount of management layers and regulator agencies in cooperation organization and the categories of income (cost) distribution (allocation) mode. The research demonstrates that there are some flexible features of cross-border cooperation in international rivers water resources: Riparian countries would select relative diversification strategies related to water, tend to construct a flexible cooperation organization featured with moderate hierarchies from vertical perspective and simplified administrations from horizontal perspective, and adopt selective inducement modes to respect ‘joint and several liability’.

  13. Experiences in Regional Cross Border Co-operation in River Management. Comparing Three Cases at the Dutch–German Border

    NARCIS (Netherlands)

    Wiering, M.A.; Verwijmeren, J.A.; Lulofs, K.; Feld, C.

    2010-01-01

    Cross border co-operation is increasingly viewed as an obvious and logical consequence of an integrated perspective on river management. Consequently, we would expect an increase of cross border co-operation and collaboration in EU member states, through joint planning, co-management or

  14. Securing the Borders: Creation of the Border Patrol Auxiliary

    Science.gov (United States)

    2007-05-05

    DATES COVERED 00-00-2007 to 00-00-2007 4. TITLE AND SUBTITLE Securing the Borders: Creation of the Border Patrol Auxillary 5a. CONTRACT NUMBER...Substantial work experience which demonstrates an ability to (1) take charge, make sound decisions , and maintain composure in stressful situations; (2...applicable laws, court decisions , and law enforcement procedures; and 4. Develop and maintain contact with the network of informants. ¾ To qualify at

  15. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    on Integrated Management of Nuclear Materials to introduce modern technology development on nuclear safeguards, material accounting and control, and physical protection in October 2005. After the Tech Demo, a series of cooperation projects on nuclear safeguards and security were developed. To support the security of 2008 Beijing Summer Olympic Games, China Atomic Energy Authority (CAEA), worked with IAEA and the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA), carried out trainings for the officials from public security, border control and customs, etc. for strengthening the response capabilities to the Major Public Events (MPEs) and implemented physical security upgrades and radioactive sources recovery at facilities near Olympic venues. As a partner state of the Global Initiative to Combat Nuclear Terrorism, China organized a scenario-based workshop on radioactive detection and emergency response in cooperation with U.S. in December 2007, more than 60 Participants from 20 more countries participated the workshop. To strengthen the training capability on nuclear safeguards and security, CAEA and the IAEA jointly established a 'CAEA-IAEA Joint Training Center on Nuclear Safeguards and Security' in December 2006, located at China Institute of Atomic Energy (CIAE). International Cooperation is a very important element in developing global nuclear security regime. China is willing to make continuous efforts to promoting the development of nuclear security through international cooperation. (author)

  16. Border Security -- One Step Toward Resolving the Conflict in Iraq

    National Research Council Canada - National Science Library

    Bennett, Mark S

    2005-01-01

    .... It will do this by proving that border security is a key component to suppressing the Iraqi insurgency and that border security operations have been hindered by a lack of interagency coordination...

  17. The Analysis of the Determinants of Sustainable Cross-Border Cooperation and Recommendations on Its Harmonization

    Directory of Open Access Journals (Sweden)

    Joanna Kurowska-Pysz

    2017-12-01

    Full Text Available Cross-border partnerships are a distinctive example of inter-organizational cooperation, embedded, in terms of territory, in the neighboring borderland regions of two or more countries. The aim of this paper is to identify factors that contribute to the sustainable cross-border cooperation and affect motivation to increase cooperation between cross-border partners. The objective implementation is connected with the verification of a hypothesis referring to the possible impact of the European Union funds on the trans-boundary cooperation transformations. Results of desk research and quantitative research involving IDI, CATI, CAWI and CATI and PAPI data collection methods, implemented in the Polish–Czech borderland in 2016 were used in this paper. Research on the Polish–Lithuanian borderland was also used in the paper to conduct comparative analysis, useful to identify and evaluate factors motivating sustainable cross-border cooperation in the Czech–Polish borderland. The sustainable, cross-border and inter-organizational cooperation in the borderlands results from the simultaneous interaction of three groups of factors: (1 people and institutions (the quality of interpersonal relationships; (2 cross-border planning, procedures and support mechanisms (e.g., the possibility of jointly planning the cross-border cooperation and obtaining EU funds for the development of the borderlands as well as the availability of other funds helpful in this kind of cooperation; and (3 environment (historical affinity and geographical proximity of neighboring border regions, system support at the regional and local level in neighboring countries.

  18. Problems and Prospects of Cross-Border Cooperation in Tourism between Russia and Europe

    Directory of Open Access Journals (Sweden)

    Zaitseva Natalia A.

    2016-09-01

    Full Text Available The relevance of this research is related to the increasing role of tourism in the world in general and in border areas in particular. This article sets out to identify the problems and prospects of the development of cross-border cooperation in tourism between Russia and European countries. The authors focus on the scientific and theoretical aspects of cross-border cooperation and examine the role of tourism, and recreational potential and its effective use. The authors employ the methods of expert judgement and statistical analysis, refer to the surveys of Russian and European consumers showing their preferences, as well as to the authors’ own materials. The analysis makes it possible to have a deeper insight into the issue of cross-border cooperation in tourism between Russia and European countries and to assess the prospects of it. The authors provide an assessment of changes in the socio-economic relations between Russia and European countries and identify key problems in the development of cross-border cooperation in tourism. These problems relate to both macroeconomic and regional/industrial factors. The article is of interest for researchers studying cross-border tourism, the regional and local administrations of border areas of Russia and European countries, and representatives of the tourism business.

  19. Border Security: Barriers Along the U.S. International Border

    Science.gov (United States)

    2006-10-30

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL33659 Border Security...Presidencia,” May 12, 2005. Translation by CRS. Available at [http://www.presidencia.gob.mx/actividades/crecimiento/?contenido=18195& pagina =31]. Last

  20. Border Security: Immigration Issues in the 108th Congress

    National Research Council Canada - National Science Library

    Seghetti, Lisa M

    2004-01-01

    .... Prior to the terrorist attacks, the priorities for border security policy were beginning to shift from immigration-related issues to issues related to facilitating legitimate cross-border commerce...

  1. Cross-border cooperation in inner Scandinavia: A territorial impact assessment

    Energy Technology Data Exchange (ETDEWEB)

    Medeiros, Eduardo, E-mail: emedeiros@campus.ul.pt

    2017-01-15

    The use of territorial impact assessment procedures is gaining increasing relevance in the European Union policy evaluation processes. However, no concrete territorial impact assessment tools have been applied to evaluating EU cross-border programmes. In this light, this article provides a pioneering analysis on how to make use of territorial impact assessment procedures on cross-border programmes. More specifically, it assesses the main territorial impacts of the Inner Scandinavian INTERREG-A sub-programme, in the last 20 years (1996–2016). It focuses on its impacts on reducing the barrier effect, in all its main dimensions, posed by the presence of the administrative border. The results indicate a quite positive impact of the analysed cross-border cooperation programme, in reducing the barrier effect in all its main dimensions. The obtained potential impact values for each analysed dimension indicate, however, that the ‘economy-technology’ dimension was particularly favoured, following its strategic intervention focus in stimulating the economic activity and the attractiveness of the border area. - Highlights: • A territorial impact assessment method to assess cross-border cooperation is proposed. • This method rationale is based on the main dimensions of the barrier effect. • This method identified positive impacts in all analysed dimensions. • The economy-technological dimension was the most positively impacted one.

  2. Sustainable Planning of Cross-Border Cooperation: A Strategy for Alliances in Border Cities

    Directory of Open Access Journals (Sweden)

    Joanna Kurowska-Pysz

    2018-05-01

    Full Text Available In recent years, cooperation among nations has become a critical issue towards sustainable development of neighbor cities in border areas. In this regard, sustainable common planning approaches and policies are an increasing reality, particularly in European territories. Considering the significant amount of cross-border cooperation (CBC projects and strategies within Europe, it is crucial to promote research approaches that are able to identify the most positive approaches towards the establishment of alliances in border territories, serving as pivotal methodologies for achieving success. Contextually, the present study considered direct and indirect research methods and tools, literature reviews, data collection, computer-assisted telephone interviewing (CATI and computer-assisted web interview (CAWI, all applied over two European border cities: Cieszyn (Poland and Cesky Tesin (Czech Republic. These methods enabled the assembly of perspectives of local authorities, public and private institutions, non-governmental organizations, and entrepreneurs from the cities under study. Through the analysis of the collected data, five conditions have been identified for the success of strategic alliances in CBC projects: (i well defining the alliance goals; (ii ensuring participation in the alliance of various groups of stakeholders; (iii involvement of both partners with extensive experience in CBC; (iv ensuring the coherence of the key objective; and (v guaranteeing the alliance benefits both sides. These conditions might effectively contribute to achieve more successful outputs in CBC projects, highlighting the relevance of previously developed strategies on the definition of future approaches.

  3. Cross-border cooperation potential in fostering redevelopment of degraded border areas - a case study approach.

    Science.gov (United States)

    Alexandre Castanho, Rui; Ramírez, Beatriz; Loures, Luis; Fernández-Pozo, Luis; Cabezas, José

    2017-04-01

    Border interactions have reached unprecedented levels in recent decades, not only due to their potential for territorial integration but also considering their role in supranational processes, such as landscape reclamation, infrastructure development and land use planning on European territory. In this scenario, successful examples related to the redevelopment of degraded areas have been showing positive impacts at several levels, such as the social, economic, environmental and aesthetic ones which have ultimately related this process, positively, to sustainability issues. However, concerning to border areas, and due to their inherent legislative and bureaucratic conflicts, the intervention in these areas is more complex. Still, and taking into account previously developed projects and strategies of cross-border cooperation (CBC) in European territory it is possible to identified that the definition of common master plans and common objectives are critical issues to achieve the desired territorial success. Additionally, recent studies have put forward some noteworthy ideas highlighting that it is possible to establish a positive correlation between CBC processes and an increasing redevelopment of degraded border areas, with special focus on the reclamation of derelict landscapes fostering soil reuse and redevelopment. The present research, throughout case study analysis at the Mediterranean level - considering case studies from Portugal, Spain, Monaco and Italy - which presents specific data on border landscape redevelopment, enables us to conclude that CBC processes have a positive influence on the potential redevelopment of degraded border areas, considering not only urban but also rural land. Furthermore, this paper presents data obtained through a public participation process which highlights that these areas present a greater potential for landscape reclamation, fostering resource sustainability and sustainable growth. Keywords: Spatial planning; Land

  4. Crossing borders: Security and privacy issues of the European e-passport

    NARCIS (Netherlands)

    Hoepman, J.H.; Hubbers, E.; Jacobs, B.P.F.; Oostdijk, M.D.; Wichers Schreur, R.

    2008-01-01

    The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of

  5. Internal Security Cooperation under Functional Expectations: Initial Law Enforcement Europeanization - Case of Finland and Estonia

    Directory of Open Access Journals (Sweden)

    Ramon Loik

    2016-03-01

    Full Text Available Law enforcement cooperation as a central part of the EU internal security policy to combat cross-border organised crime and terrorism needs to be more effective by adopting specific provisions and tools. This paper argues that functional expectations require removal of barriers and construction of a common security area, but sometimes better cooperation in practice does not fit, as Europeanization of law enforcement still lacks understanding of objectives, values and principles for improving international trust, consensus, sincere cooperation and effective national coordination. The level of Europeanization of law enforcement could be evaluated as based on the level of implementation of the EU provisions on police cooperation related to practical enforcement, factors promoting or hindering law enforcement and changes in discursive practices due to EU provisions and professional socialisation processes. Some aspects of observed inertia characterizes the slow process of transition or tendencies for absorption in which resilience meets the necessary degree of flexibility allowing for some mutual learning and cooperation, but the result is expectedly a form of accommodation of needful policy requirements in the lack of substantial change perspective.

  6. Alternatives of Cross-Border Securities Settlement System in East Asia

    Directory of Open Access Journals (Sweden)

    Hee-Yul Chai

    2005-12-01

    Full Text Available The establishment of cross-border securities settlement system is a very important element of regional capital market integration. Despite its importance, relatively few arguments, both theoretical and practical, have been advanced on the subject. This paper aims to examine the alternatives of cross-border securities settlement system in East Asia, and analyse the feasibility and the advantages and disadvantages of each alternative. The paper underlines the need to develop a multi-currency DVP securities settlement system. The conceivable alternatives of East Asia's cross-border securities settlement system can be divided into decentralized system and centralized system. It is possible to consider a large array of institutional settings according to the depository/settlement methods. The comparison of the alternatives is based on economic efficiency, feasibility and institutional location of settlement system. In view of these criteria, it is argued that a 'big-bang' approach toward imperfectly cenralized system is the most desirable alternative.

  7. Sustainable rural development and cross-border cooperation

    Directory of Open Access Journals (Sweden)

    Stojanović Žaklina

    2009-01-01

    Full Text Available The concept of sustainable rural development comprises three aspects - social, economical and ecological. They are supposed to act in synergy, but, at the same time, these aspects are supposed to be competitive. Agriculture, as a traditional activity of rural economy, contributes to the sustainable development of rural areas only if there is an adequate resources management. If not, there will be a significant degradation of rural environment. These are the reasons why sustainable agriculture development is emphasized since it maximizes productivity and minimizes negative effects on nature and human resources. In this context, one should observe the connection between agriculture and tourism existing in the EU, where the application of sustainable agricultural development concept produces external effects connected to biodiversity protection and environment in rural areas. These become a good foundation for the development of rural and ecotourism. EU enlargement induced diversification of support programmes that EU gives to the candidate countries, as well as to those who are just entering the process of stabilization and association to the EU. Through cross-border cooperation projects, many goals can be accomplished, among which aspiration for promotion of sustainable economical and social development in border regions is one of the leading. Knowing that these regions are usually passive and underdeveloped, the projects of cross-border cooperation could induce development of those activities in local economy, which could bring better living conditions and economic prosperity on the one hand, and protection of environment on the other. Examples of this kind of projects in Serbia can usually be found in rural and ecotourism development.

  8. Institutionalizing cross-border cooperatives on European level in the energy sector

    International Nuclear Information System (INIS)

    Paulusma, A.C.

    2008-01-01

    The third energy package proposes the establishment of an Agency for the Cooperation of Energy Regulators (ACER) and the establishment of a European Network of Transmission System Operators for Electricity (ENTSOE) and a European Network of Transmission System Operators for Gas (ENTSOG). This legislative initiative is a response to the need to further liberalise the energy sector and to create one single energy market. The proposals wish to remedy the lack of regulatory oversight for cross border issues and the existence of a regulatory gap on cross-border issues. This article addresses these proposals and places them in a historical context. The proposals indicate that the European legislator to some degree intends to institutionalize cross border cooperation of regulators and of transmission system operators. So far cross-border cooperation mostly has been brought about on a voluntary basis and not on the basis of European law. Also this cooperation takes place on a voluntary basis and largely outside the scope of the European Commission. If the proposals are excepted they will result in new forms of cooperation in the energy sector. The Agency will be a community body with legal personality that, besides having an advisory role, will in some circumstances be able to take binding decisions. Therefore it will entail more than voluntary cooperation and be a step closer to the establishment of a European regulator. With the creation of ENTSOG and ENTSOE cooperation between transmission system operators will for the first time be obligatory and take place on the basis of European legislation. It will therefore be a new phenomenon. Nevertheless, it is not always clear from the proposals what the result in practice will be nor how the new organizations will relate to each other, to the Commission and to the national regulators and transmission system operators. Currently, the main question is whether the proposals will be adopted by the Council and the European

  9. Food security in a world without borders.

    Science.gov (United States)

    de Haen, Hartwig; Thompson, Brian

    2003-01-01

    is through community nutrition programmes that encourage the full participation and co-operation of the entire community, maximise the utilisation of local resources, grasp the benefits of new technologies for productivity gains, involve multiple sectors and engage strong political commitment. The international community will be judged by its treatment of its most vulnerable members. The international community has repeatedly declared that it is dedicated to the eradication of poverty. Eliminating hunger and malnutrition is a vital first step. The political will to fight hunger and a firm commitment to invest in agriculture' and rural development are critical elements in any effort to achieve sustainable alleviation of hunger and poverty. This meeting and the WFS:FYL provide the additional impetus to meet the challenge of achieving food and nutritional security in a world without borders and free from hunger and malnutrition.

  10. Defense Security Cooperation Agency Vision 2020. Update 1

    Science.gov (United States)

    2015-10-01

    the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers

  11. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  12. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  13. MATRIX FOR COOPERATION IN THE CROSS-BORDER AREAS

    Directory of Open Access Journals (Sweden)

    Marcela ȘLUSARCIUC

    2014-06-01

    Full Text Available The crossborder areas have no constitutional competences, therefore most of the times they are not part of the decision making process in the agreements in cross-border relationships. Although the states are the ones to decide the policies and the agreements based on their own legal rules, considering the shape of the new European Union, they should more and more accept the conditionality of a regional overstate structure linked only to some geographical parts of the countries. The present paper proposes a theoretical and intuitive frame for assessing the cross-border areas based on the factors that are influencing it, starting from a listing of them, secondly grouping them in separating and uniting, then finding the significant differences. The matrix of factors can be used for conflict resolution or for development of cross-border areas as long as it shows the points that will be a potential obstacle or a source for cooperation.

  14. The Treaty of Lisbon and the European Border Control Regime

    Directory of Open Access Journals (Sweden)

    Marianne Takle

    2012-08-01

    Full Text Available The question raised in the article is how the new provisions of the Lisbon Treaty and the Stockholm programme concerning the EU’s asylum and migration policy might consolidate existing trends within the European border control regime. The regime is defined by a combination of three features: (i a harmonisation of categories among the EU/Schengen member states, (ii a growing use of new technology in networked databases and (iii an increasing sorting of individuals based on security concerns. Although none of these features is new, the combination gives a new impetus to the European border control regime. The article concludes that the Lisbon Treaty and the Stockholm programme consolidate and strengthen existing trends. This implies that policies on border control, asylum, immigration, judicial cooperation and police cooperation are consolidated in a broader approach to border control, and that there is a strengthening of EU foreign policy within the European border control regime. The boundaries between previously dispersed policy areas are blurred. The combination of different aspects of security and various levels of authority requires coordination of policies with substantially different goals, and goes beyond mere border control.

  15. THE RELATION BETWEEN TERRITORIAL COLECTIVITIES IN FRANCE AND THE EUROPEAN UNION. THOUGHTS ON THE CROSS-BORDER COOPERATION

    Directory of Open Access Journals (Sweden)

    CLAUDIA BARBOIU-GILIA

    2012-05-01

    Full Text Available France, one of the founding members of the European Union, is a unitary state from the administrativeterritorial point of view, based on deep centralism. Having territorial collectivities with highly complex structure (communes, departments, regions, sui-generis collectivities and overseas collectivities, France committed itself to cooperation not only between its own administrative structures, but also to cross-border cooperation within the European Union. After showing reluctance to external actions underwent by territorial collectivities, France ended up with acknowledging this right of its territorial collectivities within the «decentralized cooperation», expressly brought under regulation by the Law of 6 February 1992. According to the law, there is no need for any ratification on behalf of the State to allow cooperation between territorial collectivities, within the boundaries of their competence. The Law of 1992 thus authorized the territorial collectivities to close agreements with other collectivities from abroad. Furthermore, the Law of 4 February 1995 allowed several treaties with the border states to be signed, thus creating the SAAR-LOR-LUX region (an European cross-border region that made way for cooperation between Germany, France and Luxembourg. The French legislation also allowed several European districts to be created, acting as local groups for cross-border cooperation, created on the initiative of territorial collectivities. The aim of our study is to identify the main relationship between territorial collectivities in France and EU and to analyze the cooperation instruments used by the French collectivities in order to foster the cross-border cooperation.

  16. Concepts and Practices of Cooperative Security

    DEFF Research Database (Denmark)

    Keating, Vincent; Wheeler, Nicholas J

    2013-01-01

    This chapter considers how the security dilemma can be overcome in ways that promote cooperation and even trust, mitigating or transcending the international uncertainty that can otherwise inhibit interstate cooperation. It argues that there are two mechanisms to create the trust necessary...... for the development of a security community, Charles Osgood's GRIT strategy and a unilateral 'leap of trust.' Both of these, however, initially require elites to develop security dilemma sensibility. The long-term stability of security communities is fundamentally linked to the presence of embedded trust among...

  17. [U.S.-Mexico cross-border cooperation in research on diabetes mellitus type 2].

    Science.gov (United States)

    Canela-Soler, Jaume; Frontini, María; Cerqueira, Maria Teresa; Ruiz-Holguín, Rosalba; Díaz-Apodaca, Beatriz A

    2010-09-01

    To describe and analyze, utilizing a case study approach, the U.S.- Mexico Border Diabetes Prevention and Control Project, a health research cooperation initiative incorporating the participation of federal, state, and local institutions of both countries. A model of equal representation, participation, consensus, and shared leadership was used, with the participation of more than 130 institutions. A sample of 4 020 people over 18 years of age was obtained by a random, multistage, stratified, clustered design. A questionnaire about diabetes mellitus type 2 (DM2) and health was applied. The statistical analysis took into account the design effect. The prevalence of diagnosed DM2 was 14.9% (95% confidence interval [95% CI]: 12.5-17.6) and the prevalence of diagnosed DM2 adjusted by age was 19.5% (95% CI: 16.8-22.6) on the Mexican side of the border and 16.1% (IC95%: 13.5-19.2) on the U.S. border side. There were differences between the DM2 prevalence and risk factors along the border. The U.S.-Mexico Border Diabetes Prevention and Control Project allowed the border zone between the two countries to be considered, for the first time ever, as a unit for epidemiological research. A shared understanding among all participating institutions and entities of sociopolitical structures and procedures is required for effective border health cooperation initiatives.

  18. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  19. Knowledge of Practice: A Multi-sited Event Ethnography of Border Security Fairs in Europe and North America

    NARCIS (Netherlands)

    Baird, T.E.

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce

  20. Czech-German Cross-Border Cooperation in the enlarged European Union

    Czech Academy of Sciences Publication Activity Database

    Houžvička, Václav

    2005-01-01

    Roč. 3, č. 1 (2005), s. 1-3 ISSN 1214-7567 R&D Projects: GA AV ČR(CZ) IBS7028301 Institutional research plan: CEZ:AV0Z70280505 Keywords : European Union * local elites * cross/border cooperation Subject RIV: AO - Sociology, Demography

  1. INFORMATION SECURITY IN LOGISTICS COOPERATION

    Directory of Open Access Journals (Sweden)

    Tomasz Małkus

    2015-03-01

    Full Text Available Cooperation of suppliers of raw materials, semi-finished products, finished products, wholesalers, retailers in the form of the supply chain, as well as outsourcing of specialized logistics service require ensuring adequate support of information. It concerns the use of appropriate computer tools. The security of information in such conditions of collaboration becomes the important problem for parties of contract. The objective of the paper is to characterize main issues relating to security of information in logistics cooperation.

  2. Nuclear Security in Action at Malaysian Borders

    International Nuclear Information System (INIS)

    Dahlstrom Danielle

    2013-01-01

    ''For Malaysia, trade has to be a transparent'', explained Raja Adnan, the Director General of the Malaysian Atomic Energy Licensing Board (AELB). ''Goods are imported and exported, not just between two countries, but are in transit between several countries. Nuclear security measures help to guarantee open trade and makes sure that everyone is trading responsibly,'' emphasized Adnan. Officials from AELB prepare for a joint Indonesian-Malaysian exercise in effective border control by reviewing their national standard operating procedures (SOPs) on nuclear security, which were developed in close coordination with the IAEA

  3. Diabetes among Latinos in the Southwestern United States: border health and binational cooperation

    Directory of Open Access Journals (Sweden)

    Ryan P. Casey

    2014-12-01

    Full Text Available This analysis reviews cooperation between the four border states of the United States of America (Arizona, California, New Mexico, and Texas and international partners in Mexico with regard to type 2 diabetes among Latinos. Binational cooperation, academic collaboration, preventative health initiatives, and efforts to improve health care access for the border population are highlighted. This meta-analysis of the literature points out causative factors of the increased type 2 diabetes prevalence among Latinos in the United States; an inverse correlation between diabetes and education and socioeconomic level; contributing factors, including barriers with language, health care payment, transportation, and underestimating diabetes implications; and a lack of social and environmental support for disease management. Medical and indirect costs in socioeconomic terms are also included. Cooperation between the United States and Mexico may be beneficial to promoting further collaborative efforts between these nations, and serve as a template for greater cooperative efforts to mitigate the substantial public health and socioeconomic implications of type 2 diabetes globally.

  4. Improving food security empowerment in Indonesia- Timor Leste border

    Science.gov (United States)

    Dewi, G. D. P.; Yustikaningrum, R. V.

    2018-03-01

    Post Referendum 1999, Indonesia and Timor Leste have a strategic challenge to provide food consistently around the border. This research intended to discover an appropriate strategy to tackle fragility of food security in the land border of Indonesia-Timor Leste, to improve collaborative actions between parties, as well as, opportunity to actualize food cross-border trading between local farmers and factories. For the result, there are two approaches will be applied. First, the empowerment term refers to the strategy of empowerment in strengthening the capability and capacity of human capital as one of the determinant factors of the resilience and self-sufficiency achievement. Second, the gender approach looks at the women and men build confidence, resilience, and independence which one of them through an educational intervention that enable the local people to manage food chain. Atambua is a region count as relatively as high poverty, poor human capital, weak quality and competitiveness of agriculture products, livestock and fishery, SMEs, and infrastructure. Thus, field study research is applied to find the actual and strategic effort aim to lead the achievement of food security and to engage Atambua over food trade to Timor Leste.

  5. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  6. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    Science.gov (United States)

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  7. Knowledge transfer and innovation in cross-border cooperation programmes between Finland and Russia

    DEFF Research Database (Denmark)

    Makkonen, Teemu; Williams, Allan; Weidenfeld, Adi

    2017-01-01

    Cross-border cooperation (CBC) at the European Union’s (EU) external borders has been promoted via programmes, such as the European Neighbourhood and Partnership Instrument (ENPI), funded jointly by the EU and participating countries. However, little empirical attention has been laid to these pro...... the actors in opposing sides of the border, is actually the main factor that facilitates and creates potential for learning, knowledge transfer and innovation to take place in the Finnish-Russian cross-border region....... to these programmes in terms of their role in enhancing cross-border knowledge transfer and innovation, particularly in the field of tourism. To shed light on the issue, semi-structured interviews were conducted with representatives of (12 Russian; 12 Finnish) organisations that had participated in ENPI CBC funded...... tourism related Finnish-Russian cross-border projects. The results shed light on the possibilities of and obstacles to cross-border knowledge transfer and innovation. ENPI CBC programmes between Finland and Russia are highly relevant for successful cross-border knowledge transfer and innovation...

  8. Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security

    Science.gov (United States)

    Yilmaz, Bahadır.

    2013-06-01

    Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.

  9. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  10. Economic Co-operation Across the Finnish-Russian Border - Factors of Sluggish Development and Success of Enterprises

    OpenAIRE

    Rautio, V.; Tykkylaeinen, M.

    2000-01-01

    The post-Cold War era in Europe in the 1990s has caused people to recognize the complexity of economic development and economic co-operation. The opening of borders has not always meant an increase cross-border economic activities in general. On the contrary, the adverse socio-economic development of many border areas has been unanticipated. The Finnish-Russian border is one example of this dissonance. This paper analyses the operation of Finnish companies in economic activities in Russ...

  11. The Existence Of Leading Islands Securing And The Border Areas Unitary State Of Indonesia An Analysis In Law Perspective

    Directory of Open Access Journals (Sweden)

    Nazali

    2015-08-01

    Full Text Available Abstract The research was carried with the aim to discover the existence of securing the foremost islands and state border region of the Republic of Indonesia reviewed from a legal perspective which is directly related to the existence of security and dispute resolution methods as well as the governance of the foremost islands and border region in Kalimantan which bordering Malaysia. This study was conducted in Nunukan district and the surrounding provinces of Kalimantan in this research method that used is normative legal analysis data with juridical and qualitative descriptive approach. The results showed that the security of foremost islands and border region of law perspective in accordance with the Law No. 34 of 2004 regarding the Indonesian National Army has not been implemented to the fullest to realize the security of foremost islands and border region as the frontline of the Republic of Indonesia. The existence of leading islands securing and the border region of the Republic of Indonesia still contain many weaknesses in terms of both governance and security.

  12. Managing European Cross Border Cooperation Projects on Sustainability: A Focus on MESP Project

    Directory of Open Access Journals (Sweden)

    Corrado Schenone

    2017-01-01

    Full Text Available International cooperation is a must to achieve the goal of sustainable development, since only through cross border actions’ complex issues like environmental degradation can be faced. Supranational initiatives and shared objectives are the only path for getting a durable and effective green strategy, which transcends boundaries or governments and fosters a common effort for sustainability through networking. The European Neighborhood and Partnership Instrument (ENPI aims at reinforcing cooperation between the European Union (EU and partner countries’ regions placed along the shores of the Mediterranean Sea. To this extent, MESP (Managing the Environmental Sustainability of Ports for a durable development can be considered as a typical cross border cooperation project, willing to create a sustainable environmental management of port in northern and southern shores of the Mediterranean basin. This has been achieved through the development of specific guidelines towards environmental sustainability and the collection of common tools, methodologies, good practices and innovations focused on pollution reduction that can be replicated in Mediterranean ports and further. This was possible through the creation of a strong cooperation network and long-lasting collaborations among partners and stakeholders such as harbour cities, port authorities, universities, research centres and scientific skills.

  13. A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhipeng Tang

    2016-01-01

    Full Text Available VCC is a computing paradigm which consists of vehicles cooperating with each other to realize a lot of practical applications, such as delivering packages. Security cooperation is a fundamental research topic in Vehicular Cloud Computing (VCC. Because of the existence of malicious vehicles, the security cooperation has become a challenging issue in VCC. In this paper, a trust-based model for security cooperating, named DBTEC, is proposed to promote vehicles’ security cooperation in VCC. DBTEC combines the indirect trust estimation in Public board and the direct trust estimation in Private board to compute the trust value of vehicles when choosing cooperative partners; a trustworthy cooperation path generating scheme is proposed to ensure the safety of cooperation and increase the cooperation completion rates in VCC. Extensive experiments show that our scheme improves the overall cooperation completion rates by 6~7%.

  14. Security cooperation with China: Analysis and a proposal. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Wilborn, T.L.

    1994-11-25

    The author examines U.S.-China security cooperation before Tiananmen Square; the strategic context in which it took place; and the strategic environment of U.S.-China relations at the present time. As a member of the U.N. Security Council and one of the five acknowledged nuclear powers, China`s actions can influence a wide range of U.S. global interests. Continued U.S.-China security cooperation will contribute to stability in an important region of the world and help achieve U.S. global objectives. He concludes that, although the reasons which justified the program of security cooperation with China during the cold war are irrelevant today, security cooperation and military-to-military relations are highly desirable in the current strategic environment.

  15. Prospects for the Cross-Border Cooperation between Russia and Poland in the Field of Tourism

    Science.gov (United States)

    Zaitseva, Natalia A.; Korneevets, Valentin S.; Semenova, Lyudmila V.

    2016-01-01

    The relevance of the research topic is driven by the increasing role of cross-border cooperation for economic development of regions of the neighbouring countries located in the immediate vicinity to the border, as well as for the tourism development. The purpose of scientific research, the results of which are presented in the article, was the…

  16. Re-Casting the U.S.-Mexico Border Security Net

    Science.gov (United States)

    2014-03-01

    the best fence money can buy , and they counter us with a 2,500-year-old technology.214 The incident proved that these organizations are extremely...created a demand that has attracted illicit activity. DTOs have expanded their franchises to increase the size of their profits. Border security

  17. Cooperative monitoring and its role in regional security

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  18. Modern aspects of cross-border cooperation on the example of the functioning of Euroregion «Upper Prut»

    Directory of Open Access Journals (Sweden)

    O. O. Hrushko

    2015-07-01

    Full Text Available In the article the current aspects of cross­border cooperation between regions of Ukraine in the framework of the EU Eastern Partnership and in the frame of «Upper Prut» in particular are discussed. The retrospective of the establishment of cross­border ties of Chernivtsi oblast with the regions of Moldova and Romania and evolution of this cooperation (from Euroregion to implementation of the projects funded by EU programs is given. Also the efficiency of the Joint Operational Programme «Romania­Ukraine­Republic of Moldova 2007­2013» for the Ukrainian side border is analyzed. The research of public opinion on influence of the European integration process and its cross­border cooperation was. It was determined that the CBC projects implementation not only positively affects on the development of the region, but also is an effective mechanism for the formation of public opinion on the movement of Ukraine towards the EU. It is concluded that trans­regional cooperation today is looking for new models of national infrastructures, which includes power systems, transportation and communication network. The development of a common policy on technogenic and ecological safety, prevention of pollution of river basins, and the development of tourism and recreational activities also must be included in such new model. The implementation of joint strategies must be established and have to include the equalization of socio­economic and political development of border regions.

  19. Promotion of Cultural Tourism through Cooperation in the Cross-Border Area

    Directory of Open Access Journals (Sweden)

    Rădulescu Corina Michaela

    2017-01-01

    Full Text Available The uniqueness and richness of culture and heritage in the cross-border area: Hungary, Slovakia, Romania and Ukraine (HU-SK-RO-UA creates the opportunity for developing cultural tourism through innovative tourism and integrated tourism products, with the result of promoting tourism, generally in Europe and especially in Trans-Carpatic Region. For this purpose, new projects initiated can achieve better cooperation and coordination between the relevant stakeholders in the tourism sector, as well as to develop and implement joint tourism strategies. The paper presents a project proposal on promoting the culture and heritage in HU-SK-RO-UA area, through tourism function. The main activities designed in the project lead to joint cross-border tourism management in order to increase the attractiveness of cultural sites and joint cross-border touristic offer, by strengthening joint new touristic products and organizing joint cultural events.

  20. Smart border initiative: a Franco-German cross-border energy optimisation project

    International Nuclear Information System (INIS)

    2017-01-01

    Integrated and optimised local energy systems will play a key role in achieving the energy transition objectives set by France and Germany, in line with the Energy Union's goals, and contribute to ensuring a secure, affordable and climate-friendly energy supply in the EU. In order to capitalise on the French and German expertise and experiences in developing such systems and to continue strengthening the cross-border cooperation towards a fully integrated European energy market, both Governments have decided to launch a common initiative to identify and structure a cross-border energy optimisation project. Tilia and Dena have undertaken this mission to jointly develop the Smart Border Initiative (SBI). The SBI will, on the one hand, connect policies designed by France and Germany in order to support their cities and territories in their energy transition strategies and European market integration. It is currently a paradox that, though more balanced and resilient energy systems build up, bottom-up, at the local level, borders remain an obstacle to this local integration, in spite of the numerous complementarities observed in cross-border regions, and of their specific needs, in terms of smart mobility for example. The SBI project aims at enabling European neighbouring regions separated by a border to jointly build up optimised local energy systems, and jointly develop their local economies following an integrated, sustainable and low-carbon model. On the other hand, this showcase project will initiate a new stage in the EU electricity market integration, by completing high voltage interconnections with local, low voltage integration at DSO level, opening new optimisation possibilities in managing the electricity balance, and enabling DSOs to jointly overcome some of the current challenges, notably the increased share of renewable energy (RE) and ensuring Europe's security of supply

  1. BORDERS AS AN INTERDISCPLINARY PROBLEM

    Directory of Open Access Journals (Sweden)

    Duško Vrban

    2018-04-01

    Full Text Available This article deals with the concepts of space and territoriality in law and politics seen through reflexion on borders, which are understood primarily as forms of identification and the basis for nation-building. While in the classical antiquity, borders were seen as exclusionary defensive structures, in modern international law in the 18th and 19th centuries, they became spaces for the delimitation of states sovereign territories. The author attempts to enligthen the symbolic significance of borders in modern European history, which have been connected with imperial designs, nationalist discourses and political imaginaries. Border rhetoric often emphasised territorial inclusions and exclusions relied to the concepts such as sovereignty, security and natural living space (“natural borders”. The concept of borders is also related to the understanding of the division of Earth’s surface into areas defined as regions. Regions may construct and transcend natural and political borders. Although, borders have been through world history sites of conflict, they also build ways of interconnections between locals and neighbours. The struggle over cultural and political domination and attempts to integrate and assimilate border populations were mostly reflected into deliberate linguistic policies relating to the language of administration and the public sphere. After the Second world war, the perception of borders have changed and the new understanding of borders have prevailed, based upon the idea of cooperation and the recognition of local traditions and minority rights. The principle of uti possidetis iuris was applied in order to prevent redrawing of the borders of new states and to maintain the territorial stability of the regions. But the recent migration crisis and security concerns in Europe and America have re-actualised the perception of state borders as defensive structures. Moreover, introduction of new technologies, such as ICT and the

  2. Opportunities for Cross-Border Entrepreneurship Development in a Cluster Model Exemplified by the Polish–Czech Border Region

    Directory of Open Access Journals (Sweden)

    Joanna Kurowska-Pysz

    2016-03-01

    Full Text Available The subject of the paper is the analysis and evaluation of cross-border entrepreneurship development opportunities on the basis of cross-border cooperation, which has gradually evolved from consisting of bilateral partnerships to a networking model or even a cluster. The study conducted at the Polish–Czech border area indicates that, in terms of the development of cross-border cooperation, the economic sphere is lagging far behind social activities such as culture, education and tourism. At the same time, Polish and Czech enterprises are not sufficiently mobilized to develop cross-border entrepreneurship, although a number of support instruments in this regard have been proposed. Sustainable development of the border should take into account both social and economic aspects. An important research problem therefore becomes determining the possibility of boosting the development of cross-border entrepreneurship on the basis of the existing forms of cross-border cooperation, including cooperation in the social sphere. The aim of this paper is to define the conditions and opportunities for the development of cluster cooperation in the area of cross-border entrepreneurship. The author has attempted to resolve whether the intensity of cross-border cooperation can be a factor which mobilizes companies to develop their cross-border entrepreneurship and whether cross-border entrepreneurship can be further developed within the cluster model.

  3. An Analysis on Religious-Ethnic Geopolitics, Security and Development in Border Towns. Case Study: Sistan and Baluchestan

    Directory of Open Access Journals (Sweden)

    ISSA EBRAHIMZADEH

    2012-01-01

    Full Text Available Borders and border areas require security measures, which are very important to create security on the borders. The paper also analyzes the role of ethnic groups living near borderlines. Iran is an ethnically varied country and distinguishing characteristics of ethnic groups from each other in Iran is particularly concentrated on language, religion and ethnic components. These ethnic groups have been scattered as certain minority groups in border provinces and areas. The presence of Iranian nationals in the Western, Eastern and Northern borders which are contiguous with countries with the same religion and language creates by itself an appropriate context for the occurrence of ethnic crises in border areas and boundary underdevelopment is an another cause for this problem. In addition, the three components, namely religion, ethnicity, and language, should be taken into consideration in adopting policies and strategies to deal with these areas. In Sistan and Baluchestan, Iran, there are effective national strategies taking advantage of the presence and existence of religious and ethnic groups in the border towns, adopting security and development policies taking into account these two issues. They have a deep effect on regional development and national solidarity due to construction activities and infrastructure investments on the one hand and reducing insecurity and trafficking on the other hand.

  4. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  5. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  6. Securing cooperation from persons supplying statistical data.

    Science.gov (United States)

    AUBENQUE, M J; BLAIKLEY, R M; HARRIS, F F; LAL, R B; NEURDENBURG, M G; DE SHELLY HERNANDEZ, R

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary.Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary.Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made.Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements.The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information.Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and Neurdenburg

  7. Energy Security in Asia: Prospects for Regional Cooperation

    OpenAIRE

    Lucas, Nigel

    2014-01-01

    Three case studies illustrate some of the secondary consequences of the search for energy security and its relationship to regional trade and cooperation: the role of the People’s Republic of China, the emerging market in biofuels in Southeast Asia, and diverse feed-in tariffs for renewable energy. The three main ways regional cooperation can strengthen national policies on energy security are (i) sharing information and knowledge to create a sound evidence base for policies, (ii) agreeing on...

  8. Sustainable Development Aspects in Cross-Border Cooperation Programmes: The Case of Macedonia and Albania

    Directory of Open Access Journals (Sweden)

    Klodjan Seferaj

    2014-12-01

    Full Text Available The cross-border area between Albania and Macedonia can be considered as a region with agrarian or industrial-agrarian economy, although the overall picture should take into account significant contrasts within the region, between the two countries, but also between the southern and northern part, and between mountainous areas and lowlands. Agriculture, agribusiness, light industry, mining, energy production and tourism are the main economic sectors, which also have the biggest potential in the cross-border region. Both countries are gaining experience in EU funded cross-border cooperation programmes with other neighbouring countries and with each other. The scope of the research is the evaluation and analysis of the Integrated Pre-accession Assistance (IPA Cross-border Cooperation (CBC Programme Macedonia-Albania 2007-2013 and its sustainable development aspects. The research is trying to assess the impact of the programme since its start in 2007 and the impact of the implemented grants on the sustainable development. The importance of the sustainable development aspect is recognized and is formally included into various national strategic documents, however implementation is often problematic and sustainability aspects need to be examined on a more concrete level. The methodology used was qualitative with research tools such as desk studies of relevant program documentation, strategic and planning documentation and other relevant published materials. The desk review considered well over 40 documents relevant to the program, most of which were shared by the Ministry of European Integration (MoEI and other actors.

  9. The new strategic balance and cooperative security

    International Nuclear Information System (INIS)

    Simpson, J.

    1995-01-01

    The new strategic balance and cooperative security in the world now is discussed including the following issues: strategic balances and the features of the old strategic environment; the main characteristics of the new political and security environment; the future role of nuclear weapons; the role of arms limitation agreements

  10. U.S.-China Radiological Source Security Project: Continuing And Expanding Bilateral Cooperation

    International Nuclear Information System (INIS)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-01-01

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy's National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  11. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  12. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  13. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  14. The Theoretical Prerequisites for the Emergence of Interactive Marketing in the System of Management of Cross-Border Economic Cooperation

    Directory of Open Access Journals (Sweden)

    Gegedosh Kristian V.

    2017-06-01

    Full Text Available The article attempts to characterize the basic theoretical aspects of marketing in cross-border cooperation. It has been found that, in the current context of the IT sector development, it is of substantial relevance to apply the benefits of online marketing together with integrating it into the international regional cross-border economic relations. The author’s own conception of the use of interactive marketing to further improve interaction of the entities of neighbouring countries in various areas of cross-border cooperation (CBC has been proposed. A layout of web site interface of the interactive cross-border business center has been developed on the example of the euroregional formation of member countries in the Interregional Association «Carpathian Euroregion». One of the main challenges to the development of the CBC today is the lack of a well-functioning mechanism of interaction of «local authorities – regional development agencies – business structures». However, after building a model for development of a cross-border economy based on interactive marketing principles, the border areas on both sides will be able to better develop the regional economy and, consequently, the social well-being of the territory as a whole.

  15. Beyond Fashoda: Anglo-French security cooperation in Africa since St-Malo

    OpenAIRE

    Chafer, Tony; Cumming, G.

    2010-01-01

    This article focuses on Anglo-French security and defence collaboration. It begins by setting out the lack of UK-French security cooperation in Africa from the colonial to the early post-Cold War era. It then shows how there has been a degree of institutionalization of Anglo-French relations, alongside greater cooperation in terms of European Security and Defence Policy missions and the training of African peacekeepers. Next, this study explains the recent evolution of UK-French security rela...

  16. 33 CFR 165.709 - Security Zone; Charleston Harbor, Cooper River, South Carolina.

    Science.gov (United States)

    2010-07-01

    ..., Cooper River, South Carolina. 165.709 Section 165.709 Navigation and Navigable Waters COAST GUARD... § 165.709 Security Zone; Charleston Harbor, Cooper River, South Carolina. (a) Regulated area. The Coast Guard is establishing a fixed security zone on all waters of the Cooper River, bank-to-bank and surface...

  17. Securing co-operation from persons supplying statistical data

    Science.gov (United States)

    Aubenque, M. J.; Blaikley, R. M.; Harris, F. Fraser; Lal, R. B.; Neurdenburg, M. G.; Hernández, R. de Shelly

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary. Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary. Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made. Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements. The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information. Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and

  18. Small Border Traffic and Cross-Border Tourism Between Poland and the Kaliningrad Oblast of the Russian Federation

    OpenAIRE

    Anisiewicz Renata; Palmowski Tadeusz

    2014-01-01

    Polish and Russian cross-border cooperation is governed by lawful agreements. The enlargement of the Schengen Area had a significant impact on Kaliningrad Oblast relations and cross-border cooperation with its neighbours. The introduction of visas between Poland and Russia hindered and restricted local border trade which had for years been the only measure mitigating social and economic problems of the cross-border regions. Nevertheless, border traffic between Poland and Kaliningrad grew stea...

  19. Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq

    National Research Council Canada - National Science Library

    Thies, Douglas G

    2007-01-01

    .... airpower security cooperation with Pakistan and Egypt. The central argument is that these cases suggest that the key variables affecting the success of airpower security cooperation as a diplomacy instrument are: 1...

  20. Cross-Border Tourism and its Significance for Tourism Destinations

    Directory of Open Access Journals (Sweden)

    Roman LIVANDOVSCHI

    2017-06-01

    Full Text Available This article is concerned with cross-border tourism. It enhances the importance of cross-border cooperation in tourism. Cross-border cooperation is a form of international cooperation, along with interregional, transitional and trans-frontier cooperation. Cross-border regions often share the same historical and cultural traditions and attractive natural landscapes, such is the case of the Republic of Moldova and Romania. In both cases, cross-border regions can benefit from cooperationcooperation can help create greater diversity and differentiation of the range of tourism and environmental products; create economies of scale and make promotion more effective, and can help better address specific problems or issues for tourism development.

  1. Small Border Traffic and Cross-Border Tourism Between Poland and the Kaliningrad Oblast of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Anisiewicz Renata

    2014-06-01

    Full Text Available Polish and Russian cross-border cooperation is governed by lawful agreements. The enlargement of the Schengen Area had a significant impact on Kaliningrad Oblast relations and cross-border cooperation with its neighbours. The introduction of visas between Poland and Russia hindered and restricted local border trade which had for years been the only measure mitigating social and economic problems of the cross-border regions. Nevertheless, border traffic between Poland and Kaliningrad grew steadily, to exceed four million in 2012.

  2. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    Protection’s office responsible for securing the United States’ land border in the Detroit area. PoD provides a wide rage of cargo processing functions...a wide range of threats. Improper trademark labeling, tariffs, import quotas, agricultural issues, narcotics, human trafficking, and terrorism are...unloaded a truck, CBP agents search through the cargo. They open boxes, use hand-held radiation detectors, canines , and x-ray machines to inspect the

  3. Measuring the Effectiveness of Border Security Between Ports of Entry

    Science.gov (United States)

    2010-01-01

    ts of migration. Massey, Durand, and Malone (2003) argue that neoclassical theory has limited explanatory power and, in fact, that immigration is...interpreted in the context of dif- ferent theories of how and why immigration occurs. Various theories explain immigration— for example, as a migrant’s...Durand, and Malone, 2003). One theory of how border security aff ects migration is that migrants employ a cost-benefi t calculation when deciding

  4. Do Coffee Farmers Benefit in Food Security from Participating in Coffee Cooperatives? Evidence from Southwest Ethiopia Coffee Cooperatives.

    Science.gov (United States)

    Shumeta, Zekarias; D'Haese, Marijke

    2018-06-01

    Most coffee in Ethiopia is produced by smallholder farmers who face a daily struggle to get sufficient income but also to feed their families. At the same time, many smallholder coffee producers are members of cooperatives. Yet, literature has paid little attention to the effect of cooperatives on combating food insecurity among cash crop producers including coffee farmers. The objective of the study was to investigate how coffee cooperative membership may affect food security among coffee farm households in Southwest Ethiopia. The study used cross-sectional household data on income, expenditure on food, staple food production (maize and teff), and utilization of improved inputs (fertilizer and improved seed) collected from 256 randomly selected farm households (132 cooperative members and 124 nonmembers) and applied an inverse probability weighting (IPW) estimation to assess the impact of cooperative membership on food security. The result revealed that cooperative membership has a positive and significant effect on staple food production (maize and teff) and facilitated technological transformation via increased utilization of fertilizer and improved seeds. Nonetheless, the effect on food expenditure and income could not be confirmed. Findings suggest a trade-off between coffee marketing and input supply functions of the cooperatives, impairing their true food security impact from the pooled income and production effect.

  5. Metrics for border management systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, Ruth Ann

    2009-07-01

    There are as many unique and disparate manifestations of border systems as there are borders to protect. Border Security is a highly complex system analysis problem with global, regional, national, sector, and border element dimensions for land, water, and air domains. The complexity increases with the multiple, and sometimes conflicting, missions for regulating the flow of people and goods across borders, while securing them for national security. These systems include frontier border surveillance, immigration management and customs functions that must operate in a variety of weather, terrain, operational conditions, cultural constraints, and geopolitical contexts. As part of a Laboratory Directed Research and Development Project 08-684 (Year 1), the team developed a reference framework to decompose this complex system into international/regional, national, and border elements levels covering customs, immigration, and border policing functions. This generalized architecture is relevant to both domestic and international borders. As part of year two of this project (09-1204), the team determined relevant relative measures to better understand border management performance. This paper describes those relative metrics and how they can be used to improve border management systems.

  6. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  7. Transweb and trafficking in illicit nuclear materials: beyond the borders of physical security

    International Nuclear Information System (INIS)

    Ballard, J.D.; Dilger, F.

    2005-01-01

    Full text: Transweb is a developing threat assessment analytical protocol that uses real time GIS based assessments (a.k.a., GTA for GIS Threat Assessment) to better understand potential trafficking in illicit nuclear materials that may come from energy related sites and/or weapons production facilities. This is not a physical security protocol nor is this program a border check format like the DOE's Second Line of Defense which is designed to detect special nuclear fuels. Transweb is a tool that allows the user to look at surreptitious transportation pathways that may be used to move illicit nuclear materials after they have already breached traditional physical security barriers and allows for movement prediction and potential mitigation/intervention if they are not traveling on the highways or railways, traversing the waterways, or entering ports equipped with detecting equipment like that deployed in Second Line of Defense program. Transweb is for the real world, a world where physical security may be breached and the smugglers that capture these materials do not follow the most traveled highways, railways, or waterways in a given society. Transweb focuses on the less obvious transportation routes that may be the most likely ways that illicit nuclear materials will be transported. Thus this program offers an additional layer of security analysis not currently in use as physical protection or as border mitigation. (author)

  8. Transgranichnoe sotrudnichestvo nepravitel'stvennyh organizacij v Pomorskom i Varmin'sko-Mazurskom voevodstvah [Cross-border cooperation between nongovernmental organisations in the Pomeranian and Warmian-Masurian voivodeships

    Directory of Open Access Journals (Sweden)

    Gomulka Christina

    2013-01-01

    Full Text Available This article is devoted to the issues of cross-border cooperation carried out by agents resident in the Pomeranian and Warmian-Masurian voivodeships. Among such agents there are non-governmental organizations. This article aims to identify the role of NGOs in cross-border cooperation and the predominant fields of their cooperation, as well as to assess their activity in attracting funding from European budgets. The article widely applies the results of surveys of NGOs conducted by the author, compares the results of performance reports submitted by these organisations within international projects, and offers the data presented in relevant publications (Euroregion Baltic documents and Phare CBC reports, Interreg IIIA and, Interreg IIIB, NMF, and Polish-Swiss Cooperation reports, as well as the data of the Central Department of Statistics. The research covers the period from the late 90s to 2012. The article highlights the difficulties agents face in forging and implementing cross-border cooperation, resulting from the mismatching definitions of the tertiary sector in Poland’s neighbour states.

  9. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  10. Border Security: Barriers Along the U.S. International Border

    Science.gov (United States)

    2009-03-16

    1980). 120 Mexican Government Press Release, “Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual...and Roads at Various Project Areas Located in California, Arizona, New Mexico , and Texas...Diego Border Primary Fence The USBP’s San Diego sector extends along the first 66 miles from the Pacific Ocean of the international border with Mexico

  11. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  12. Enhancing regional security agreements through cooperative monitoring

    International Nuclear Information System (INIS)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  13. Security challenges to Central European bordering territories: view from the Transcarpatian region of Ukraine

    Directory of Open Access Journals (Sweden)

    Myroslava Lendel

    2015-12-01

    Full Text Available The factor of integral Central European space determines the formation of common challenges to the region's security. One part of them is not visualized or not perceived in the capital cities. These threats may be most vividly traced in the Transcarpathian region of Ukraine, taking into consideration the fact that it borders with the abovementioned countries. These are ethnopolitical threats, caused by the multiethnic population of the region, energy dependence, threats of social economic peripherization of Central European bordering territories, informational influence on the population, different attitudes to Ukraine-Russia conflict.

  14. Redistribution effects resulting from cross-border cooperation in support for renewable energy

    International Nuclear Information System (INIS)

    Unteutsch, Michaela

    2014-01-01

    It has been shown that international cooperation in achieving renewable energy targets, e.g., via a common tradable green certificate market, increases overall welfare. However, cooperation in the support of electricity from renewable energy sources also leads to regional price effects, from which some groups benefit while others lose. On a regional level, the introduction of cross-border cooperation in RES-E support generally has an opposite effect on support expenditures and wholesale electricity prices, as long as grid congestion between the different regions exists. In this paper, a theoretical model is used to analyze under which conditions different groups bene t or suffer from the introduction of cooperation. Findings of the analysis include that effects on consumers and total producers per country can only be clearly determined if no grid congestions between the countries exist. If bottlenecks in the transmission system exist, the relationship between the slopes of the renewable and the non-renewable marginal generation cost curves for electricity generation as well as the level of the RES-E target essentially determine whether these groups bene t or lose from the introduction of green certificate trading. In contrast, system-wide welfare always increases once cooperation in RES-E support is introduced. Similarly, welfare on the country level always increases (compared to a situation without RES-E cooperation) if the countries are perfectly or not at all physically interconnected. In the case of congested interconnectors, each country always at least potentially benefits from the introduction of certificate trade, taking into account possible distributions of congestion rents between the countries.

  15. Redistribution effects resulting from cross-border cooperation in support for renewable energy

    Energy Technology Data Exchange (ETDEWEB)

    Unteutsch, Michaela

    2014-01-15

    It has been shown that international cooperation in achieving renewable energy targets, e.g., via a common tradable green certificate market, increases overall welfare. However, cooperation in the support of electricity from renewable energy sources also leads to regional price effects, from which some groups benefit while others lose. On a regional level, the introduction of cross-border cooperation in RES-E support generally has an opposite effect on support expenditures and wholesale electricity prices, as long as grid congestion between the different regions exists. In this paper, a theoretical model is used to analyze under which conditions different groups bene t or suffer from the introduction of cooperation. Findings of the analysis include that effects on consumers and total producers per country can only be clearly determined if no grid congestions between the countries exist. If bottlenecks in the transmission system exist, the relationship between the slopes of the renewable and the non-renewable marginal generation cost curves for electricity generation as well as the level of the RES-E target essentially determine whether these groups bene t or lose from the introduction of green certificate trading. In contrast, system-wide welfare always increases once cooperation in RES-E support is introduced. Similarly, welfare on the country level always increases (compared to a situation without RES-E cooperation) if the countries are perfectly or not at all physically interconnected. In the case of congested interconnectors, each country always at least potentially benefits from the introduction of certificate trade, taking into account possible distributions of congestion rents between the countries.

  16. Regional Joint Border Commands: A Pathway to Improving Collaboration and Effectiveness for Border Control

    Science.gov (United States)

    2009-12-01

    Police xii SBI Secure Border Initiative SES Senior Executive Service SSP Secretaria de Seguridad Publica TSA Transportation Security...also been involvement from the Mexican law enforcement agency, Secretaria de Seguridad Publica (SSP) on the southwest border (CBP, 2009; ICE, 2009, p. 5

  17. The role of the Public Private Partnership (PPP) in Cross Border Cooperation (CBC) as strategic practice in the EU Policies and cooperation tools for 2014-2020

    OpenAIRE

    Lussi, Manoela

    2014-01-01

    2012/2013 There is an increasingly widespread acknowledgement among all active actors in the development co-operation sector that the Public Private Partnership (PPP) can be a new important tool, not only to build important infrastructure (public works) but also to provide services to the citizens at central and local level as well as to have a strategic value in the Cross-Border Co-operation (CBC) in the next future. The European Commission defines PPPs in a rather broad and general wa...

  18. NATO-EU PARTNERSHIP: FOSTERING RESILIENCE FOR A COOPERATIVE SECURITY SPACE

    Directory of Open Access Journals (Sweden)

    Octavia MOISE

    2017-12-01

    Full Text Available Present events indicate an encompassing process of multi-level changes - political, military, economic, and technological that highlights the idea that we are going through a phase of transition at systemic level that is redesigning the structure of power of the 21st century. This paper will try to find out first if the cooperative security concept can be seen as a security theory according to Baldwin’s criteria and second if NATO’s partnership policy in general and the NATO EU partnership in particular can foster resilience. The objectives of this article are to envisage the role of the NATO-EU partnership in the future by: reviewing the theoretical approaches on cooperative security, analysing NATO’s partnership policy, analysing the ability of NATO-EU partnership to foster resilience.

  19. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  20. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  1. IAEA to Cooperate with Japan on Nuclear Security at 2020 Olympic Games in Tokyo

    International Nuclear Information System (INIS)

    2018-01-01

    The International Atomic Energy Agency (IAEA) and the Government of Japan signed an agreement today aimed at enhancing nuclear security measures for the summer Olympic Games and Paralympic Games in Tokyo in 2020. The agreement follows previous IAEA support to major public events, including the 2016 Olympic Games in Rio de Janeiro and the 2012 European soccer championship in Poland and Ukraine. IAEA Director General Yukiya Amano and Japanese Foreign Minister Taro Kono presided over the signing ceremony at the Agency’s headquarters in Vienna. Practical Arrangements outlining the planned cooperation were signed by IAEA Deputy Director General Juan Carlos Lentijo, head of the Department of Nuclear Safety and Security, and H.E. Mitsuru Kitano, Japan’s Ambassador to the International Organizations in Vienna. “The IAEA has extensive experience in supporting Member States on nuclear security for major public events,” Amano said at the ceremony. “The Agency welcomes the cooperation to support the Olympic and Paralympic Games in Tokyo, and is already cooperating with Japan by sharing the experiences of Member States which previously hosted the Olympics.” The details of the cooperation will be decided in due course, but the possible areas of cooperation include the IAEA offering Japanese authorities training courses, workshops, technical visits and exercises related to nuclear security, hosting preparatory technical meetings and lending supplementary radiation detection equipment. The IAEA and Japan may also exchange information related to nuclear security events as appropriate and through the cooperation, the IAEA will also benefit from Japan’s good practices on nuclear security.

  2. Security of Supply: A Pan-European Approach - The Opportunities and Requirements of Greater Cooperation Across European Electricity Markets

    International Nuclear Information System (INIS)

    Ulreich, S.

    2015-01-01

    In December 2014, Prognos AG (Berlin/Basel) was commissioned by the Weltenergierat - Deutschland e.V to prepare a study on the potential of greater cooperation across European electricity markets. The focus of the analysis was to address the extent to which closer cooperation on ensuring generation adequacy can lead to cost reductions. Fifteen countries were analysed: seven members of the Pentalateral Energy Forum (PLEF, DE, BE, NL, LU, FR, AT and CH) and eight additional bordering countries (PL, IT, UK, ES, DK, CZ, PT and IE). Today, ensuring generation adequacy takes place at a national level and international effects are not taken into account. However, if cross-border effects are considered adequacy considerations at a national level can be relieved, e.g.: load peaks in Europe do not occur simultaneously and the feedin from renewable energy takes place at different times. Potential savings arise, as less capacity needs to be secured by conventional power plants. An indicator for this in the present study is the so-called residual load. The study is based on analyses of all existing data relating to hourly load and feed-in from renewable energy for the period from 2009 to 2014. In addition, two scenarios (based on Visions V1 and V3 of ENTSO-E's System Outlook and Adequacy Forecast) and numerous sensitivities for 2030 were generated. As the variability of the results is highly dependent on weather conditions, 48 simulations of wind power (sensitivities) established a broad corridor of results. For this reason, ranges are used in the presentation of results. The approach makes this study the most comprehensive analysis to date of the potential of closer cooperation with respect to ensuring generation adequacy. With the assumption of no grid congestion, the study reaches the following results: 1) Reduction of residual load: In contrast to a national assessment scheme, under a collective assessment scheme the residual load will reduce by 2 to 15 gigawatts (most

  3. Changing European borders: from separation to interface? An introduction

    Directory of Open Access Journals (Sweden)

    Jen Nelles

    2011-03-01

    Full Text Available The aim of this special issue is to address the evolution of European borders from a comparative perspective. This collection of papers spans a wide variety of topics in the realm of borderland studies. Although each engages with a single empirical or theoretical case collectively they identify nuances relevant to the theoretical elaboration of borders, and particularly contribute to the field of sub-national cross-border cooperation. In the course of its analysis each paper contributes to a broader understanding of the definition of cross-border regions; identifies a set of barriers to cooperation in these contexts; explores the role of identities on cooperation and of the role of borders in constructing those identities; and reflects on the socio-political meanings and uses of these international boundaries. This introduction discusses theoretical significance of these contributions to major debates in the study of borders and border regions.

  4. 75 FR 5287 - Federal Advisory Committee; Western Hemisphere Institute for Security Cooperation Board of...

    Science.gov (United States)

    2010-02-02

    ... Institute for Security Cooperation Board of Visitors; Charter Renewal AGENCY: Department of Defense (DoD... charter for the Western Hemisphere Institute for Security Cooperation Board of Visitors (hereafter... special government employees. With the exception of travel and per diem for official travel, Board Members...

  5. A model for international border management systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, Ruth Ann

    2008-09-01

    To effectively manage the security or control of its borders, a country must understand its border management activities as a system. Using its systems engineering and security foundations as a Department of Energy National Security Laboratory, Sandia National Laboratories has developed such an approach to modeling and analyzing border management systems. This paper describes the basic model and its elements developed under Laboratory Directed Research and Development project 08-684.

  6. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  7. International Border Management Systems (IBMS) Program : visions and strategies.

    Energy Technology Data Exchange (ETDEWEB)

    McDaniel, Michael; Mohagheghi, Amir Hossein

    2011-02-01

    Sandia National Laboratories (SNL), International Border Management Systems (IBMS) Program is working to establish a long-term border security strategy with United States Central Command (CENTCOM). Efforts are being made to synthesize border security capabilities and technologies maintained at the Laboratories, and coordinate with subject matter expertise from both the New Mexico and California offices. The vision for SNL is to provide science and technology support for international projects and engagements on border security.

  8. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  9. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  10. EU coordination of national social security in multiple cross border situations

    NARCIS (Netherlands)

    Cremers, J.

    2011-01-01

    The coordination of the national social security is one of the crucial fields of cooperation between EU Member States. The coordination is based on the principle of application of one legislation at a time in cases of employment being executed in one or more than one Member State. Persons moving

  11. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    Science.gov (United States)

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  12. Some aspects of cross-border cooperation in euroregions of the Czech Republic on example of the Šumava region

    Czech Academy of Sciences Publication Activity Database

    Cetkovský, Stanislav; Klusáček, Petr; Martinát, Stanislav; Zapletalová, Jana

    2007-01-01

    Roč. 15, č. 1 (2007), s. 43-55 ISSN 1210-8812 R&D Projects: GA AV ČR IAA7118301 Institutional research plan: CEZ:AV0Z30860518 Keywords : Euroregions * cross-border cooperation * Šumava * regional development * environmental protection * Czech Republic Subject RIV: DE - Earth Magnetism, Geodesy, Geography

  13. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  14. Measuring cross-border travel times for freight : Otay Mesa international border crossing.

    Science.gov (United States)

    2010-09-01

    Cross border movement of people and goods is a vital part of the North American economy. Accurate real-time data on travel times along the US-Mexico border can help generate a range of tangible benefits covering improved operations and security, lowe...

  15. Border markets

    DEFF Research Database (Denmark)

    Walther, Olivier

    2014-01-01

    The objective of this issue of Articulo – Journal of Urban Research is to examine the characteristics of border markets in a comparative perspective. In this introductory paper, I first discuss what makes African border markets different from other markets, and examine several factors that explain...... their unequal economic development: the presence of a trade community, the combination of trading and productive activities, and the relative porosity of borders. In a second part, I examine how border markets on the U.S.-Mexico border must simultaneously guarantee the security of the state while favoring...... regional trade. The last part of the paper argues that more policy attention should be paid to border markets which, despite being at the margin of states, are a vital component of their economy. Fifty years after most West African states became independent and just as NAFTA turns 20, it is high time...

  16. 76 FR 50883 - U.S. Customs and Border Protection

    Science.gov (United States)

    2011-08-17

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection DEPARTMENT OF THE TREASURY 19... of Liquidation AGENCY: Customs and Border Protection, Department of Homeland Security; Department of... Regulations (``CFR'') pertaining to the method by which U.S. Customs and Border Protection (``CBP'') issues...

  17. 76 FR 65207 - U.S. Customs and Border Protection

    Science.gov (United States)

    2011-10-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security.... 1641) and the U.S. Customs and Border Protection regulations (19 CFR 111.51), the following Customs...

  18. Cross-border regional innovation system integration

    DEFF Research Database (Denmark)

    Makkonen, Teemu; Weidenfeld, Adi; Williams, Allan

    2017-01-01

    The importance of inter-regional cooperation and innovation are widely accepted in the development rhetoric of the European Union. The highlighted importance of both themes in the context of borderlands has recently led to the coining of a new concept, cross-border regional innovation system...... of cross-border cooperation in a regional innovation system setting. The framework was further tested with illustrative empirical cases that demonstrate its feasibility........ However, little attention has been given to the empirical analysis of the concept. This paper suggests a framework for empirically validating the concept by examining the levels of integration between cross-border regions. The outcome is a proposed framework can be operationalized by measurable indicators...

  19. A sequential-move game for enhancing safety and security cooperation within chemical clusters

    International Nuclear Information System (INIS)

    Pavlova, Yulia; Reniers, Genserik

    2011-01-01

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided.

  20. The Danish-German police cooperation cross Danish-German land border in Schleswig-/South Jutland

    DEFF Research Database (Denmark)

    Battrup, Gerd

    including members of the national minorities. However, the 'opening' of the now 'internal EU border' after the Danish implementation of the Schengen Agreement in March 2001 as well as a massive growth in the demand of labour in South Jutland from 2004-2009, led to a rapid increase in the cross...... patterns of migration. A larger number of Danish bikers, including members of Hell's Angels have for instance in the recent years moved to Schleswig-Holstein. Danish and German police co-operate on combating gang related crime including crime committed by gangs of bikers. However, while Germany allows...

  1. 33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.

    Science.gov (United States)

    2010-07-01

    ... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...

  2. Asia-Europe cooperation on energy security an overview of options and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, F.; Godement, F.; Yakushiji, T

    2005-07-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions.

  3. Asia-Europe cooperation on energy security an overview of options and challenges

    International Nuclear Information System (INIS)

    Nicolas, F.; Godement, F.; Yakushiji, T.

    2005-01-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions

  4. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016

  5. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016.

  6. 'The Fear of Insignificance': New Perspectives on Harmonising Police Cooperation in Europe and Australia

    Directory of Open Access Journals (Sweden)

    Saskia Hufnagel

    2010-06-01

    Full Text Available Despite the fact that Australia and the European Union (EU have different structures of governance, histories, and cultures, both entities face remarkably similar problems in relation to police cooperation across borders. Australia is divided in nine different criminal jurisdictions, each of them policed by its own police force. Problems of border crossing, information exchange and joint investigations therefore arise similar to those in the EU. These problems have intensified in the 20th century with globalisation and the increased mobility of offenders. Several strategies, both legal and administrative, have necessarily developed to secure inter-state borders. Many of these strategies, like joint investigation teams, common databases and mutual recognition can be compared to solutions developed in the EU. This article will analyse some of the strategies that have been developed in Australia and in the EU to out-balance the lack of borders within them. It will be discussed what the major common impediments to police cooperation are in both entities. As many problems of cross-border policing result from the fact that law enforcement strategies are purely regional, it will be explored how more advanced cooperation strategies could be harmonised at the EU and Australian Federal levels. The major inhibiting factor in relation to harmonisation of legal frameworks in both entities will be defined as ‘the fear of insignificance’ or the fear of state actors to lose their individual identities in the process of harmonisation.

  7. Canada and Mexico Border Crossings

    Data.gov (United States)

    Department of Homeland SecurityBorder Crossing Ports are points of entry for land modes along the U.S. - Canadian and U.S.- Mexcian borders. The ports of entry are located in 15 states along the...

  8. Track 7: policy and public interest U.S.-Russian nuclear security cooperation: navigating the present realities. Panel Discussion

    International Nuclear Information System (INIS)

    Hayden, N.K.; Hayden-Prindle, Nancy; McCarthy, Maureen; Rich, John; Graham, Thomas Jr.; Mizin, Victor; Cagan, Debra; Alessi, Vic

    2001-01-01

    Full text of publication follows: In the 10 yr since the beginning of cooperation between the United States and the Russian Federation on nuclear security and nonproliferation issues, the political, economic, and security environment governing the nuclear security cooperation has evolved and, in some cases, undergone dramatic changes. On one hand, the protection of nuclear weapons and materials continues as an urgent national security concern for both the United States and Russia. At the same time, defense infrastructures have been closed or converted to civilian purposes, and there has been increased activity in international cooperation for civilian nuclear technology. This special panel will explore the future of the U.S.-Russia nuclear cooperation with particular attention to the following three themes. Theme 1: Managing the Risks: U.S.-Russian Federation Cooperative Programs for Nuclear Weapons and Materials Security; Theme 2: Creating the Benefits: The Changing Nature of Russia's Domestic Nuclear Industry; Theme 3: Addressing the Impediments: United States and Russia as Nuclear Exporters: Reconciling Nonproliferation Goals, Technology Advancements, and Economic Incentives

  9. U.S. Border Patrol Fiscal Year Statistics Southwest border sector deaths - FY 1998 through FY 2013

    Data.gov (United States)

    Department of Homeland Security — Southwest Border Sectors include: Del Rio, El Centro, El Paso, Laredo, Rio Grande Valley, San Diego, Tucson, Yuma Southwest Border Deaths By Fiscal Year (Oct. 1st...

  10. Cross-border knowledge transfer and innovation in the European neighbourhood

    DEFF Research Database (Denmark)

    Makkonen, Teemu; Williams, Allan; Weidenfeld, Adi

    2018-01-01

    . This research gap is addressed here via interview data collected from participants in tourism related EU-funded projects in the Finnish-Russian cross-border region. These underline the importance of EU-funding in facilitating knowledge transfer and innovation between Finland and Russia. While language issues......Knowledge transfer and innovation cooperation between the EU and its neighbours has remained weakly developed. To promote this cooperation, the EU has set up initiatives for the European neighbourhood. The issue has, however, received very limited scholarly attention in the field of tourism......, and differences in business culture and administrative/legislative systems between the two countries, constitute barriers for practical cross-border cooperation, it is cross-border differences in culture and technological capabilities that drive cross-border knowledge transfer and innovation in the cross...

  11. A sequential-move game for enhancing safety and security cooperation within chemical clusters.

    Science.gov (United States)

    Pavlova, Yulia; Reniers, Genserik

    2011-02-15

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.

  12. CONSIDERATIONS REGARDING EUROJUST'S CONTRIBUTION IN FIGHTING CROSS-BORDER CRIME IN EUROPE

    Directory of Open Access Journals (Sweden)

    Ion, MIHALCEA

    2014-11-01

    Full Text Available One of the objectives of the European Union enshrined in 67 alin.(1 (ex-art. 61 TCE and ex-art. 29 TUE of the consolidated version of the Treaty on European Union is to create a common European space of security and justice without internal frontiers, in which to ensure the free movement of people, corralated with appropriate measures on external border controls , asylum , immigration, and crime prevention and combating. This is a long term goal that requires active cooperation of Member States and multiple efforts by EU institutions. The institutional functioning practice has shown that the clasic forms of judicial cooperation do not have the ability to complete this objective and that is necessary to create specialized structures. In this context the First European institutional structure was established in 2002, a specialized agency of the European Union, named Eurojust, with the main objective to promote and improve coordination and cooperation between the judicial authorities of the Member States in the fight against serious cross-border crime affecting the European Union. Tasks of Eurojust and relations with other European bodies, particularly the Council and Commission are established by Decision 2002/187 / JHA amended by Decision 2009/426 / JHA Council of 16 December 2008 It is exercised by College Eurojust or through its national members.

  13. The impact of Border policy effect on cross-border ethnic areas

    Science.gov (United States)

    Bie, Q. L.; Zhou, S. Y.; Li, C. S.

    2013-11-01

    Boundary effect analysis is related to border policy making in the cross-border ethnic area. The border effect literatures show that geographic boundaries have obvious impacts on economic, social and cultural relations in both sides of a nation border. Particularly in cross-border ethnic areas, each ethnic group has strong internal spatial structure relevance, and the boundary effect is more obvious. However, most of China's border areas are cross-border ethnic areas, each of border issues is unique. Under this perspective, we analyze the border effects of various boundaries can provide basis for formulating border management policies. For small scale of cross-border ethnic minority areas, how to formulate the boundary management policy is a good question to explore. This paper is demonstrated by a study of the impact of border management policies in Dehong Dai and Jingpo Autonomous Prefecture in Yunnan Province at the border area to Burma. The comparative method is used to analysis the border management policies in past 50 decades for the border area of Yunnan Province .This research aims to define trends within border policy and its influences to national security. This paper also examines Wendy Brown's liberal theory of border management policy. We found that it is not suitable for Sino-Burma border area. The conclusion is that the changes or instability of international economic and political situation has more influence to this cross-border ethnic area, and only innovative policy will be effective in cross-border ethnic area. So the border management policies should reflect the change of international context.

  14. Border Security: The Role of the U.S. Border Patrol

    National Research Council Canada - National Science Library

    Nunez-Neto, Blas

    2005-01-01

    .... Today, the USBP's primary mission is to detect and prevent the entry of terrorists, weapons of mass destruction, and illegal aliens into the country, and to interdict drug smugglers and other criminals along the border...

  15. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  16. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    Science.gov (United States)

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  17. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  18. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  19. 75 FR 70937 - U.S. Customs and Border Protection

    Science.gov (United States)

    2010-11-19

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of... Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Robinson... Border Protection to conduct the specific test or gauger service requested. Alternatively, inquires...

  20. 77 FR 38076 - U.S. Customs and Border Protection

    Science.gov (United States)

    2012-06-26

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of... Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of SGS North... and Border Protection to conduct the specific test or gauger service requested. Alternatively...

  1. U.S.-Mexican Security Cooperation: the Merida Initiative and Beyond

    Science.gov (United States)

    2010-08-16

    2010, those funds had yet to be transferred from the State Department to USAID for implementation. 71 “Cárteles Perturban al Sistema Carcelario,” El...Quejas a Web .” Milenio. July 28, 2010. U.S.-Mexican Security Cooperation: the Mérida Initiative and Beyond Congressional Research Service 27

  2. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  3. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  4. RUSSIA›S COOPERATION WITH THE COUNTRIES OF POST-SOVIET EURASIA IN THE FIELD OF SECURITY

    Directory of Open Access Journals (Sweden)

    Sergey Valerievich Bespalov

    2016-02-01

    Full Text Available The problem of collective security remains relevant for the majority of post-Soviet Eurasia since the Soviet collapse to date.. In the article on the basis of diachronic analysis of political processes (the study of the successive in real historical time steps analyzed the formation and development of the legal framework of collective security in the post-Soviet Eurasia in relation to the real political processes in the region, the creation and development of the Treaty on Collective Security Organization, and its prospects.As a result of the military-political cooperation within the CIS has not received a significant development, Russia and its allies were forced to make a bet on the development of relations within the Treaty on Collective Security Organization.There are four areas of the Eurasian security cooperation within the Treaty on Collective Security Organization:1. Creation of a common «military umbrella» protecting the Member States of the Organization of the intrusion, including as a result of support for other-strange powers of local radical opposition. The key role played by the army and the military-industrial complex of Russia as the most powerful country in the military unit.2. The fight against international terrorism within the framework of cooperation between national security services and the Ministry of Interior.3. Prevention of large-scale intrusion of extremists from the territory of the north of Afghanistan.4. The fight against drug trafficking.Work on improving the legal framework of the Treaty on Collective Security Organization should be continued. As one of the future goals of the Organization should highlight the creation of a unified arms market, the deepening of cooperation in the development and production of weapons and other military products.

  5. The integrated North American electricity market : assuring an adequate supply of electricity through cross-border cooperation and trade

    International Nuclear Information System (INIS)

    Egan, T.

    2005-03-01

    The purpose of this paper is to support cooperation and discussion of the long-term sufficiency of the electricity trading system between Canada and the United States. It discusses the integrated electricity market including details on exports and imports of electricity, major transmission interconnections, the economic and environmental benefits of an integrated market and electricity generation statistics by fuel source. The paper also discusses several areas of cooperation and presents several recommendations including: greater dialogue on regional supply requirements; mandatory reliability standards; coordinated regulatory approaches to new cross-border transmission; the role of emerging generation and transmission technologies; opportunities to exchange experience and learning on demand-side measures; coordinated strategies to manage greenhouse gas and other air pollutants; and, critical infrastructure protection. The paper concludes that the integration between Canada and the United States will only increase as energy demand and trade continue to grow, making close cooperation between the two countries a necessity. 6 figs

  6. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  7. Cooperation in the maintenance of peace and security, and disarmament

    International Nuclear Information System (INIS)

    1994-01-01

    In the face of recent fundamental changes in the international situation, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being encouraged by the international community. Towards this end, the United Nations Centre for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate an exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground, fostering the process of confidence-building and delineating areas of possible future negotiation and agreement. This publication is based on material presented at the regional meeting on the Cooperation in the maintenance of peace and security, held at the United Nations Regional Centre for Peace and Disarmament in Asia and the Pacific, in Kathmandu, Nepal, from 31 January to 2 February 1994

  8. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  9. SOME ASPECTS OF THE REGIONAL COOPERATION IN THE BALKANS

    Directory of Open Access Journals (Sweden)

    Mariya Gospodinova Grozeva

    2017-04-01

    Full Text Available Since the beginning of the 21st century, the political role of the state borders in the Balkans has changed. Gradually they began to transform from barriers into zones of bilateral and multilateral cooperation. The common European integration includes the creation and development of Euro-regions. Within the context of reorganization of the new European space, geopolitical importance of South-East Europe has significantly upgraded. This fact reflects on the interests of the international community in security and development of this region. Despite that the Balkans constitute an indispensable part of the European continent, their incorporation into the new European architecture has been particularly difficult and problematic. They emerge as the most volatile and least integrated European region. There are significant variations among the countries concerning their territory, number of population, as well as the rate of the economic changes. The main forms of regional cooperation should be concentrated on the domains of transport, energy and communication infrastructure, trade and economic cooperation, environment and security. From this point of view, the economic growth and increase of living standard are the most important problems for all Balkan countries.

  10. Cooperation or Localization in European Capacity Markets? A Coalitional Game over Graph Approach

    Directory of Open Access Journals (Sweden)

    Giorgos Stamtsis

    2018-06-01

    Full Text Available Capacity markets, as a means to address the capacity adequacy issue, are constantly becoming an important part of the European internal electricity market. The debate focuses on how the capacity markets will be smoothly integrated in one Pan-European power market, without resulting in multiple national fragmentations and consequently in economic efficiency losses. Cross-border participation and regional cooperation are considered as two sine qua non conditions in this respect. The present paper provides a coalitional game theoretical approach aiming to facilitate the cooperation of neighboring countries, when it comes to the security of electricity supply and the necessity of establishing a capacity market. Such an approach can support respective decisions about capacity markets cooperation as well as stress-test the benefits considering all cooperation possibilities.

  11. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    Directory of Open Access Journals (Sweden)

    Zhen Li

    2016-03-01

    Full Text Available The Internet of Things (IoT is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones. Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR at the eavesdropper subject to the Quality of Service (QoS constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI. By using Semi-Definite Programming (SDP, the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the

  12. Nuclear security at Zimbabwe’s borders

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2016-01-01

    Enhancing detection capabilities at the Victoria Falls border crossing provides confidence to people visiting Zimbabwe that measures are in place to prevent disruption caused by radioactive materials and helps to protect the local environment.

  13. ITRAP results: detection of radioactive material at the borders to combat Illicit trafficking

    International Nuclear Information System (INIS)

    Beck, P.; Schmitzer, C.; Mueck, K.; Duftschmid, K.E.; Arlt, R.

    2001-01-01

    The paper describes the results of the extended pilot study ITRAP (Illicit trafficking radiation assessment program) of commercially available monitoring systems for the detection of nuclear and other radioactive materials at border crossings. ITRAP was carried out from the Austrian research center Seibersdorf (ARCS) for the Austrian Government, coordinated by the Ministry of Economic Affairs and Labour. In co-operation with the international atomic energy agency (IAEA) the program was also supported by the word customs organisation (WCO), the international criminal police organization (INTERPOL) and the Hungarian Government. The ITRAP study consists of a laboratory test phase and field tests at the Austrian/Hungarian border Nickelsdorf and the Vienna airport, each for a duration of one year. The results will be used to derive realistic performance requirements for border control systems in view of optimised technical and economic conditions. First results of the ITRAP study were given at the IAEA Conference On the Safety of Radiation Sources and the Security of Radioactive Materials, Dijon, France, in September 1998 [1]. (orig.)

  14. [Experience of international cooperation among Baltic countries in occupational health and security].

    Science.gov (United States)

    Miloutka, E V; Andronova, E R; Dedkova, L E

    2013-01-01

    The article covers longstanding experience of international cooperation in occupational health and security with Baltic countries. The authors describe history of information network creation, its structure, objectives, importance for occupational health services and safety in the region.

  15. Future regional nuclear fuel cycle cooperation in East Asia: Energy security costs and benefits

    International Nuclear Information System (INIS)

    Hippel, David von; Hayes, Peter; Kang, Jungmin; Katsuta, Tadahiro

    2011-01-01

    Economic growth in East Asia has rapidly increased regional energy, and especially, electricity needs. Many of the countries of East Asia have sought or are seeking to diversify their energy sources and bolster their energy supply and/or environmental security by developing nuclear power. Rapid development of nuclear power in East Asia brings with it concerns regarding nuclear weapons proliferation associated with uranium enrichment and spent nuclear fuel management. This article summarizes the development and analysis of four different scenarios of nuclear fuel cycle management in East Asia, including a scenario where each major nuclear power user develops uranium enrichment and reprocessing of spent fuel individually, scenarios featuring cooperation in the full fuel cycle, and a scenario where reprocessing is avoided in favor of dry cask storage of spent fuel. The material inputs and outputs and costs of key fuel cycle elements under each scenario are summarized. - Highlights: → We evaluate four scenarios of regional nuclear fuel cycle cooperation in East Asia and the Pacific. → The scenarios cover fuel supply, enrichment, transport, reprocessing, and waste management. → We evaluate nuclear material flows, energy use, costs, and qualitative energy security impacts. → Regional cooperation on nuclear fuel cycle issues can help to enhance energy security. → A regional scenario in which reprocessing is rapidly phased out shows security and cost advantages.

  16. Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq

    Science.gov (United States)

    2007-12-01

    was a predictable outcome and casts doubt as to whether or not airpower security cooperation can realistically dissuade states from attempting to...in the Middle East and South Asia, ed. Shelly A. Stahl and Geoffrey Kemp (New York: St. Martin’s Press, 1992) 221-227. 48 airpower security...Policy Toward Arms Transfers to the Middle East,” in Arms Control and Weapons Proliferation in the Middle East and South Asia, ed. Shelly A. Stahl and

  17. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  18. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2017-05-01

    Full Text Available In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  19. Cooperación técnica en salud entre Colombia y sus países fronterizos Technical cooperation for health between Colombia and bordering countries

    Directory of Open Access Journals (Sweden)

    Yamileth Ortiz Gómez

    2011-08-01

    Full Text Available OBJETIVO: Caracterizar la cooperación técnica de Colombia con cuatro de sus países fronterizos y determinar las necesidades de formación de sus grupos técnicos binacionales (GTB. MÉTODOS: Investigación cualitativa basada en la revisión documental y en información suministrada por actores clave de este campo. Para explorar las necesidades de capacitación se aplicó una encuesta con los GTB de Colombia y Ecuador, la cual fue profundizada a través de grupos de discusión; se aplicaron técnicas de categorización deductiva e inductiva, y de triangulación por convergencia. RESULTADOS: Se obtuvieron 18 acuerdos/convenios y documentación de 12 proyectos de cooperación sanitaria en zona de frontera. La mayoría de los proyectos encontrados correspondían a cooperación multilateral. Los dos temas de cooperación priorizados fueron el Reglamento Sanitario Internacional y los Objetivos de Desarrollo del Milenio 6 y 7. Los GTB consideraron necesario un proceso de capacitación en gestión, diplomacia en salud y desarrollo de capacidades para la cooperación en ámbitos fronterizos. CONCLUSIONES: Las fronteras se exhibieron como escenarios complejos de intervención, donde el derecho internacional y la política exterior han delimitado las acciones de cooperación. Al definir la capacitación de los GTB, se sugiere considerar el marco normativo nacional e internacional y el contexto de las áreas fronterizas.OBJECTIVE: Characterize the technical cooperation of Colombia with four bordering countries and determine the training needs of the binational technical groups (BTGs. METHODS: Qualitative investigation based on document review and information provided by key actors in this field. To explore training needs, a survey of Colombia-Ecuador BTGs was conducted. Further information was obtained through discussion groups. Deductive and inductive categorization techniques were applied, as well as convergence using the triangulation method. RESULTS

  20. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao

    2018-01-09

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  1. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao; Yang, Liang; Alouini, Mohamed-Slim

    2018-01-01

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  2. «Goroda-bliznecy»: novaja forma prigranichnogo sotrudnichestva v Baltijskom regione? [Twin cities: a new form of cross-border cooperation in the Baltic Sea Region?

    Directory of Open Access Journals (Sweden)

    Anishenko Anatoly

    2012-01-01

    Full Text Available The paper demonstrates the first attempt in Russian political studies to conduct a comprehensive analysis of the “twin city” movement as a form of cross-border cooperation in the Baltic region. This phenomenon emerged as a result of a global tendency towards more active involvement of municipal units in international cooperation, on the one hand, and aspirations of frontier cities and towns in the Baltic region to solve common problems together, on the other hand. This work is based on a comparative analysis method and a case study methodology. The authors consider four examples (city pairs: Tornio — Haparanda, Valga — Valka, Narva — Ivangorod and Imatra — Svetogorsk. The article specifies the terminological framework used in this field of research. The authors analyse achievements and failures of this type of international inter-municipal cooperation and emphasise that for twin cities it served not only as a means of survival in the difficult situation of the 1990s, but also as an experimental ground for new forms of crossborder cooperation. The authors arrive at the conclusion that this model proves to be promising for further development of integration processes in the Baltic region. This practice can be applied by Russian municipal, regional and federal authorities in promotion of cross-border cooperation not only in the Baltic region, but also in other regions of the country. Thus, influenced by the successful experience of Baltic frontier cities and towns, the Russian city of Nikel and the Norwegian city of Kirkenes decided to adopt this model for further development of their cooperation.

  3. 77 FR 59206 - U.S. Customs and Border Protection

    Science.gov (United States)

    2012-09-26

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Foreign Assembler's Declaration AGENCY: U.S. Customs and Border Protection (CBP), Department of... written comments to U.S. Customs and Border Protection, Attn: Tracey Denning, Regulations and Rulings...

  4. Cooperation between Russia and the EU in the field of innovative development of tourism: the case of the Lithuania — Poland — Russia cross-border cooperation programme

    Directory of Open Access Journals (Sweden)

    Kropinova Elena

    2013-12-01

    Full Text Available To study the key instruments of international cooperation between Russia and the European Union aimed at stimulating innovative development of tourism co-financed by the EU and Russia. The author describes specific projects implemented in the framework of the Lithuania-Poland-Russia cross-border cooperation programme for 2009—2013 in the field of tourism. Special attention is paid to analysing tourism innovations that have emerged as a result of the projects aimed at cooperation and tourism development in the border regions of Russia and the EU countries. A number of projects have been implemented under the supervision and with the participation of the author. The article focuses on the role of innovative types of tourism in the regional development of territories in the case of the Kaliningrad region. The current approaches to defining tourism innovations in Russian and international studies are not comprehensive and do not reflect the essence of innovative processes. Innovative development is often reduced to the introduction of new information technologies, i. e. informatization replaces innovative development. However, it is important to take into account other innovative tools: for instance, interactive network museums in developing innovative tourist attraction objects, e-marketing in introducing innovations in tourist product promotion, programmes of private- public partnership in the field of public regulation and tourism stimulation, etc. These technologies contribute to the transition fr om a certain economic agent, the industry as a whole, or a tourist destination to a fundamentally new level in terms of tourist product presentation and increase of competitiveness. The sources for innovations in tourism are both the providers and consumers of tourist services. In those regions wh ere tourism is considered an economic priority, local authorities and even super-governmental organisations, such as the European Commission (through

  5. Cooperation between Russia and the EU in the field of innovative development of tourism: the case of the Lithuania — Poland — Russia cross-border cooperation programme

    Directory of Open Access Journals (Sweden)

    Kropinova Elena

    2013-01-01

    Full Text Available To study the key instruments of international cooperation between Russia and the European Union aimed at stimulating innovative development of tourism co-financed by the EU and Russia. The author describes specific projects implemented in the framework of the Lithuania-Poland-Russia cross-border cooperation programme for 2009—2013 in the field of tourism. Special attention is paid to analysing tourism innovations that have emerged as a result of the projects aimed at cooperation and tourism development in the border regions of Russia and the EU countries. A number of projects have been implemented under the supervision and with the participation of the author. The article focuses on the role of innovative types of tourism in the regional development of territories in the case of the Kaliningrad region. The current approaches to defining tourism innovations in Russian and international studies are not comprehensive and do not reflect the essence of innovative processes. Innovative development is often reduced to the introduction of new information technologies, i. e. informatization replaces innovative development. However, it is important to take into account other innovative tools: for instance, interactive network museums in developing innovative tourist attraction objects, e-marketing in introducing innovations in tourist product promotion, programmes of private- public partnership in the field of public regulation and tourism stimulation, etc. These technologies contribute to the transition fr om a certain economic agent, the industry as a whole, or a tourist destination to a fundamentally new level in terms of tourist product presentation and increase of competitiveness. The sources for innovations in tourism are both the providers and consumers of tourist services. In those regions wh ere tourism is considered an economic priority, local authorities and even super-governmental organisations, such as the European Commission (through

  6. 78 FR 35044 - U.S. Customs and Border Protection

    Science.gov (United States)

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Visa Waiver Program Carrier Agreement (CBP Form I-775) AGENCY: U.S. Customs and Border Protection... information collection: 1651-0110. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of...

  7. Review of depopulation of the border villages in the context of national security risk

    Directory of Open Access Journals (Sweden)

    Vukmirović Jovanka A.

    2016-01-01

    Full Text Available According to internationally comparable statistical indicators, Serbia is among the countries with the highest development disparities (regional and local, both among Balkan neighbors and European scale. Large differences in development occur during the second half of the last century, a period culminating in the failed socio-economic transition of the millennium. Devastation and depopulation are causal phenomena, the population rapidly leaving impoverished areas and gravitate to the larger centers. Conditionally speaking, the more developed cities continue to develop while poor towns and villages are still poor. Proverb says, 'Whose sheep, that and the mountains. ' Emptying the territory highly correlated with an increase in surface area of agricultural land uncultivated, thus permanently extinguished agriculture as the main activity and main source of income in rural areas. Emptying the territory is the biggest development problem in Serbia, but also represents one of the biggest national security risks. Increasingly, the question whether Serbia will in the future be able to keep the territory in which he remains without population and whether the threshold bezbednostnog risk isšražnjene administration of the territory in the border areas. This paper presents a statistical description of census data in 1971, 1981, 1991, 2002 and 2011 as well as the analysis of demographic trends in border settlements for the considered period. The paper also proposed a set of measures and recommendations for overcoming depopulation, in accordance with available resources and the natural limits of border settlements.

  8. Permeability of Czech-Polish Border Using by Selected Criteria

    Czech Academy of Sciences Publication Activity Database

    Kolejka, Jaromír; Zyszkowska, K.; Batelková, Kateřina; Ciok, S.; Dolzblasz, K.; Kirchner, Karel; Krejčí, Tomáš; Raczyk, A.; Spaller, W.; Zapletalová, Jana

    2015-01-01

    Roč. 10, č. 1 (2015), s. 51-65 ISSN 1842-5135 Institutional support: RVO:68145535 Keywords : natural barrier * cross border co-operation * population pressure * border segments * Poland and Czech Republic Subject RIV: DE - Earth Magnetism, Geodesy, Geography http://technicalgeography.org/pdf/1_2015/06_kolejka.pdf

  9. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  10. OPNET Modeler Simulation Testing of the New Model Used to Cooperation Between QoS and Security Mechanisms

    Directory of Open Access Journals (Sweden)

    Jan Papaj

    2012-01-01

    Full Text Available In this article the performance analysis of the new model, used to integration between QoS and Security, is introduced. OPNET modeler simulation testing of the new model with comparation with the standard model is presented. This new model enables the process of cooperation between QoS and Security in MANET. The introduction how the model is implemented to the simulation OPNET modeler is also showed. Model provides possibilities to integration and cooperation of QoS and security by the cross layer design (CLD with modified security service vector (SSV. An overview of the simulation tested of the new model, comparative study in mobile ad-hoc networks, describe requirements and directions for adapted solutions are presented. Main idea of the testing is to show how QoS and Security related services could be provided simultaneously with using minimal interfering with each service.

  11. Border installations

    International Nuclear Information System (INIS)

    Lenaerts, K.

    1988-01-01

    This chapter highlights the legal problems raised by the concept of a border installation. Using the Cattenom nuclear power plant as an example, the author describes the different stages of the legal conflict raised by construction of the plant and analyses the relationship between French administrative law and some provisions of the Euratom Treaty. Based on the Treaty, the Community institutions have adopted directives to strengthen inter-State co-operation and consultation between neighbouring countries. He observes that these principles of co-operation, consultation and vigilance already exist in public international law; however, international case law has not yet made it possible to establish the strict liability of the constructing state in case of a nuclear accident (NEA) [fr

  12. South Asia energy security: Challenges and opportunities

    International Nuclear Information System (INIS)

    Kumar Singh, Bhupendra

    2013-01-01

    South Asia has witnessed a growing imbalance between energy demand and its supply from indigenous sources resulting in increased import dependence. Energy endowments differ among the South Asian countries. However, access to the significant energy resources in the neighboring countries is denied, which increases the cost of energy supply and reduces energy security of the individual countries and of the region as a whole. The countries in the region could benefit significantly only by strengthening the mechanism of energy trade through improved connectivity. Therefore, greater cooperation within South Asia could be one of the most effective ways to deal with this Regional Energy deficit and ensure Energy Security of the Region. - Highlights: • No South Asian country is going to be able to meet its energy needs domestically. • Fostering cross border energy trade and promotion of investments opportunities are key solutions. • India’s neighbors have huge potential in hydroelectricity. • Co-operation among nations to tap the energy resource can be a win–win situation for all. • However it faces certain challenges

  13. To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation

    Science.gov (United States)

    2015-02-01

    security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce

  14. Securities and banking: bridges and walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-09-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securitiesbusinesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  15. Shaping the Victim: Borders, security, and human trafficking in Albania

    Directory of Open Access Journals (Sweden)

    James Campbell

    2013-09-01

    Full Text Available Borders are productive sites where knowledge is gathered and migrant populations are formed. The knowledge gathered from victims of trafficking reinforces a victim narrative that represents a perceived threat to society by highlighting violence, criminality, coercion, and naivety. Using Albania as a case in point, the article looks at trafficked people and the narratives of victimhood that surround them. In the case of trafficked people, the border projected out towards other states produces a discursively defined victim of trafficking. When projected back within the national territory, the border essentially produces a criminalised sex worker. To argue this point, the article discusses the role victims of trafficking play in the EU and looks at how international norms espoused by the OSCE and IOM have prepped the Albanian border for EU ascension and created the means for governable populations within Albania.

  16. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI

  17. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  18. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  19. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  20. Cross-border Co-operation Networks in West Africa

    DEFF Research Database (Denmark)

    Walther, Olivier

    Long seen as artificial barriers inherited from decolonisation, West African borders now lie at the heart of policies designed to encourage regional trade and combat political instability. This rediscovery of the peripheries of the nation state has fostered a proliferation of institutional...

  1. 78 FR 65300 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2013-10-31

    ... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY... from the WHINSEC Commandant; Department of State; US Northern Command and US Southern Command; the...

  2. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling; Yang, Liang; Chen, Jianchao; Alouini, Mohamed-Slim

    2018-01-01

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  3. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling

    2018-02-02

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  4. Economic integration and cross-border economic organizations: The case of San Diego-Tijuana

    Directory of Open Access Journals (Sweden)

    Jorge Eduardo Mendoza Cota

    2017-01-01

    Full Text Available The economic integration between the United States and Mexico has affected the economic, political and social relations in the border region. The paper seeks to relate the increasing economic integration and business cycles of the economies of San Diego and Tijuana to the development of both national and binational economic organizations in the border region. The methodology of analysis uses both statistical estimations of the economic integration of San Diego and Tijuana and semi-structured interviews of economic organizations to analyze the increasing economic integration and the role and achievements of the cross-border economic organizations. The results showed that cross-border cooperation is predominately controlled by federal and state governments on both sides of the border. However, the main achievements of cross-border economic cooperation have been accomplished by local private organizations. The perspective of further local economic development greatly depends on both the possibility of increased involvement of federal governments and the growing encouragement of regional organizations.

  5. Cross-border teleradiology-Experience from two international teleradiology projects

    International Nuclear Information System (INIS)

    Ross, Peeter; Sepper, Ruth; Pohjonen, Hanna

    2010-01-01

    Teleradiology aims to even radiologists' workload, ensure on-call services, reduce waiting lists, consult other specialists and cut costs. Cross-border teleradiology widens this scope beyond the country borders. However, the new service should not reduce the quality of radiology. Quality and trust are key factors in establishment of teleradiology. Additionally there are organizational, technical, legal, security and linguistic issues influencing the service. Herein, we have used experiences from two partially European Union funded telemedicine projects to evaluate factors affecting cross-border teleradiology. Clinical partners from Czech Republic, Denmark, Estonia, Finland, Lithuania and the Netherlands went through 649 radiology test cases in two different teleradiology projects to build trust and agree about the report structure. Technical set-up was established using secure Internet data transfer, streaming technology, integration of workflows and creating structured reporting tool to overcome language barriers. The biggest barrier to overcome in cross-border teleradiology was the language issue. Establishment of the service was technically and semantically successful but limited to knee and hip X-ray examinations only because the structured reporting tool did not cover any other anatomical regions yet. Special attention has to be paid to clinical quality and trust between partners in cross-border teleradiology. Our experience shows that it is achievable. Legal, security and financial aspects are not covered in this paper because today they differ country by country. There is however an European Union level harmonization process started to enable cross-border eHealth in general.

  6. Cross-border teleradiology-Experience from two international teleradiology projects

    Energy Technology Data Exchange (ETDEWEB)

    Ross, Peeter [Institute of Clinical Medicine, Tallinn University of Technology, East Tallinn Central Hospital, Paernu mnt 104, 11312 Tallinn (Estonia)], E-mail: Peeter.Ross@itk.ee; Sepper, Ruth [Institute of Clinical Medicine, Tallinn University of Technology, Akadeemia tee 15, 12618 Tallinn (Estonia)], E-mail: Ruth.Sepper@gmail.com; Pohjonen, Hanna [Institute of Clinical Medicine, Tallinn University of Technology, Akadeemia tee 15, 12618 Tallinn (Estonia)], E-mail: Hanna.Pohjonen@rosalieco.fi

    2010-01-15

    Teleradiology aims to even radiologists' workload, ensure on-call services, reduce waiting lists, consult other specialists and cut costs. Cross-border teleradiology widens this scope beyond the country borders. However, the new service should not reduce the quality of radiology. Quality and trust are key factors in establishment of teleradiology. Additionally there are organizational, technical, legal, security and linguistic issues influencing the service. Herein, we have used experiences from two partially European Union funded telemedicine projects to evaluate factors affecting cross-border teleradiology. Clinical partners from Czech Republic, Denmark, Estonia, Finland, Lithuania and the Netherlands went through 649 radiology test cases in two different teleradiology projects to build trust and agree about the report structure. Technical set-up was established using secure Internet data transfer, streaming technology, integration of workflows and creating structured reporting tool to overcome language barriers. The biggest barrier to overcome in cross-border teleradiology was the language issue. Establishment of the service was technically and semantically successful but limited to knee and hip X-ray examinations only because the structured reporting tool did not cover any other anatomical regions yet. Special attention has to be paid to clinical quality and trust between partners in cross-border teleradiology. Our experience shows that it is achievable. Legal, security and financial aspects are not covered in this paper because today they differ country by country. There is however an European Union level harmonization process started to enable cross-border eHealth in general.

  7. 77 FR 20369 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2012-04-04

    ... Defense (Policy); Department of State; US Northern Command and US Southern Command as well as receive... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...

  8. 76 FR 39076 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2011-07-05

    ... Defense (Policy); Department of State; US Northern Command and US Southern Command meeting on December 3rd... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...

  9. Local Border Traffic as a Form of Visa Liberalisation and Territorial Development

    Directory of Open Access Journals (Sweden)

    Kretinin G.

    2014-12-01

    Full Text Available This article addresses the issue of visa liberalisation between Russia and the European Union, which constitutes a key aspect of the parties’ diplomatic cooperation. This work sets out to identify the main results of Russia/EU cooperation. The authors have conducted a brief historical analysis of this area of relations. The visa “regionalisation” is considered in the context of identifying the key actors of the EU — Russia negotiations: the Kaliningrad region, Germany, Poland, and Lithuania. In their analysis, the authors rely mostly on primary sources: intergovernmental agreements on simplified border traffic, border-crossing statistics for the Kaliningrad region in the framework of the local border traffic, expert interviews, and related analytic reports. Specifically, local border traffic is viewed as the most effective form of interaction in the field of visa regime simplification and border territory development. An assessment of the positions of key negotiators shows that local border traffic between the Kaliningrad region of Russia and the Polish border voivodeships is a success, which stresses the need for a prompt transition to a visa-free regime with the EU.

  10. Infectious Disease Border Issues Conference: Meeting Synopsis

    Science.gov (United States)

    2012-04-03

    methicillin - resistant Staphylococcus aureus (MRSA). Operation MECACAR 1998 was highlighted as a successful example of cross-border coordination...training courses, no joint public health investigation teams) and illegal animal transportation across borders were identified as some of the existing...Work (2007), including fostering global partnerships; strengthening public health security in travel and transport ; improving the WHO global alert

  11. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    Science.gov (United States)

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  12. Divided we fall... or rise? Tajikistan–Kyrgyzstan border dilemma

    Directory of Open Access Journals (Sweden)

    Anna Matveeva

    2017-02-01

    Full Text Available The Kyrgyzstan–Tajikistan border remains one of the last undefined frontiers in the Commonwealth of Independent States, where the governments are reluctant to act against the wishes of their border communities and force delimitation solutions that may cause social protests. Uncertainty of territorial arrangements persists; however, the era of commonality and interdependence may be at its end due to the establishment of a border as a means of spatial control. Border drawing reflects the divergent development trajectories of the new states, seeking to break out of an interdependence pattern. Borderlands’ interactions become more conflictual. Generation change and a loss of common language work to widen the inter-communal gap. Ethnicity and identity factors grew in significance as association with the nation-states increased, and a border expresses a symbol of nationhood in this paradigm. Crucially, a border justifies a security regime, reinforced by international assistance policies, to project power over the territory. Actions of security structures cause grievances but also signify a protective arm of the state, a role that the border communities appreciate, themselves acting as a collective border guard and projecting their fears of encroachment onto the borders. The expansion of the Eurasian Economic Union became a new factor that could have served to alleviate the pressure to divide territory and assets, but this could work only if two countries joined it at the same period. With this option unavailable, a territorial impasse has been reached.

  13. Development of Indonesia-Papua New Guinea border, Muara Tami District, Jayapura City through agropolitan concept

    Science.gov (United States)

    Subagiyo, A.; Dwiproborini, F.; Sari, N.

    2017-06-01

    The border of RI-PNG Muara Tami district is located on the eastern part of Jayapura city, which has agricultural potential. The past paradigm put the border as the backyard caused underdevelopment in border RI-PNG Muara Tami district, so that needed acceleration development through agropolitan concept. The purpose of the research is to define the aspect of physical, social, economic and border security to support agropolitan concept in border RI-PNG Muara Tami district. The analytical research method are border interactionan analysis, border security analysis, land capability analysis, land availability analysis, schallogram analysis, institutional analysis, leading comodity analysis (LQ and Growth Share), agribusiness linkage system analysis, accessibility analysis and A’WOT analysis. The result shown that mobilization from PNG to Muara Tami district could increase the economic opportunities with agricultural based. Border security of RI-PNG Muara Tami district is vulnerable, yet still condusive to mobilization. There is 12.977,94 Ha potensial land for agricultural (20,93%). There are six leading commodities to developed are rice, watermelon, banana, coconut, areca nut and cocoa. The border of RI-PNG Muara Tami district is ready enough to support agropolitan concept, but still have problems in social and economy aspect.

  14. PROSPECTS OF COOPERATION OF BORDER REGIONS OF THE SOUTH OF RUSSIA AND SOUTHEAST OF UKRAINE: MEDIUM-TERM SCENARIO

    Directory of Open Access Journals (Sweden)

    Inna Mitrofanova

    2015-10-01

    Full Text Available In article the main competitive advantages of the region «Donbass», the priority directions of long-term development of a border territorial and economic complex of the Rostov region are revealed; potential of the remaining economic relations between social-production complexes of the republics of Donetsk people’s Republic, Lugansk people’s Republic and Russia, taking into account activation of integration processes in the Russian economy in the sphere of monetary circulation is opened; formats of economic cooperation between the Ukrainian and Russian regions capable to give incentive for restoration of development of the industry of Donbass are considered, will open new sales markets of production.

  15. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  16. ASEAN energy cooperation an increasingly daunting challenge

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, F.

    2009-07-01

    energy appears to be an ideal area for cooperation: given the characteristics of these economies, and in particular their shared concerns with energy security, it seems logical for them to push for resource sharing and interconnecting so as to enhance security. Energy cooperation has indeed been on ASEAN's agenda for a long time and the recent rise in oil prices has no doubt rekindled interest in cooperative initiatives in the energy sector. However, an oft-heard criticism about ASEAN is that it tends to be often long on good intentions and relatively short on actions. The objective of the present paper is two-fold, first to survey and assess critically ASEAN's achievements in the area of energy cooperation, and secondly to examine the future prospects, as well as the limitations of further cooperation. In this context, the appropriate scope for further cooperation, in particular its extension beyond the borders of ASEAN, needs to be examined. The paper is organized in two parts. The first part provides a brief overview of the energy situation in ASEAN. The second part assesses the various cooperative initiatives undertaken by ASEAN and examines the opportunities and challenges associated with the extension of energy cooperation beyond the borders of ASEAN. (author)

  17. ASEAN energy cooperation an increasingly daunting challenge

    International Nuclear Information System (INIS)

    Nicolas, F.

    2009-01-01

    to be an ideal area for cooperation: given the characteristics of these economies, and in particular their shared concerns with energy security, it seems logical for them to push for resource sharing and interconnecting so as to enhance security. Energy cooperation has indeed been on ASEAN's agenda for a long time and the recent rise in oil prices has no doubt rekindled interest in cooperative initiatives in the energy sector. However, an oft-heard criticism about ASEAN is that it tends to be often long on good intentions and relatively short on actions. The objective of the present paper is two-fold, first to survey and assess critically ASEAN's achievements in the area of energy cooperation, and secondly to examine the future prospects, as well as the limitations of further cooperation. In this context, the appropriate scope for further cooperation, in particular its extension beyond the borders of ASEAN, needs to be examined. The paper is organized in two parts. The first part provides a brief overview of the energy situation in ASEAN. The second part assesses the various cooperative initiatives undertaken by ASEAN and examines the opportunities and challenges associated with the extension of energy cooperation beyond the borders of ASEAN. (author)

  18. Kazakhstan's Chairmanship of the Organization for Security and Cooperation in Europe: An Assessment

    Directory of Open Access Journals (Sweden)

    - Shirin Akiner

    2011-06-01

    Full Text Available Massive international comment and analysis was devoted to the Kazakhstan's Chairmanship in the Organization for Security and Cooperation in Europe (OSCE. No previous candidate for this office received such treatment. Kazakhstan's agenda of aims and objectives included important issues. During the year several steps were taken towards implementing Kazakhstan's agenda.

  19. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  20. Border Protection and National Security of Mongolia

    Science.gov (United States)

    2006-09-01

    simple acts, such as a cartographer labeling an island “Turkish” instead of “ Greek ,” have triggered the mobilization of armed forces on both sides as...been replaced with marble columns that are guaranteed to last for a century. Parts of the state borders in some directions have been negotiated and

  1. Joint malaria surveys lead towards improved cross-border cooperation between Savannakhet province, Laos and Quang Tri province, Vietnam

    Directory of Open Access Journals (Sweden)

    Pongvongsa Tiengkham

    2012-08-01

    Full Text Available Abstract Background In Savannakhet province, Laos and Quang Tri province, Vietnam, malaria is still an important health problem and most cases are found in the mountainous, forested border areas where ethnic minority groups live. The objectives of this study were to obtain a better joint understanding of the malaria situation along the border and, on the basis of that, improve malaria control methods through better cooperation between the two countries. Methods Fourteen villages in Savannakhet and 22 villages in Quang Tri were randomly selected within 5 km from the border where a blood survey for microscopic diagnosis (n = 1256 and n = 1803, respectively, household interviews (n = 400, both sides and vector surveys were conducted between August and October 2010. Satellite images were used to examine the forest density around the study villages. Results Malaria prevalence was significantly higher in Laos (5.2% than in Vietnam (1.8% and many other differences were found over the short distance across the border. Bed net coverage was high (> 90% in both Laos and Vietnam but, while in Laos more than 60% of the nets were long-lasting insecticide-treated, Vietnam used indoor residual spraying in this area and the nets were untreated. Anopheles mosquitoes were more abundant in Laos than in Vietnam, especially many Anopheles dirus were captured in indoor light traps while none were collected in Vietnam. The forest cover was higher around the Lao than the Vietnamese villages. After this study routine exchange of malaria surveillance data was institutionalized and for the first time indoor residual spraying was applied in some Lao villages. Conclusions The abundance of indoor-collected An. dirus on the Laos side raises doubts about the effectiveness of a sole reliance on long-lasting insecticide-treated nets in this area. Next to strengthening the early detection, correct diagnosis and prompt, adequate treatment of malaria infections, it is

  2. A NEW FORM OF SECURITY COOPERATION AND COLLECTIVECONFLICT MANAGEMENT IN THE POST COLD WARINTERNATIONAL SYSTEM

    Directory of Open Access Journals (Sweden)

    Sinem KOCAMAZ

    2011-01-01

    Full Text Available International security environment changed completely after the Cold War.During the Cold War years security challenges wereshaped by competitive powerrelations between Soviet Union and the United States. On the other hand after theend of the Cold War, global security was redefinedand wide range of securitychallenges and threats occurred. After fragmentation of security threats, newthreats emerged such as terrorist attacks, massacres which are made by humansown governments, chronic politic instabilities, environmental degradations etc.Under these circumstances new forms of security cooperation became more vitalin order to cope with these complex challenges. Inthis respect third partiesbecame an actor to manage conflicts, security challenges and crises. Unliketraditional nation-state intervention, regional organizations, international agenciesand non-governmental organizations became more active in conflict managementprocess. In this framework this study will evaluateperformance and theeffectiveness of the main actors in the collectiveconflict management (CCMprocess.

  3. Department of Defense and Security Cooperation: Improving Prioritization, Authorities, and Evaluations

    Science.gov (United States)

    2016-03-09

    March 9, 2016 Chairman Fischer , Ranking Member Nelson, and distinguished members of the subcommittee, thank you for the opportunity to testify...on the important subject of U.S. security cooperation. It’s a pleasure to appear before you today along with my colleagues, Jeff Eggers and Melissa...based evaluations. Chairman Fischer , Ranking Member Nelson, and members of the subcommittee, I appreciate the opportunity to offer this testimony, and I look forward to assisting the committee in its vital work.

  4. U.S. Security Cooperation with India and Pakistan: A Comparative Study

    Science.gov (United States)

    2013-06-01

    news_and_features/. /07indicipline_force.htm. 284 Richard Van Atta et al ., “Export Controls and the U.S. Defense Industrial Base,” Institute for Defense...Kargil War,” Indian Defense and Strategic Analysis, November 17, 2012. Available at defenceforumindia.com › Opinion › History. Atta, Richard Van et al ...This document was downloaded on August 22, 2013 at 10:36:47 Author(s) Bajwa, Shahid Latif Title U.S. security cooperation with India and Pakistan

  5. 78 FR 35103 - Extension of Border Zone in the State of New Mexico

    Science.gov (United States)

    2013-06-12

    ..., established in 1953, was intended to promote the economic stability of the border region by allowing for freer... having to obtain a Form I-94. Although the border zone was intended to promote the economic stability of... maintain security of the border while increasing economic activity in New Mexico's border region and...

  6. Secure and interoperable communication infrastructures for PPDR organisations

    Science.gov (United States)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  7. The impacts of the opening of the border bettveen Czechia and Germany

    Directory of Open Access Journals (Sweden)

    Joerg Maier

    1993-12-01

    Full Text Available The article discussed changes in the structure und quantity of transborder flows belween Czechia and Bavaria since the lifiing of the “Iron Curtain “ in 1989. In 1989 2.3 million passangers crossed the border, in 1992 over 35 million people have crossed it. In addition to tourist visits (shoping andsightseeing business travel has a steep incline. Cooperations among factories close to the border take place. An even more intensified cooperation is hiudered by the fact that theneighbouring countries are unawere of the language and culture of each other.

  8. Russia and the Shanghai Cooperation Organization: Some Elements of Strategy

    Directory of Open Access Journals (Sweden)

    Mikhail Konarovsky

    2016-12-01

    Full Text Available The new geopolitical reality that resulted from the dissolution of the USSR created the conditions for the establishment of the Shanghai Cooperation Organisation (SCO in 2001. The successful settlement of border issues between Russia and Kazakhstan, Kirgizstan and Tajikistan as well as with China also facilitated the process. With Uzbekistan joining the “Shanghai Five,” a new regional organization emerged. The SCO’s priorities were in the security sphere and the fight against the proliferation of drugs, illegal migration and organized crime, given the requirements of the times and the specific regional situation (including that in Afghanistan. As one of the active founders, Russia has always taken a leading role in the SCO’s organizational, political and legal formation, including setting specific trends and forms of cooperation, taking common measures, and holding events. During its presidency in 2008–2009 and 2014–2015, Moscow made additional efforts to strengthen cooperation among the SCO members in meeting new regional security challenges and to agree on coordinated positions on the key issues on the international and regional agenda. To increase the SCO’s credibility and political significance, Moscow emphasized its expansion, particularly with regard to the Eurasian Economic Union and the Silk Road Economic Belt. With global political and economic development growing more complicated, in order to revitalize Russia’s role in the SCO it is necessary to strengthen cooperation with China. The strategic character of bilateral relations reaffirmed at the Russian-Chinese summit in the summer of 2016 set a solid foundation.

  9. Borders and Borderlands in the Americas

    Science.gov (United States)

    2012-08-01

    both licit and illicit networks. Traditional territorial security concerns declined in the Americas following the end of the Cold War, and NAFTA in...deepen economic ties and liberalize regimes, privileging development over security.12 Similarly, trade, fostered through NAFTA , has shaped and affected...FOR FURTHER RESEARCH States determine what a “problem” at the border is through their constitutions , legal regimes, and policies. This means that

  10. Transboundary cooperation

    International Nuclear Information System (INIS)

    Rauber, D.

    2006-01-01

    The operation of nuclear power plants near national borders requires a close bilateral co-operation to cope with accidents having off-site radiological impacts. For example in 1978 such an agreement was signed by the German and Swiss government. The accident at the Chernobyl NPP changed the international co-operation in the framework of international consequence management. International conventions were agreed to insure a timely notification and international assistance in case of an accident with transboundary effects. In order to fulfill these conventions several procedures were introduced. In addition, bilateral agreements were signed also with countries which are not operating nuclear power plants near national borders. Since then no accident took place that would have required any notification. However, following the experience the expectations to these networks have changed considerably and hence sustainable development is required to cope with new challenges such as long term consequences management, new radiological threats, faster international assistance, media and public concerns, and technical evolution of communications systems. (author)

  11. STUDY REGARDING THE POSSIBILITY TO DEVELOP TOURISM AND CROSS-BORDER COOPERATION THROUGH A BUSINESS INCUBATOR AT VADUL CRIªULUI (BIHOR COUNTY

    Directory of Open Access Journals (Sweden)

    Attila Ambrus

    2012-07-01

    Full Text Available In this article I have presented the results of a research realized at the end of the year 2011, within the framework of the cross-border project entitled n#8222;Business incubator for cross-border tourist developmentn#8221;. This incubator will be constructed in Vadu Criºului Community, Bihor County, while the realized study intended to demonstrate the fact that such initiative on one hand will attract investors, respectively companies with activities linked directly or indirectly to tourism n#8211; because the area offers them all the necessary conditions for business development-, while on the other hand this initiative can encourage and support cross-border tourist co-operation, especially with the balneary spa resort in Hajdúszoboszló, Hungary. For this reason a questionnaire was realized, which was applied not just in the micro-region of Vadu Criºului but in Hajdúszoboszló as well, especially distributed among the economical agents that have tourism linked to their activity. The study showed not just the resources and the modalities of existing advertising but also the possibilities of cross-border co-operation as a chance to develop tourism from the two regions. In this way, the study shows the fact that in the case of the macro-region of Vadu Criºului, the extension of the tourism services must be based on the natural characteristics of the region and on highly emphasized own initiatives, rather than the initiatives and the support or the administrative authorities. In the case of the Hajdúszoboszló resort, a tendency outlines among those who consider the tourism development in the resort essential, tourism services must be diversified, and more emphasis must be put on the implication of local authorities, a chance seen in cooperation with the tourist area without similar characteristics (namely, direct non-competitor, but from the cross-border region (the opening towards the Romanian side is relevant

  12. Carbon tariffs and cooperative outcomes

    International Nuclear Information System (INIS)

    Eyland, Terry; Zaccour, Georges

    2014-01-01

    In the absence of an international environmental agreement (IEA) on climate change, a country may be reluctant to unilaterally implement environmental actions, as this may lead to the relocation of firms to other, lax-on-pollution countries. To avoid this problem, while still taking care of the environment, a country may impose a carbon tariff that adjusts for the differences between its own carbon tax and the other country's tax. We consider two countries with a representative firm in each one, and characterize and contrast the equilibrium strategies and outcomes in three scenarios. In the first (benchmark) scenario, in a first stage the regulators in the two countries determine the carbon taxes noncooperatively, and in a second stage, the firms compete à la Cournot. In the second scenario, the regulators cooperate in determining the carbon taxes, while the firms still play a noncooperative Cournot game. In the third scenario, we add another player, e.g., the World Trade Organization, which announced a border tax in a prior stage; the game is then played as in the first scenario. Our two major results are (i) a border-tax adjustment (BTA) mimics quite well the cooperative solution in setting the carbon taxes as in scenario two. This means that a BTA may be a way around the lack of enthusiasm for an IEA. (ii) All of our simulations show that a partial correction of the difference in taxes is sufficient to maximize total welfare. In short, the conclusion is that a BTA may be used as a credible threat to achieve an outcome that is very close to the cooperative outcome. - Highlights: • One of the first studies to consider border-tax adjustment in a strategic context. • Border-tax adjustment can lead to an optimal outcome, in cooperative sense. • Optimal outcome is achieved with partial tax adjustment

  13. 77 FR 52753 - U.S. Customs and Border Protection 2012 East Coast Trade Symposium: “Expanding 21st Century...

    Science.gov (United States)

    2012-08-30

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border.... Customs and Border Protection, Department of Homeland Security (DHS). ACTION: Notice of trade symposium... Coast Trade Symposium will be held at the Renaissance DC Hotel, at 999 9th Street, NW., Washington, DC...

  14. Identifying and characterizing transboundary aquifers along the Mexico-US border: An initial assessment

    Science.gov (United States)

    Sanchez, Rosario; Lopez, Victoria; Eckstein, Gabriel

    2016-04-01

    The transboundary nature of water dividing Mexico and the United States (U.S.) transforms the entire border region into an instrument of cooperation, a source of conflict, a national security issue, and an environmental concern. Reasonable data collection and research analysis have been conducted for surface waters by joint governmental institutions and non-governmental bodies. However, with the exception of the U.S. Transboundary Assessment Act Program (TAAP) (focusing on the Hueco Bolson, Mesilla Bolson, San Pedro and Santa Cruz aquifers), there is no comparable research, institutional development, or assessment of transboundary groundwater issues on the frontier. Moreover, data collection and methodologies vary between the two countries, there is no broadly accepted definition of the transboundary nature of an aquifer, and available legal and policy frameworks are constrained by non-hydrological considerations. Hence, there is a conceptual and institutional void regarding transboundary groundwater resources between Mexico and the U.S. The purpose of this paper is to bridge this void and characterize transboundary aquifers on the Mexico-US border. It reviews existing international frameworks for identifying hydrological and social criteria that characterize an aquifer as transboundary. It then assesses data from both countries to propose where and which aquifers could be considered transboundary. Finally, the paper proposes an agenda for assessing Mexico-US transboundary aquifers as a means for improving groundwater management in the border region.

  15. Pastoralists at War: Violence and Security in the Kenya-Sudan-Uganda Border Region

    Directory of Open Access Journals (Sweden)

    Jonah Leff

    2009-12-01

    Full Text Available The majority of those living in the border region of Kenya, Sudan, and Uganda are pastoralists, whose livelihoods are dictated by the upkeep and size of their herds. Harsh environmental conditions force pastoralists to migrate in search of water and pasturelands during the dry season. With limited access to water and competing rights to land, intertribal conflict arises when pastoralists from one tribe enter the territory of another. The increased availability of small arms in the region from past wars increasingly makes ordinary clashes fatal. Governments in the region have responded with heavy-handed coercive disarmament operations. These have led to distrust and subsequent violent clashes between communities and security providers. This report reviews the scale, consequences of, and responses to the many pastoral conflicts, utilizing methodological tools such as key informant interviews, retrospective analysis, and a thorough review of available literature.

  16. The Role of Vietnam in The ASEAN Regional Security Cooperation: From Mechanism Construction to Dispute Settlement

    Directory of Open Access Journals (Sweden)

    Li Chunxia

    2016-12-01

    Full Text Available In the context of the integration of ASEAN, Vietnam recognized that the strategic role of ASEAN is in its diplomacy. At the same time, to further improve the status in the region and in the international community, Vietnam has actively been participating in ASEAN affairs. Vietnam not only promoted the integration process of ASEAN, but also promoted the political security cooperation of ASEAN, in which Vietnam has advantages and wants to play a leading role. On the one hand, Vietnam promotes the construction of political security cooperation mechanisms, such as ARF, ADMM+, and so on; on the other hand, Vietnam took the South China Sea as a common concern, actively appeals for a common ASEAN position, to maximize its own benefit. Vietnam will further enhance and consolidate its status and role in ASEAN in the future.

  17. UNESCO Without Borders

    DEFF Research Database (Denmark)

    The United Nations Educational, Scientific, and Cultural Organization (UNESCO) was established in 1945 with twin aims: to rebuild various institutions of the world destroyed by war, and to promote international understanding and peaceful cooperation among nations. Based on empirical and historical...... research and with a particular focus on history teaching, international understanding and peace, UNESCO Without Borders offers a new research trajectory for understanding the roles played by UNESCO and other international organizations, as well as the effects of globalization on education. With fifteen...

  18. Bilateral Cooperation Between Indonesia and Malaysia in Combating Transnational Crime

    OpenAIRE

    Mustofa, Prof. Muhammad

    2008-01-01

    This paper us discuss that bilateral cooperation between Indonesia and Malaysia in combating transnational crime or trans-border crime. First of all, it should be based on understanding the root of the problem in trans-border crime problems. Furthermore, the effective bilateral cooperation can occur when notice the same aspects in the definition of the crime, the existence of law, the recognition of the evidence, extradition agreement, and the network information between the states.

  19. Border Security and Military Support: Legal Authorizations and Restrictions

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2006-01-01

    .... Reported escalations in criminal activity and illegal immigration, however, have prompted some law makers to reevaluate the extent and type of military support that occurs in the Mexico-United States border region...

  20. Border blocking effects in collaborative firm innovation: exploring the factors related with scientist' willingness to incorporating external knowledge

    NARCIS (Netherlands)

    Broek, Jos; Benneworth, Paul Stephen; Rutten, Roel

    2016-01-01

    Border regions are not often associated with innovation and economic prosperity. Nevertheless, the opening up of borders in Europe has presented new opportunities for firms located in these border regions to co-operate and find necessary resources for their innovation process. Despite the reduction

  1. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  2. Over the border - the problems of uncontrolled radioactive materials crossing national borders

    Energy Technology Data Exchange (ETDEWEB)

    Duftschmid, K.E. E-mail: k.duftschmid@aon.at

    2002-03-01

    Cross-border movement of radioactive materials and contaminated items, in particular metallurgical scrap, has become a problem of increasing importance. Radioactive sources out of regulatory control, now often called 'orphan sources', have frequently caused serious, even deadly, radiation exposures and widespread contamination. The United States Nuclear Regulatory Commission reported over 2300 incidents of radioactive materials found in recycled metal scrap and more than 50 accidental smeltings of radioactive sources. A further potentially serious problem is illicit trafficking in nuclear and other radioactive materials. In 1995 the International Atomic Energy Agency (IAEA) started a programme to combat illicit trafficking in nuclear and other radioactive materials, which includes an international database on incidents of illicit trafficking, receiving reports from some 80 member states. For the period 1993-2000 the IAEA database includes 345 confirmed incidents. While from 1994-1996 the frequency declined significantly, this trend has been reversed since 1997, largely due to radioactive sources rather than nuclear material. This paper compares monitoring techniques for radioactive materials in scrap applied at steel plants and scrap yards with monitoring at borders, a completely different situation. It discusses the results of the 'Illicit Trafficking Radiation Detection Assessment Program', a large international pilot study, conducted in cooperation between the IAEA, the Austrian Government and the Austrian Research Centre Seibersdorf. The aim of this exercise was to derive realistic and internationally agreed requirements for border monitoring instrumentation. Finally the present extent of border monitoring installations is discussed. (author)

  3. Conference on the security of electricity supply: France-Germany crossed views

    International Nuclear Information System (INIS)

    Caron, Antoine; Kaelble, Laure; Maurer, Christoph; Veyrenc, Thomas; Roques, Fabien; Jacquemart, Yannick; John, Oliver

    2015-01-01

    The French-German office for Renewable energies (OFAEnR), in cooperation with the French transmission system operator - RTE, organised a conference on security of electricity supply in France and in Germany. In the framework of this French-German exchange of experience, about 160 participants exchanged their views on the following topics: the regulatory framework and the legal instruments for ensuring the security of supply, the role of energy transmission system operators, the role of renewable energies in the electricity market and their impact on the security of supplies. This document brings together the available presentations (slides) made during this event: 1 - Security of supply and electricity markets (Antoine Caron); 2 - White Paper on electricity Market Design (Laure Kaelble); 3 - Security of Supply - Concept and Definition: On the Way to a Common Understanding? (Christoph Maurer); 4 - The French capacity market: lessons learnt and way forward (Thomas Veyrenc); 5 - electricity market evolutions: divergencies and compatibilities between French and German models? (Fabien Roques); 6 - Infrastructures and European coordination: action of the French transmission system operator - RTE (Yannick Jacquemart); 7 - Interconnection and Security of Supply - experiences of the German TSO Amprion at the French-German Border (Oliver John)

  4. When the border talks: Singularities of the Argentine-Chilean relationship in recent decades

    Directory of Open Access Journals (Sweden)

    Miryam Colacrai

    2016-07-01

    Full Text Available The paper deals with bilateral relations between Argentina and Chile in recent decades, highlighting the potential of their new border relations. It assumes that the wide range of governmental actors, subnational and local entities linking each other have given this a unique dynamic border and are considered spaces of cooperation. The article is descriptive-reflective and is organized around a series of questions about the continued search for Argentine-Chilean border integration since the nineties and the construction of top-down and bottom-up institutional agreements. Within the variety of links, some remarkable examples are selected for the article like the "Integration Committees", the settlement of the Central West of South America Integration Zone (Zicosur and the Argentine-Chilean cooperation in Antarctica. It stresses the integrationist Maipú Treaty (2009 and institutions that charge different instances of bilateral dialogue.

  5. 75 FR 36663 - Notice of Meeting of the Advisory Committee on Commercial Operations of Customs and Border...

    Science.gov (United States)

    2010-06-28

    ... may close early if all business is finished. Members of the public may register online to attend this... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection [Docket No. USCBP-2010-0021... (COAC) AGENCY: U.S. Customs and Border Protection, Department of Homeland Security (DHS). ACTION: Notice...

  6. International cooperation for operating safety

    International Nuclear Information System (INIS)

    Dupuis, M.C.

    1989-03-01

    The international-cooperation organization in nuclear safety domain is discussed. The nuclear energy Direction Committee is helped by the Security Committee for Nuclear Power Plants in the cooperation between security organizations of member countries and in the safety and nuclear activity regulations. The importance of the cooperation between experts in human being and engine problems is underlined. The applied methods, exchange activities and activity analysis, and the cooperation of the Nuclear Energy Agency and international organizations is analysed [fr

  7. The problem of Indonesia’s leadership in ASEAN political and security cooperation

    Directory of Open Access Journals (Sweden)

    A. G. Smorzhevska

    2017-07-01

    Full Text Available The study is dedicated to modern approaches and policy of the Republic of Indonesia toward the process of regional integration in Southeast Asia. Key aspects and instruments of Indonesia’s increasing contribution in strengthening of the political and security cooperation between members of ASEAN have been explained by the researcher. The aim of the article is to identify the role of Indonesia in conduction of multilateral diplomacy within the framework of ASEAN political and security sphere, forms of its implementation as well as the specifics of limiting factors for such leadership. It has been argued by the author that Indonesia’s commitments to ASEAN and its desire to promote or inhibit the process of regional integration vary depending on policy areas and level of compliance to its national interests. Consequently, Indonesia’s main interests and priorities concerning the ASEAN integration process lie in security and defense sphere. Indonesia’s key role in building of the ASEAN Political and Security Community is to provide ideas and political concepts as well as to shape the regional agenda. Therefore, the country implements the relevant agreements and puts forward a number of regional initiatives in foreign policy and defense. Moreover, assuming the fact that direct regional mechanisms of conflict resolution has not been fully implemented yet, Jakarta works on its development, acting as a mediator and a reliable regional partner. In addition, it is worth to underline that Jakarta makes substantial contribution to regional efforts in counterterrorism. The benefit of this study is that it takes into consideration the specifics of the factors that reveal the limitations for leadership in the security sphere. The core principles of ASEAN functioning determine the degree and nature of Member States’ leadership in the region. The material power resources and implementation on power through coercion gave way to soft instruments of

  8. International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation : 60 Years of IAEA and EURATOM

    CERN Document Server

    Abousahl, Said; Plastino, Wolfango

    2018-01-01

    This open access book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensions. Current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that have the potential to increase the effectiveness of implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections examine scientific and technical challenges and discuss the role of international cooperation and actions of the scientific community in leading the world toward peace and security. The book – which celebrates 60 years of IAEA Atoms for Peace and Development and the EURA...

  9. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark

  10. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2004-11-04

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark.

  11. Feasibility Analysis of Developing Cross-border Network Education in China

    Science.gov (United States)

    Lan, Jun

    In the era of economic globalization, strengthen of international cooperation on network education is a general trend. Although China has not made commitments about the market access and national treatment of cross-border supply in Schedule of Specific Commitments on Services, the basic conditions of network education development in China have been met. The Chinese government should formulate strategies for the development of cross-border network education and take relevant measures to implement them. In the near future, the carrying out of cross-border network education in China will become an irreversible trend, and will possess broad prospect with the advance of globalization of Chinese education.

  12. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  13. Illicit economies and social order: the border area of Peru, Brazil and Colombia

    OpenAIRE

    Noam López; Diego Tuesta

    2015-01-01

    In recent years, the border shared by Peru, Colombia and Brazil has become an enclave of drug production and trafficking for the international markets. It is a territory whose control is disputed by non-state actors and where state security forces suffer from severe material and transport limitations. This paper takes an ethnographic approach to explain the limitations of border security and the institutional challenges of controlling drug and wood trafficking in this context. It places the i...

  14. The Malian Crisis and the Challenge of Regional Cooperation

    Directory of Open Access Journals (Sweden)

    Wolfram Lacher

    2013-06-01

    Full Text Available The weakness of regional security cooperation has been a key factor in the gradual destabilization of the Sahel-Sahara region over the past decade. While organized crime, extremist activity, and cross-border movements of arms and fighters have strengthened linkages among non-state actors in the region, state policies have failed to keep up. With the escalation of the crisis in Mali, West African states have adopted an approach diverging strongly from that of Mali’s North African neighbours. Western governments’ tendency to understand insecurity in the region through the notion of the Sahel has compounded the problem. Insecurity in the region, including criminal and extremist networks, is more Saharan than Sahelian in scope. North African states are part of the problem, and need to be part of the solution. A new framework for regional cooperation is needed – and while this can only be established on the initiative of regional states themselves, external actors need to adapt their policies to help such a framework emerge.

  15. Business, brokers and borders

    DEFF Research Database (Denmark)

    Walther, Olivier

    2015-01-01

    The objective of this paper is to show how a formal approach to networks can make a significant contribution to the study of cross-border trade in West Africa. Building on the formal tools and theories developed by Social Network Analysis, we examine the network organization of 136 large traders...... in two border regions between Niger, Nigeria, and Benin. In a business environment where transaction costs are extremely high, we find that decentralized networks are well adapted to the various uncertainties induced by long-distance trade. We also find that long-distance trade relies both on the trust...... and cooperation shared among local traders, and on the distant ties developed with foreign partners from a different origin, religion or culture. Studying the spatial structure of trade networks, we find that in those markets where trade is recent and where most of the traders are not native of the region...

  16. Illicit economies and social order: the border area of Peru, Brazil and Colombia

    Directory of Open Access Journals (Sweden)

    Noam López

    2015-12-01

    Full Text Available In recent years, the border shared by Peru, Colombia and Brazil has become an enclave of drug production and trafficking for the international markets. It is a territory whose control is disputed by non-state actors and where state security forces suffer from severe material and transport limitations. This paper takes an ethnographic approach to explain the limitations of border security and the institutional challenges of controlling drug and wood trafficking in this context. It places the ideas of reproduction and social change at the centre of the discussion on drugs and borders, as key ways of thinking about the dynamics of growing and processing coca-derived drugs in the global South.

  17. A Voice of the US Southwestern Border: The 2012 “We the Border: Envisioning a Narrative for Our Future” Conference

    Directory of Open Access Journals (Sweden)

    Josiah McC. Heyman

    2013-08-01

    Full Text Available In July 2012, a diverse group of US residents living near the US-Mexico border met in El Paso, Texas for a conference entitled, We the Border: Envisioning a Narrative for Our Future.  This paper describes a vision for the US-Mexico border by diverse border residents that is at odds with the widespread view of the border as a threat to the United States. These border residents viewed their region as a set of human communities with rights, capacities, and valuable insights and knowledge. They embraced an alternative vision of border enforcement that would focus on “quality” (dangerous entrants and contraband over “quantity” (mass migration enforcement.  They called for investments in the functionality and security of ports of entry, rather than in between ports of entry.  They noted the low crime rate in US border cities, and examined how policies of not mixing local law enforcement with federal immigration enforcement contributed to this achievement. They saw the border region as the key transportation and brokerage zone of the emerging, integrated North American economy. In their view, the bilingual, bicultural, and binational skills that characterize border residents form part of a wider border culture that embraces diversity and engenders creativity. Under this vision the border region is not an empty enforcement zone, but is part of the national community and its residents should enjoy the same constitutional and human rights as other US residents. The conference participants emphasized the necessity and value of accountability and oversight of central government enforcement operations, and the need for border communities to participate in federal decision-making that affects their lives. 

  18. The Free Trade Area of the Americas: Can Regional Economic Integration Lead to Greater Cooperation on Security?

    National Research Council Canada - National Science Library

    Sandoval, Thomas

    2002-01-01

    ...) and its impact on cooperative security in the Western Hemisphere. Similar to the l990s, when the U.S. government debated the pros and cons of the NAFTA, the United States now faces a debate over passage and implementation of the FTAA...

  19. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  20. From cooperation to globalization

    Directory of Open Access Journals (Sweden)

    Gabriela UNGUREANU

    2010-09-01

    Full Text Available Globalization is seen as a consequence of cross-border business. This complex and irreversible process can be seen as an extension of capitalist relations of production or increased interdependence in the economic system. Globalization has given rise to more and more fields of activity worldwide. To meet the challenges of business globalization, many companies form strategic alliances, cooperate or merge with other companies. Cooperation is seen by many companies as an alternative path to success. In recent years joint international associations, licensing, co-production agreements, joint research programs, exploration of consortia and other cooperative relationships between two or more corporations with potential have increased. We notice a cooperation tendency among small-sized companies, especially among those from the developing countries.

  1. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  2. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-12-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  3. United Nations - African Union Cooperation In Conflict Prevention, Peacekeeping and Peacebuildin

    Directory of Open Access Journals (Sweden)

    Liliya Igorevna Romadan

    2015-01-01

    Full Text Available The article addresses the cooperation between the United Nations and regional organizations, in particular the African Union in the sphere of security and settlement of conflicts. Over the last decade the role of the AU and sub regional organizations has dramatically increased. Through its agencies of ensuring peace and security the African Union is making significant contribution to strengthening stability and promotion of democracy and human rights in Africa. In the beginning of the article authors make a review of the level of security on the African continent and stress the sharpest conflict zones. According to researches one of the most turbulent regions on continent in terms of security is the North-East Africa. Continuing quarter-century war in Somalia, conflict relations between Somalia and Ethiopia, the border crises between Ethiopia and Eritrea, which in the late 20th century turned into the war between the two countries, finally, the number of armed clashes in Sudan attracted the special attention to the region of the entire world community. Authors pay the main attention to the cooperation between the United Nations and the African Union in the sphere of settling regional conflicts and holding peacekeeping operations. In the article the main mechanisms and methods that are used by the United Nations and the African Union to hold peacekeeping operations are analyzed in details. The situation in Somalia and efforts of the United Nations and the African Union that are making towards stabilization in this country are also studied. Authors reveal the basic elements and make a review of the mixed multicomponent peacekeeping operation of the United Nations and the African Union in Sudan. In the conclusion authors stress the measures that could strengthen the strategic cooperation between the United Nations and the African union. According to the authors the most important task is to solve problems of financing joint peacekeeping operations

  4. BTFS: The Border Trade Facilitation System

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, L.R.

    1999-03-18

    The author demonstrates the Border Trade Facilitation System (BTFS), an agent-based bilingual e-commerce system built to expedite the regulation, control, and execution of commercial trans-border shipments during the delivery phase. The system was built to serve maquila industries at the US/Mexican border. The BTFS uses foundation technology developed here at Sandia Laboratories' Advanced Information Systems Lab (AISL), including a distributed object substrate, a general-purpose agent development framework, dynamically generated agent-human interaction via the World-Wide Web, and a collaborative agent architecture. This technology is also the substrate for the Multi-Agent Simulation Management System (MASMAS) proposed for demonstration at this conference. The BTFS executes authenticated transactions among agents performing open trading over the Internet. With the BTFS in place, one could conduct secure international transactions from any site with an Internet connection and a web browser. The BTFS is currently being evaluated for commercialization.

  5. Benefits from increased cooperation and energy trade under CO2 commitments - the Nordic case

    International Nuclear Information System (INIS)

    Unger, T.; Ekvall, T.

    2003-01-01

    In this paper, benefits from increasing cross-border cooperation under future CO 2 commitments in the Nordic countries are examined and evaluated. Four cooperative strategies are analyzed and valued separately: cross-border electricity trade, cross-border emission-permit trade, the introduction of a trans-Nordic natural gas transmission grid, and, finally, utilization of all these three strategies simultaneously. The valuation is done under varying CO 2 commitments and under three different scenarios for future energy demand and technological development. In conducting this analysis, the energy-systems model-generator MARKAL (MARKet ALlocation) was used to model the Nordic energy system. It is shown that all cooperative strategies do lower the abatement costs considerably, especially if the strategy including full cooperation is utilized. In this case, additional costs from meeting CO 2 targets may be at least halved for commitments less than 10% reduction until 2050 based on emissions in 1995. No significant difference between low and high CO 2 commitments could be observed in the size of the benefits from cooperation, expressed in billions (10 9 ) of Swedish crowns. Benefits from cooperation are generally larger for scenarios including relatively higher future energy demand. (author)

  6. 19 CFR 19.47 - Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  7. Environmental health and hazardous waste issues related to the U.S.-Mexico border.

    Science.gov (United States)

    Carter, D E; Peña, C; Varady, R; Suk, W A

    1996-06-01

    Environmental health and environmental quality issues along the U.S.-Mexico border have been of concern for several years. The enactment of the North American Free Trade Agreement and the presence of the maquiladoras (foreign-owned industries using imported raw materials) have intensified those concerns recently. Efforts to assess these issues are complicated by the fact that many of the issues affecting the border region are within federal jurisdiction, but the problems are regional and local in nature. Thus, state and local governments become involved with public concerns about real and potential problems. One major problem is that environmental health data from this region are lacking, particularly from Mexico. Some new agencies such as the Border Environment Cooperation Commission, the United States-Mexico Border Health Commission, and the North American Commission on Environmental Cooperation have joined several existing agencies at the federal and state level to address environmental quality and health. Several studies have been initiated to determine air and water quality, but little is being done in the areas of hazardous waste and health assessment. Several problems are anticipated in the generation of such data, such as its format and accessibility. Data gaps and research needs are discussed.

  8. Latin American social medicine across borders: South-South cooperation and the making of health solidarity.

    Science.gov (United States)

    Birn, Anne-Emanuelle; Muntaner, Carles

    2018-02-22

    Latin American social medicine efforts are typically understood as national endeavours, involving health workers, policymakers, academics, social movements, unions, and left-wing political parties, among other domestic actors. But Latin America's social medicine trajectory has also encompassed considerable between-country solidarity, building on early twentieth century interchanges among a range of players who shared approaches for improving living and working conditions and instituting protective social policies. Since the 1960s, Cuba's country-to-country solidarity has stood out, comprising medic exchanges, training, and other forms of support for the health and social struggles of oppressed peoples throughout Latin America and around the world, recently via Misión Barrio Adentro in Venezuela. These efforts strive for social justice-oriented health cooperation based on horizontal power relations, shared political values, a commitment to social and economic redistribution, bona fide equity, and an understanding of the societal determination of health that includes, but goes well beyond, public health and medical care. With Latin America's left-wing surge now receding, this article traces the provenance, dynamics, impact, challenges, and legacy of health solidarity across Latin American borders and its prospects for continuity.

  9. Successful international cooperation : The influence of cultural similarity, strategic differences, and international experience

    NARCIS (Netherlands)

    van Oudenhoven, JP; van der Zee, KI

    2002-01-01

    Cooperation between companies increasingly exceeds national borders. In the present study 78 international cooperation cases were examined. It was shown that similarity in national and corporate culture is associated with successful cooperation. On the other hand, with respect to corporate strategy,

  10. The Enemy at the Gates: International Borders, Migration and Human Rights

    Directory of Open Access Journals (Sweden)

    Pia Oberoi

    2013-07-01

    Full Text Available This article considers contemporary border management regimes from a human rights perspective. It demonstrates how a preoccupation with border controls and enforcement has led to serious concerns for the safety and protection of migrants. As border zones have expanded, border crossing has become a more stigmatized and dangerous activity, and even as globalization has given rise to easier and faster international travel, for some, such movement has been outlawed and stigmatized. Measures to strengthen and “secure” borders have paradoxically made migrants, particularly irregular and vulnerable migrants, more at risk of violence and exploitation by non-State and State actors. Migration governance regimes at international borders are thus increasingly located within security and enforcement frameworks that pay little attention to the principles and standards of international human rights law. The paper argues that a human rights-based approach to such regimes is urgently needed, in order to address a growing human rights crisis at international borders.

  11. Cooperation in energy acquisition; Kooperation in der Energiebeschaffung

    Energy Technology Data Exchange (ETDEWEB)

    Ahnis, Erik; Holzinger, Sebastian [Becker Buettner Held, Berlin (Germany)

    2011-09-15

    Increasing competition in the power industry has brought many utilities to reconsider their competitive standing. Long-term cooperations in electricity and gas acquisition are getting more important against this background as they will reduce the administrative expenditure, help develop new sources, and give more weight in business negotiations. Increasingly, cooperations are entered across national borders.

  12. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2012-04-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.  JEL Codes: G21, G28, G10Keywords: Bank, Banking, Financial Institution, Financial Market, Securities

  13. State borders in ETRS89 coordinates – reality or fiction ?

    Directory of Open Access Journals (Sweden)

    Jiří Poláček

    2015-12-01

    Full Text Available Common unique ETRS89 coordinates of the state boundaries are crucial for cross-border data harmonization for international projects. In the frame of European Location Framework (ELF project Czech Office for Surveying, Mapping and Cadastre (ČÚZK cooperates with Poland on egde-matching on the state border. During the preliminary phase of the project was some difficulty identified. If the state boundary is measured and administered in the national coordinate system, the accuracy of the transformation into the ETRS89 is influenced by discrepancies of the local trigonometric network, which results in two slightly different state boundaries. Final solution for Europe – international treaties on the state borders based on the ETRS89 coordinates – is necessary, but it will take years.

  14. The Nature and Functions of European Political Borders

    Directory of Open Access Journals (Sweden)

    Jernej Zupančič

    2008-07-01

    Full Text Available The political border limits a state’s territory and symbolizes the extent of a state’s power and ownership. Borders give integrity to the inner state territory which they enclose (the role of establishing national integrity and at the same time form an outer boundary segregating the state territory from the surrounding politicial entities (the segregation role. European borders are old and reflect the political history of an old continent. The last major border changes happened after World War II. Over the centuries borders were merely lines separating one territory from another. Such borders were understood as »frontiers«. Forming an effective barrier against enemies was the overriding function of borders. Many borders were fortified and further enhanced by means of various defensive systems. In the second half of the 20th century the character of political borders changed. They became a contact area between countries, nations and cultures. Contemporary European borders reflect the colourful history of an old continent. They are predominantely functional markers: they represent the political and juridical delimitation of territories, they mark economic barriers and show their defensive nature and reveal the extent of cultural contact. As a result of European integration processes, the nature of political borders has changed: instead of division, their integration role is brought to the fore. A united Europe is nevertheless still not a borderless Europe! The borders within the »Schengen-area« have retained their political and administrative functions, it is just that the customs and security checks at the borders have been removed. During the period of European integration, borderlines were stabilized in accordance with the 1974 Helsinki Agreement. But despite this we can still observe ongoing changes to state borders, particularly in areas of conflict such as the Balkan peninsula. It seems after all that the process of demarcation

  15. CROSS-BORDER COLLABORATION IN ENTREPRENEURIAL EDUCATION IN UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Mihaela DIACONU

    2016-06-01

    Full Text Available The entrepreneurship, as an integral part of education, is now widely accepted worldwide. Entrepreneurial education is considered today as a holistic and inclusive process and not just a component of education in business. The activity of developing the entrepreneurial spirit organized on new principles must be seen by the universities as the foundation of successful fulfillment of university’s mission in contributing to social and economic development. This paper's main purpose is to identify a number of solutions on how they can ensure through cross-border cooperation the development of entrepreneurial skills within the universities through learning experiences contexts. In this regard, the paper proposes a model of entrepreneurial project which takes the form of simulated enterprise developed by the University of Pitesti, and a number of solutions for this project to be developed and implemented through cross-border cooperation, in accordance with the strategies and principles promoted by European Commission and European Parliament, which stresses the importance of developing through international cooperation of innovative methods that go beyond the traditional frame in which, currently, are formed the competencies and the educational process is performed. Thus, the proposed model can be expanded and implemented "in the mirror" and internationally by building partnerships between countries, universities and economic agents from those countries with real benefits for all parties involved through valuing the national specificities.

  16. [Open Borders for Alpine Pastures: The History of the Pacage Franco- Suisse].

    Science.gov (United States)

    Schluep, J

    2017-01-01

    Alpine transhumance and summer grazing of animals on both sides of the French-Swiss border has a long tradition. The Bernese authorities first regulated the movement of animals across the French border in the 18th century due to outbreaks of epidemics. At that time the importation of cattle from the "Franche-Comté" was forbidden, but grazing on the French side of the border remained allowed. The 1912 agreement, relating to grazing on both sides of the border, was used for decades as a guideline to ensure the open communication and close cooperation of the veterinary and customs authorities of both countries with regard to border traffic. During World War I the movement across the border was temporarily stopped, whereas it remained open during World War II. During the last two decades of the 20th century problems have arisen due to IBR/ IPV from the Swiss, and BSE from the French point of view. In 1996, France annulled the 1912 agreement without any negative impact on the movement of animals across the border. As of 1999, the EU communitarian veterinary regulations apply, and veterinary border inspections have been abolished.

  17. [Malaria in the triple border region between Brazil, Colombia and Peru].

    Science.gov (United States)

    Peiter, Paulo César; Franco, Vivian da Cruz; Gracie, Renata; Xavier, Diego Ricardo; Suárez-Mutis, Martha Cecilia

    2013-12-01

    This article aims to analyze the malaria surveillance situation on the triple border between Brazil, Colombia, and Peru. This was a qualitative study using questionnaires in the border towns in 2011. The results were analyzed with the SWOT matrix methodology, pointing to significant differences between the malaria surveillance systems along the border. Weaknesses included lack of linkage between actors, lack of trained personnel, high turnover in teams, and lack of malaria specialists in the local hospitals. The study also showed lack of knowledge on malaria and its prevention in the local population. The strengths are the inclusion of new institutional actors, improvement of professional training, distribution of insecticide-treated bed nets, and possibilities for complementary action between surveillance systems through cooperation between health teams on the border. Malaria control can only be successful if the region is dealt with as a whole.

  18. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Directory of Open Access Journals (Sweden)

    Maoqiang Yang

    2016-11-01

    Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  19. Many rivers to cross. Cross border co-operation in river management

    NARCIS (Netherlands)

    Verwijmeren, J.A.; Wiering, M.A.

    2007-01-01

    River basin management is a key concept in contemporary water policy. Since the management of rivers is best designed and implemented at the scale of the river basin, it seems obvious that we should not confine ourselves to administrative or geographical borders. In other words, river basin

  20. Stolen Vehicles for Export: A Major Concern for Domestic and International Security

    Science.gov (United States)

    2018-03-01

    xi LIST OF ACRONYMS AND ABBREVIATIONS AES Automated Export System BEST Border Enforcement Security Task Force CSI Container Security Initiative...motor vehicles, increase inspections of exports, and enhance enforcement capabilities. Unfortunately, this thesis was unable to establish a clear link...and a better understanding could only benefit law enforcement’s efforts to counter it. 14. SUBJECT TERMS Border Enforcement Security Task Force

  1. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  2. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  3. A Secure Base from which to Cooperate: Security, Child and Parent Willing Stance, and Adaptive and Maladaptive Outcomes in two Longitudinal Studies.

    Science.gov (United States)

    Goffin, Kathryn C; Boldt, Lea J; Kochanska, Grazyna

    2017-10-17

    Early secure attachment plays a key role in socialization by inaugurating a long-term mutual positive, collaborative interpersonal orientation within the parent-child dyad. We report findings from Family Study (community mothers, fathers, and children, from age 2 to 12, N = 102, 51 girls) and Play Study (exclusively low-income mothers and children, from age 3.5 to 7, N = 186, 90 girls). We examined links among observed secure attachment at toddler age, child and parent receptive, willing stance to each other, observed in parent-child contexts at early school age, and developmental outcomes. The developmental outcomes included parent-rated child antisocial behavior problems and observed positive mutuality with regard to conflict issues at age 12 in Family Study, and mother-rated child antisocial behavior problems and observed child regard for rules and moral self at age 7 in Play Study. In mother-child relationships, the child's willing stance mediated indirect effects of child security on positive mutuality in Family Study and on all outcomes in Play Study. In father-child relationships, both the child's and the parent's willing stance mediated indirect effects of child security on both outcomes. Early security initiates an adaptive developmental cascade by enlisting the child and the parent as active, willingly receptive and cooperative agents in the socialization process. Implications for children's parenting interventions are noted.

  4. Contested ‘relational policy spaces’ in two European border regions

    DEFF Research Database (Denmark)

    Dörry, Sabine; Walther, Olivier

    2015-01-01

    Cross-border cooperation to promote economic development and political integration has been among the EU’s key themes since the 1990s, and contemporary policy networks are considered useful organisational solutions. Focusing on transport policies in the border regions of Basel and Luxembourg, we...... analyse measures of persistency of national preferences among policy actors, mapping their perceived ‘policy spaces of action’ and conceptualising these policy spaces as relational. We discuss two empirical findings: The networks’ various actors on either side of the border appear to perceive the actual...... ‘policy spaces’ very differently. Therefore, and due to the networks’ terminability, these policy spaces are highly contested and frequently negotiated between the actors. Based on a combination of in-depth interviews, sketch maps, and social network analysis, we show that large spatiocultural differences...

  5. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  6. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    Science.gov (United States)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  7. Cross border environmental issues arising from the former Soviet Union nuclear fuel cycle

    International Nuclear Information System (INIS)

    Shaw, B.R.; Dooley, J.J.; Bradley, D.J.

    1998-02-01

    Radioactive contamination from sites in the Former Soviet Union (FSU) threaten bordering states via transport through marine environments. Japan, North Korea, South Korea, Germany, Sweden, Norway, and Finland share waterways or border common bodies of water with the FSU. Cross-border contamination resulting from past and in some cases current radioactive waste practices FSU nuclear wastes could under the right circumstances destabilize military, economic, or other relationships between the FSU and these border nations. The United States has an ongoing obligation to assist many of these border nations in times of need. This analysis was sponsored by the Office of Policy and International Affairs, Office of Materials-Asset Management and National Security Policy Analysis. The Center for Environmental Security was tasked to identify cross-border and other policy issues from an extensive body of technical materials dealing with nuclear materials management in the Former Soviet Union compiled over time by Pacific Northwest National Laboratory. The analysis focused on cross-border impacts but also provides insights into policy analysis based on this existing technical work. The efficiencies and results realized by this study indicate that this analytical methodology has merit for additional policy studies. There are three elements comprising the problem of understanding cross border transport. The amount of FSU nuclear waste that has been disposed of in ways that did not, or probably will not contain the waste is the first element. The past and probable future entry of these wastes into groundwater and surface waters, thence to seas is the second. Finally, adverse effects on human health and welfare from ingesting contaminated sea products, and from damaged fisheries and food production activities is the third

  8. Managing State Border in the Context of Migration Crisis in Europe: Lithuanian Case

    Directory of Open Access Journals (Sweden)

    Aurelija Pūraitė

    2017-09-01

    Full Text Available The aim of this paper has been the achievement of the level of scientific knowledge on the subject of research in terms of establishment and analysis of economic effectiveness of state border governance in Lithuania in the context of increasing migration in European Union. The objective also has been to suggest the possible measures for improvement of state border management bearing in mind the migration perspectives. There is an unexpressed demand on migration (especially immigration as an economic and social phenomenon to have some positive impact on the economy of target country. It’s nevertheless true, that from political point of view the migration trends are usually being associated with the economic, social, security challenges in target countries. European Union countries which are the external borders of EU face with even more specific obstacles – the effective management of borders and necessity to bare costs of controlling migration flows. Therefore the effective use of economic and financial measures managing state borders is of the utmost importance reaching common goals of public security, stability, respect for European values and rule of law. The paper contains results of the analysis of international, regional and national legal acts and the secondary analysis of statistical data of European Union agencies and international organizations. The financial data of operational activities of Lithuanian State Border Guard Service is analysed, aiming to reveal the correlation between the effective management of state border control and financial support of the state and EU institutions.

  9. Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations

    Science.gov (United States)

    2015-12-01

    Journal of Criminology 49 no. 5 (2009): 628–645. 28 Torin Monahan, “The Future of Security? Surveillance Operations at Homeland Security Fusion...terrorism Imagining Future Crime in the ‘War on Terror.’” British Journal of Criminology 49 no. 5 (2009): 628–645. McLaughlin, John. “Serving the

  10. 8 CFR 212.6 - Border crossing identification cards.

    Science.gov (United States)

    2010-01-01

    ... Section 212.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DOCUMENTARY... valid on or after October 1, 2002, the non-biometric border crossing card portion of the document is not... contain a machine-readable biometric identifier, may be admitted on the basis of the nonimmigrant visa...

  11. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  12. The Impact of Illegal and Legal Migration on the Defense Security of South Africa

    Science.gov (United States)

    2012-03-19

    migrants among the most hostile anywhere in the world. This is despite the fact that the South African constitution explicitly extends basic human...principles as stipulated in the constitution . Border Security Priority Border security has become an important national priority – so much so...Three countries signed the North American Free Trade Association ( NAFTA ), however, as a result, the US is strengthening its border controls with

  13. 76 FR 71994 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2011-11-21

    ... recommendations on how to proceed on those topics: Subcommittee: The Global Supply Chain Security Land Border... document for public release.--Report by the Global Supply Chain Security Air Cargo Subcommittee. Status... surveys (IPR Partnership Program Survey and IPR Distribution Chain Management survey). Subcommittee...

  14. 77 FR 68802 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2012-11-16

    ... Strategy for Global Supply Chain Security as it relates to an effort to solicit, consolidate, and provide... of entry to help identify counterfeit products, the distribution chain management and serialization... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...

  15. Addressing competitiveness and leakage concerns in climate policy: An analysis of border adjustment measures in the US and the EU

    International Nuclear Information System (INIS)

    Asselt, Harro van; Brewer, Thomas

    2010-01-01

    The implementation of climate policies in the US and EU in light of uncertainties about future international climate policy has shifted attention to two interrelated concerns, namely competitiveness and carbon leakage. Although various policy measures are available to address these concerns, there has been much discussion about one such measure in particular: the use of offsetting measures at the border. This article compares policy discussions in the US and the EU on how to address competitiveness and carbon leakage concerns, with a focus on the role of import-related border adjustment measures. It analyses the kinds of measures that so far have been put forward with a view to addressing competitiveness and carbon leakage; compares the approaches to the problems in the US and the EU; and provides a preliminary discussion of international cooperation on border adjustment measures. It concludes that two kinds of cooperation are needed between the EU and the US - not only cooperation through formal international negotiations, but also cooperation through international learning processes, in which the EU and the US learn from each other about design and implementation issues as they develop their respective cap-and-trade systems.

  16. Caught in the Middle at the U.S.-Canadian Border

    Science.gov (United States)

    2013-03-01

    strategic-plan-fy-2012-2016.pdf.; Janet Napolitano, “Northern Border Strategy,” Homeland Security Digital Library, June 2012, http://www.hsdl.org...Stewardship,” Homeland Security Digital Library, January 19, 2007, http://www.hsdl.org/?view&did=470382. 14 U.S. Coast Guard, Great Lakes Maritime...28 per cent of merchandise shipments between Canada and the United States pass through the Windsor-Detroit Corridor … Our national economy―and our

  17. Problem zone and pioneer region. The Baltic region between controversies of energy policy and cooperative projects; Problemzone und Vorreiterregion. Der Ostseeraum im Spannungsfeld energiepolitischer Kontroversen und Kooperationsvorhaben

    Energy Technology Data Exchange (ETDEWEB)

    Lang, Kai-Olaf

    2010-10-15

    This publication describes how for the EU states bordering on the Baltic coast energy policy and energy economy have become crucial fields of bilateral and regional cooperation. On the one side this is attributable to the controversial Nord Stream Pipeline, growing concerns over the security of supply, vulnerabilities in energy policy - be they real or imagined - and to competing energy economic interests. On the other side, what has drawn numerous players' attention to the greater Baltic region as an attractive area in terms of energy policy are the prospects for multilateral cooperation projects and associated hopes for greater regional solidarity in issues of energy policy. In this sense the Baltic region is not only an energy political problem zone but also a potential pioneer region, namely when it comes to energy economic and energy political integration within the EU. This ambivalence should continue to characterise the region for the foreseeable future. The extent to which energy economic integration will in future prevail over particular national interests of energy and security policy will greatly depend on the initiatives which the EU Baltic states succeed in launching cooperatively at EU level.

  18. Nuclear terrorism: Identifying and combating the risks. International conference on nuclear security, 16 March 2005, London, UK

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    Security strategies, for many centuries, have been based on boundaries: the strategic placement of cities and borders to take advantage of natural barriers; defences that relied on walls, trenches and armadas; and the use of ethnic, religious or other groupings to distinguish friend from foe. In the 20th Century, the advent of airplanes, submarines and ballistic missiles began to undermine this approach to security by enabling the remote delivery of destruction on a scale previously not envisioned. But the change that has altered the international security landscape the most drastically is, in fact, globalization. The global community has become interdependent, with the constant movement of people, ideas and goods. Many aspects of modern life, communication, the global marketplace and, most recently, the rise in international terrorism - clearly indicate that our understanding of and approaches to national and international security must be adjusted, in keeping with new realities. This statement discusses: Nuclear Security and the Protection Against Nuclear Terrorism, IAEA Nuclear Security Plan of Activities founded on measures to guard against thefts of nuclear and other radioactive material and to protect related facilities against malicious acts; cooperation with other organizations and efforts

  19. The Fight against Terrorism and Cross-Border Crime in the European Union

    Directory of Open Access Journals (Sweden)

    Minodora-Ioana BĂLAN-RUSU

    2012-03-01

    Full Text Available Providing an area of freedom, security and justice, an objective assumed by the European Union can only be achieved under conditions that ensure an improvement of judicial cooperation activity in criminal matters. The Council Framework Decision 2008/615/JHA of 23 June 2008 is the framework normative act that rules the Member States' cooperation in the fight against terrorism and cross-border crime. This paper is a review of the European legislative act, with critical remarks and it represents the sequel of these types of examinations, previously published. The research results consist of the presentation of some critical observations regarding the skills of the agents operating in the territory of another Member State rather than in the country from where they come, terms of keeping the data that regards people, the need to take in the records the judicial persons and the need for establishing separate accounts that would regard the natural and legal persons from other countries that are not members of the European Union. The relevant conclusions highlight the usefulness of European legislative act as a whole and the need to complete it with new provisions. The work is useful both for theorists and practitioners in the field, the essential contribution consisting of the formulation of critical remarks and sustained proposals de lege ferenda.

  20. Managing Migration: Is border control fundamental to anti-trafficking and anti- smuggling interventions?

    Directory of Open Access Journals (Sweden)

    Rebecca Miller

    2013-09-01

    Full Text Available Over the last several decades, globalisation and a growing concern over security issues, including transnational crime and terrorism, has shaped migration policies and the priorities of states. As migration rose to the top of many government agendas, a rapid tightening and regularisation of borders ensued in an attempt to keep undesirable, high-risk migrants out of potential destination countries. Concomitantly, transnational crimes, such as trafficking in persons and the smuggling of migrants, have been increasingly defined as border security problems. This article examines the extent to which border control is fundamental to anti-trafficking and anti-smuggling interventions, situating the debate within the wider nexus of globalisation and the securitisation of migration. Based upon their work with the United Nations Office on Drugs and Crime (UNODC Regional Centre for Southeast Asia and the Pacific, the authors take the standpoint that given it is the sovereign right of each state to control its border and regulate migration, the human rights of migrants must be considered within this realpolitik. Clearly, though, this claim is highly political and contentious. In the article, we explore some of the tensions and contradictions that have emerged in this debate, and then develop an argument to suggest that it is possible for states to combine managed migration and strict border controls with the protection of human rights in the current context of globalisation.

  1. National wildlife refuge management on the United States/Mexico border

    Science.gov (United States)

    William R. Radke

    2013-01-01

    Many conservation strategies have been developed by the U.S. Fish and Wildlife Service in cooperation with others to protect habitat and enhance the recovery of fish and wildlife populations in the San Bernardino Valley, which straddles Arizona, United States, and Sonora, Mexico. Habitats along this international border have been impacted by illegal activities,...

  2. Expeditionary Border Security Operations: Eliminating the Seams

    National Research Council Canada - National Science Library

    Zinno, Michael J

    2008-01-01

    .... This convergence greatly expands the scope and capability of each individual terrorist or criminal organization and the cumulative effect can overwhelm the security forces of many nations and provide...

  3. Border Crossings, US-Mexico Border, 2010, NAVTEQ

    Data.gov (United States)

    U.S. Environmental Protection Agency — NAVTEQ Border Crossings for Region 9. The Border Crossing layer contains all international border crossings for all motorway crossings, as well as other important...

  4. Cross-border contraband trade across the main route from Moyale to ...

    African Journals Online (AJOL)

    Journal of Business and Administrative Studies ... and the countries' peace and security, are challenged by the increasing nature of illegal cross border trade. ... of the business through various interventions, the success so far is limited.

  5. Lessons from collaborative governance and sociobiology theories for reinforcing sustained cooperation: a government food security case study.

    Science.gov (United States)

    Montoya, L A; Montoya, I; Sánchez González, O D

    2015-07-01

    This research aimed to understand how cooperation and collaboration work in interagency arrangements using a case study of the public management of food security and nutrition in Bogotá, Colombia. This study explored the available scientific literature on Collaborative Governance within the Public Management body of knowledge and the literature on Cooperation from the Sociobiology field. Then, proposals were developed for testing on the ground through an action-research effort that was documented as a case study. Finally, observations were used to test the proposals and some analytical generalizations were developed. To document the case study, several personal interviews, file reviews and normative reviews were conducted to generate a case study database. Collaboration and cooperation concepts within the framework of interagency public management can be understood as a shared desirable outcome that unites different agencies in committing efforts and resources to the accomplishment of a common goal for society, as seen in obtaining food and nutrition security for a specific territory. Collaboration emerges when the following conditions exist and decreases when they are absent: (1) a strong sponsorship that may come from a central government policy or from a distributed interagency consensus; (2) a clear definition of the participating agencies; (3) stability of the staff assigned to the coordination system; and (4) a fitness function for the staff, some mechanism to reward or punish the collaboration level of each individual in the interagency effort. As this research investigated only one case study, the findings must be taken with care and any generalization made from this study needs to be analytical in nature. Additionally, research must be done to accept these results universally. Food security and nutrition efforts are interagency in nature. For collaboration between agencies to emerge, a minimum set of characteristics that were established during the

  6. East Africa’s Fragmented Security Cooperation

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    Since the 1990s, East Africa has developed what appears to be an impressive security architecture. Katja Lindskov Jacobsen and Johannes Riber Nordby warn, however, that appearances can be deceptive. The region’s security institutions remain too nationalistic and self-interested for their own good....

  7. Assessing Security Cooperation as a Preventive Tool

    Science.gov (United States)

    2014-01-01

    Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by...deductible charitable contribution at www.rand.org/giving/contribute.html R® is a registered trademark © Copyright 2014 RAND Corporation This document...OECD—See Organisation for Economic Co-Operation and Development. Organisation for Economic Co-Operation and Development, Development Assistance

  8. EUROPEAN UNION INITIATIVES IN TACKLING MIGRATION AND ORGANIZED CRIME AT ITS NEW EASTERN BORDER

    Directory of Open Access Journals (Sweden)

    Adrian Pop

    2008-04-01

    Full Text Available The EU migration strategy in relation to its new eastern neighbours has started to take shape. Among other things, it includes: applying the Global Approach to Migration to the eastern regions neighbouring the EU; securing the necessary funding for migration management through the European Neighbourhood and Partnership Instrument (ENPI and the Thematic Programme for the cooperation with third countries in the areas of migration and asylum; promoting mobility partnerships and circular migration; concluding short-term visa facilitation and readmission agreements; and opening the first Common Visa Application Centre in the capital city of the Republic of Moldova. In addition, the EU has improved its regional focus by the help of the Black Sea Synergy European Commission Communication and extended for 2008-2009 the mandate of its Border Assistance Mission to Moldova and Ukraine (EUBAM, which is set to tackling irregular migration, drugs and cigarettes smuggling, and stolen cars and guns trafficking.

  9. Power, Profits, and Politics: Energy Security and Cooperation in Eurasia

    Science.gov (United States)

    Svyatets, Ekaterina

    This study explores varying outcomes of energy cooperation, defined as diplomatic relations, bilateral trade, and investment in oil and natural gas. Tests of theories pertinent to energy security - broadly speaking, realism, liberalism, and domestic politics---reveal that they alone can offer only a narrow and one-sided explanation, not embracing the complexity of energy issues. Nevertheless, using them as a starting point, this study outlined a structured framework that incorporates three variables---economic potential, geopolitical rivalry, and domestic interest groups---that are applied to the cases of U.S.-Russia, U.S.-Azerbaijan, and Russia-Germany energy ties. This study concludes that if the economic potential (defined by geographic proximity and resource availability) is very high, such as in the case of Russia-Germany, states can overcome geopolitical rivalries and historical enmities in favor of energy cooperation. However, if the economic potential is relatively low (because of geographic obstacles or easily available alternative suppliers, as in the cases of U.S.-Russia and U.S.-Azerbaijan), then geopolitics prevails---for example, to bypass Russia or to limit American access to contracts in Russia when U.S.-Russian relations are strained. In all the cases explored here, domestic interest groups have mixed influence: if they are united along energy issues, they usually successfully achieve their energy policy goals, although the impact of these groups often becomes intertwined with state interests. In other situations, when powerful interest groups are divided or focused on non-energy-related issues (such as ethnic priorities), their influence over energy deals is much lower.

  10. Innovations in the Baltic Sea Region and Network Cooperation between Russia and the EU

    Directory of Open Access Journals (Sweden)

    Fedorov Gennady

    2013-03-01

    Full Text Available Transnational (involving countries and cross-border (involving adjacent regions of different countries cooperation and integration are rapidly developing in the Baltic Sea region. Russia lags behind the Nordic countries and Germany as far as innovative development is concerned; yet our national pace here is comparable to that of Poland and the three Baltic States. At the same time, the features of innovative cooperation vary a great deal depending on the group of countries involved in cooperation processes. Independent of its type, however, international cooperation is beneficial for all parties concerned and should therefore be more actively encouraged. Northwestern Federal District traditionally plays a special role in the development of EU-Russia cooperation, since a number of its regions border on the EU countries. The district participates in the development of network innovative structures within the Baltic Sea region. It takes an active part in cross-border cooperation — activities that involve the formation of transborder innovative clusters. There are high expectations associated with the formation of such territorially localised innovative networks, as the Helsinki — Saint Petersburg — Tallinn and Tricity (Gdansk, Gdynia, Sopot — Kaliningrad — Klaipeda transborder innovative clusters. The city of Saint Petersburg and the adjacent Leningrad region, as well as the Kaliningrad region can become innovative development corridors between Russia and the EU and, eventually, develop into the ‘economic growth poles’ of the Russian Federation.

  11. Deaths in the Desert: The Human Rights Crisis on the U.S.--Mexico Border

    Science.gov (United States)

    Androff, David K.; Tavassoli, Kyoko Y.

    2012-01-01

    Many would acknowledge that immigration is a major issue in the United States and that immigration reform should be a priority. However, there is little attention to the human rights crisis on the U.S.-Mexican border. As a result of tightened border security since 1994, it is estimated that over 5,000 migrants have died in the Sonoran desert. The…

  12. Ten years in disarmament and security: a mixed legacy; Dix annees de desarmement et de securite: un heritage nuance

    Energy Technology Data Exchange (ETDEWEB)

    Nolan, J E

    1998-10-01

    A retrospective of the developments in arms control and international security over last decade is necessarily a dialectic, a chronicle of points and counterpoints. The transformations in the international system that have results from the demise of bipolarity and the rise of trans nationalism have opened new opportunities for positive global engagement through international finance, production, trade, communications and by implication, conflict prevention and non-proliferation. The vastly increased pace and commercialisation of technological innovation also portend growing economic interdependence and higher transparency in the international system. Trans nationalism also implies shared risks posed by cross-border conflicts, sudden migrations, organized crime, ecological destruction and more rapid diffusion of technologies to build weapons of mass destruction. How these developments will translate into more cooperative security policies remains hard to predict and widely disputed

  13. Benefits from increased cooperation and energy trade under CO2 commitments - The Nordic case

    International Nuclear Information System (INIS)

    Unger, Thomas; Ekvall, Tomas

    2001-01-01

    In this paper, benefits from increasing cross-border cooperation under future CO 2 commitments in the Nordic countries are examined and evaluated. Cooperative strategies including border-free electricity trade, emission-permits trade and extending the natural gas transmission capacity considerably are valued separately and together under varying CO 2 commitments and three different scenarios for future energy demand. In conducting this analysis, the energy-systems engineering model MARKAL was used to model the Nordic energy system. It is shown that all cooperative strategies do lower the abatement costs considerably, especially if all three strategies mentioned are used simultaneously. Additional costs from meeting CO 2 commitments may be at least halved provided that all cooperative strategies are utilized at the same time. Benefits from cooperation are generally larger for scenarios including relatively high future energy demand, while they are lower for scenarios with relatively lower energy demand. In the model used, no specific trend connecting the size of the benefits from cooperation to the size of the CO 2 commitments could be observed

  14. The Hammer and the Anvil: The Need for A Comprehensive Southwest Border Security Strategy

    Science.gov (United States)

    2010-06-02

    ublic figures voiced concern about the “war on drugs,” the right level and kind of immigration, problems along the southwest border, migration , crises...thesis, Naval Postgraduate School, 2006), 1. 27 K. Larry Stores, Mexico-U.S. Dialogue on Migration and Border Issues 2001-2005, (Washington, DC...13 Seven organized crime families operate the drug trade in and from Mexico. The Sinaloa Federation is a cocaine smuggling organization headed by

  15. Radiation Control on Uzbekistan Borders - Results and Perspectives

    International Nuclear Information System (INIS)

    Petrenko, Vitaliy; Yuldashev, Bekhzod; Ismailov, Ulughbek; Shipilov, Nikolay; Chipizubov, Sergey; Avezov, Anvar

    2009-01-01

    The measures and actions on prevention, detection and response to criminal or unauthorized acts involving radioactive materials in Uzbekistan are presented. In frames of program of radiation monitoring to prevent illicit trafficking of nuclear and radioactive materials main customs border checkpoints were equipped with commercial radiation portal monitors. Special radiation monitors elaborated and manufactured in INP AS RU are installed in INP(main gates, research reactor and laboratory building) to provide nuclear security of Institute facilities. The experience of Uzbekistan in establishing radiation monitoring systems on its borders, their operation and maintenance would be useful for realization of proposed plan of strengthening measures to prevent illicit trafficking in Republics of Central Asia region.

  16. Cross-border effects of capacity mechanisms in interconnected power systems

    NARCIS (Netherlands)

    Bhagwat, P.C.; Richstein, J.C.; Chappin, E.J.L.; Iychettira, K.K.; de Vries, L.J.

    2017-01-01

    The cross-border effects of a capacity market and a strategic reserve in interconnected electricity markets are modeled using an agent-based modeling methodology. Both capacity mechanisms improve the security of supply and reduce consumer costs. Our results indicate that interconnections do not

  17. Beyond Our Borders? Public Resistance to Global Genomic Data Sharing.

    Directory of Open Access Journals (Sweden)

    Mary A Majumder

    2016-11-01

    Full Text Available Prospects have never seemed better for a truly global approach to science to improve human health, with leaders of national initiatives laying out their vision of a worldwide network of related projects. An extensive literature addresses obstacles to global genomic data sharing, yet a series of public polls suggests that the scientific community may be overlooking a significant barrier: potential public resistance to data sharing across national borders. In several large United States surveys, university researchers in other countries were deemed the least acceptable group of data users, and a just-completed US survey found a marked increase in privacy and security concerns related to data access by non-US researchers. Furthermore, diminished support for sharing beyond national borders is not unique to the US, although the limited data from outside the US suggest variation across countries as well as demographic groups. Possible sources of resistance include apprehension about privacy and security protections. Strategies for building public support include making the affirmative case for global data sharing, addressing privacy, security, and other legitimate concerns, and investigating public concerns in greater depth.

  18. Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues

    National Research Council Canada - National Science Library

    Morgan, Daniel; Krouse, William

    2005-01-01

    .... This report provides an overview of biometric technologies and the major U.S. biometric border screening systems, including US-VISIT, and discusses issues such as cost, performance, and user acceptance...

  19. Public health and terrorism preparedness: cross-border issues.

    Science.gov (United States)

    Olson, Debra; Leitheiser, Aggie; Atchison, Christopher; Larson, Susan; Homzik, Cassandra

    2005-01-01

    On December 15, 2003, the Centers for Public Health Preparedness at the University of Minnesota and the University of Iowa convened the "Public Health and Terrorism Preparedness: Cross-Border Issues Roundtable." The purpose of the roundtable was to gather public health professionals and government agency representatives at the state, provincial, and local levels to identify unmet cross-border emergency preparedness and response needs and develop strategies for addressing these needs. Representatives from six state and local public health departments and three provincial governments were invited to identify cross-border needs and issues using a nominal group process. The result of the roundtable was identification of the needs considered most important and most doable across all the focus groups. The need to collaborate on and exchange plans and protocols among agencies was identified as most important and most doable across all groups. Development of contact protocols and creation and maintenance of a contact database was also considered important and doable for a majority of groups. Other needs ranked important across the majority of groups included specific isolation and quarantine protocols for multi-state responses; a system for rapid and secure exchange of information; specific protocols for sharing human resources across borders, including emergency credentials for physicians and health care workers; and a specific protocol to coordinate Strategic National Stockpile mechanisms across border communities.

  20. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  1. The Gulf Security Dialogue and Related Arms Sale Proposals

    National Research Council Canada - National Science Library

    Blanchard, Christopher M; Grimmett, Richard F

    2008-01-01

    ...) security cooperation under the auspices of a new Gulf Security Dialogue (GSD). The Dialogue now serves as the principal security coordination mechanism between the United States and the six countries of the Gulf Cooperation Council (GCC...

  2. PUBLIC SERVICES AND THE EURO-REGIONAL COOPERATION

    Directory of Open Access Journals (Sweden)

    Badulescu Alina

    2012-07-01

    Full Text Available Besides the goods and private services, covering the specific needs of individual or groups based on specific mechanisms of demand and supply, human needs can be addressed also through public services. They are designed to meet the general interests of members of a community or society at large and established by public authorities, subject to certain fundamental principles of organization and operation, such as: the principle of efficiency, the principle of equity, the principle of continuity, the principle of movability and the principle of decentralization. In the same time, public services involve in many areas of economic and social life is not just a national issue, but also have characteristics and provision ways at international, regional and euro-regional level. This paper underlines the main areas of euro-regional co-operation interest in the public services sectors, such as: the sectors of environment, agriculture and territorial planning, the sectors of transportation, security and telecommunication, the sector of the economy and labour force, the sector of cross-border populations: social protection and public health, the sectors of education, research and culture.

  3. Border Crossing Points, US-Mexico Border, 2015, NAVTEQ

    Data.gov (United States)

    U.S. Environmental Protection Agency — NAVTEQ Border Crossings for the United States. The Border Crossing layer contains all international border crossings for all motorway crossings, as well as other...

  4. The Korean Peninsula Energy Development Organization : implications for Northeast Asian regional security co-operation?

    International Nuclear Information System (INIS)

    Snyder, S.

    2000-01-01

    This paper identifies opportunities for co-operation on regional development and security in the North Pacific region. The Korean Peninsula Energy Development Organization (KEDO) was created in 1993 during bilateral negotiations between the United States and the Democratic People's Republic of Korea (US-DPRK) over North Korea's alleged nuclear weapons program. The negotiations resulted in an agreement to freeze North Korea's known nuclear weapons program in return for the construction of two proliferation-resistant 100 MWe light water reactors (LWR) in North Korea, and the provision of 500,000 tons of heavy fuel oil per year until the completion of the LWR construction as compensation for lost energy production capacity resulting from the shutting down of North Korea's nuclear reactors. The author described the activities of KEDO and examined its internal dynamics. The unique circumstances that produced the Agreed Framework and KEDO in response to a major international crisis of the nuclear program in the DPRK were also highlighted along with the US-DPRK bilateral agreement and the multilateral institution involving the United States, South Korea, Japan and the European Union. Financial support from Australia and Canada was discussed along with the mechanism for engaging North Korea in regularized interaction and technical cooperation. It was concluded that KEDO's record of successes and failures is mixed. The energy security issue has been identified as an area that could result in conflict among Northeast Asian countries which are increasingly dependent on oil supplies from the Middle East. In response, numerous multilateral financing mechanisms have been developed to promote joint business opportunities that exploit natural gas resources in the Russian Far East to address Japanese, Korean and Chinese energy needs. 35 refs

  5. Security Policy at Road’s End? The Roles of Sweden and Finland in the Nordic-Baltic Defence Cooperation Process

    Directory of Open Access Journals (Sweden)

    Winnerstig Mike

    2014-12-01

    Full Text Available The article addresses a number of questions related to Nordic and to an extent also Nordic-Baltic defence cooperation. First of all, how far has Nordic and Nordic-Baltic defence cooperation come today? Secondly, what are the differences in the approaches of Sweden and Finland when it comes to defence cooperation, especially regarding NATO, in the Nordic-Baltic area? As a first analytical result, it is apparent that the rhetorical standing of the Nordic and Nordic-Baltic defence cooperation process is greater than its real achievements, especially in terms of defence integration. Secondly, it seems also to be clear that the defence and security policy debates of Sweden and Finland are quite different. Some problems identified in the debates within the two countries, respectively, are very similar although the suggested solutions vary very remarkably. Regarding the key issue of NATO membership, the developments of the last few years suggest that the Swedish political establishment, as well as the general public, might be closer to a substantial discussion of NATO membership than their Finnish equivalents.

  6. Border Cracks: Approaching Border Security From a Complexity Theory and Systems Perspective

    Science.gov (United States)

    2012-12-01

    Immigration and Naturalization Service IRS Internal Revenue Service LFM La Familia Michoacana NAFTA North American Free Trade Agreement NDIC...The judicial system ensures the laws passed, along with the enforcement, are legal and in accordance with the Constitution . Judicial rulings are...and advises governmental agencies on activities suspected of constituting threats to Canada’s national security. Additionally, CSIS conducts

  7. Pipeline politics—A study of India′s proposed cross border gas projects

    International Nuclear Information System (INIS)

    Nathan, Hippu Salk Kristle; Kulkarni, Sanket Sudhir; Ahuja, Dilip R.

    2013-01-01

    India′s energy situation is characterized by increasing energy demand, high fossil fuel dependency, large import shares, and significant portion of population deprived of modern energy services. At this juncture, natural gas, being the cleanest fossil fuel with high efficiency and cost effectiveness, is expected to play an important role. India, with only 0.6% of proven world reserves, is not endowed with adequate natural gas domestically. Nevertheless, there are gas reserves in neighbouring regions which gives rise to the prospects of three cross border gas pipeline projects, namely, Iran–Pakistan–India, Turkmenistan–Afghanistan–Pakistan–India, and Myanmar–Bangladesh–India. This study is a political analysis of these pipeline projects. First, it provides justification on use of natural gas and promotion of cross border energy trade. Then it examines these three pipeline projects and analyses the security concerns, role of different actors, their positions, shifting goals, and strategies. The study develops scenarios on the basis of changing circumstances and discusses some of the pertinent issues like technology options for underground/underwater pipelines and role of private players. It also explores impact of India′s broader foreign relations and role of SAARC on the future of pipelines and proposes energy induced mutually assured protection (MAP) as a concept for regional security. -- Highlights: •We justify the need for cross border energy trade through gas pipelines for India. •We examine prospective pipeline projects—IPI, TAPI, MBI and their security issues. •We develop scenarios and analyze role of actors, their positions, and strategies. •We discuss technology and policy options for realizing these gas pipelines. •We propose energy induced mutually assured protection (MAP) for regional security

  8. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming

    KAUST Repository

    Park, Kihong

    2013-09-01

    In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods. © 1983-2012 IEEE.

  9. Transregional Threats and Maritime Security Cooperation

    Science.gov (United States)

    2017-08-01

    continue to grow. As of 2015, China’s coast guard had 205 ships, more than the combined coast guards of Japan, Vietnam, Indonesia, Malaysia , and the...raised the possibility of China assisting the Philippines in maritime security. • China has maritime security initiatives with Malaysia and...Pakistan. They have also conducted maritime safety drills with their Omani counterparts. In recent years, the IRIN has made efforts to operate well

  10. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  11. Border effects without borders: What divides Japan's internal trade?

    OpenAIRE

    Wrona, Jens

    2015-01-01

    Over the last 20 years the trade literature repeatedly documented the trade-reducing effects of inter- and intra-national borders. Thereby, the puzzling size and persistence of observed border effects from the beginning raised doubts on the role of underlying political borders. However, when observed border effects are not caused by political trade barriers, why should their spatial dimension then inevitably coincide with the geography of present or past political borders? This paper identifi...

  12. The role of spectroscopy versus detection for border security

    International Nuclear Information System (INIS)

    Kouzes, R.T.; Ely, J.H.

    2008-01-01

    Countries around the world are deploying radiation portal monitor systems to interdict the illicit shipment of radioactive material crossing international borders. Because of their high efficiency for gamma-ray detection, most deployed systems are based on plastic scintillators and are non-spectroscopic in capability. Spectroscopic portal monitor systems are undergoing engineering development for near term deployment. The ability to identify the detected radionuclides may allow improved operational handling of radiation alarms, particularly those from the normal commerce of naturally occurring radioactive material. The goal for improved systems is to increase the sensitivity to threats while reducing the operational impact of nuisance alarms. (author)

  13. Report on Symposium on Pacific Energy Cooperation 2001. Energy Security in Asian Region; Taiheiyo energy kyoryoku kaigi 2001 hokokusho. Asia chiiki no energy anzen hosho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-02-20

    The Symposium on Pacific Energy Cooperation (SPEC), which started in 1986 to discuss energy problems and international cooperation on energy in the Pacific region, met for 2001 in Tokyo on February 20 and 21, 2001, to discuss Energy Security in Asian Region. The conference comprised two keynote addresses, four sessions, and a panel discussion. Twenty-four countries and an international organization were represented by a total of 785 participants who actively exchanged views and opinions. With Director Tsutomu Toichi, The Institute of Energy Economics, Japan, acting as chairman, two keynote addresses were delivered. Minister of Oil Bijan Namdar Zanganeh of Iran reported on The Role of I. R. Iran in Meeting the Growing Oil and Gas Demand in the Asia-Pacific Region and Potential Cooperation with the Region's Consumers. Managing Director Phil Watts of the Royal Dutch/Shell Group reported on Security in Trust - Meeting Asian Energy Needs in the 21st Century. (NEDO)

  14. Chemical Sniffing Instrumentation for Security Applications.

    Science.gov (United States)

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  15. Breaking the deadlock: lessons from cross-border spatial projects in Flanders and the Netherlands

    NARCIS (Netherlands)

    de Vries, J.

    2008-01-01

    This paper explores the specific characteristics of decision-making in cross-border spatial projects and draws some lessons for European territorial cooperation. This is done by examining three major infrastructure projects between the Netherlands and Flanders: the construction of a high-speed rail

  16. ITDB Cooperation With International Organizations

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA illicit trafficking database cooperates with many international organizations. Among these organizations are Interpol, Universal Postal Union,and World Customs Organization. Other organizations are Organization for Security and Cooperation in Europe, UN Economic Commission for Europe, UN-Department of Disarmament Affairs and UN office for Drug and Crime. The cooperation with Interpol involves consultations on issues of training and technical assistance and other matters of common interest.

  17. 78 FR 11671 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2013-02-19

    ... Term. 5. Discuss the Statement of Work and Next Steps regarding the Global Supply Chain Subcommittee... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...

  18. In Defense of the Southern Borders of Russia and Allied Countries (the Russian Foreign Military Bases on the Black Sea-Caspian Arc of Tension

    Directory of Open Access Journals (Sweden)

    Vladimir I. Afanasenko

    2016-12-01

    Full Text Available December 25, 2014, President Vladimir Putin approved a new version of the military doctrine of the Russian Federation, which reflects manifested threat to Russia and its allies because the situation in Ukraine, especially in its south-east, in the Donets Basin; the events in Syria, Iraq, and Afghanistan; issues of interaction and cooperation with Abkhazia, South Ossetia, with the CSTO member countries, the BRICS. An important role in the strengthening of the southern borders of the security operate military bases and facilities of the Ministry of Defense of the Russian Federation, located in Transnistria, the Caucasus, Syria and Central Asia. Characteristics of these bases and their value in the Black Sea-Caspian arc of tension given in this article.

  19. 19 CFR 122.181 - Definition of Customs security area.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  20. The Challenging Task of Governing Cross-Border Investment in Peripheral Regions: Polish Investors in Northeast Germany

    Directory of Open Access Journals (Sweden)

    Kinder Sebastian

    2014-12-01

    Full Text Available The article investigates the challenging task of governing cross-border investment in peripheral regions. The main objective is to identify common opportunities and obstacles in the Pomerania Euroregion by taking the case study of Polish citizens/ entrepreneurs investing in northeast Germany. This relatively new phenomenon is accompanied by large uncertainties and risks, and lacks further empirical insights. At the same time it breaks new ground, creates alternatives, calls for the development of efficient modes of cross-border cooperation and addresses mutual governance issues on an inter-regional basis between manifold stakeholders on both sides of the border. The case study summarises findings from fieldwork, elaborates a quantitative and qualitative assessment of cross-border governance measures within formal and informal institutions, and tries to formulate policy recommendations for prospective approaches

  1. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  2. U.S. Customs and Border Protection Import Trade Trends - FY 2011, Year-End Report

    Data.gov (United States)

    Department of Homeland Security — U.S. Customs and Border Protection is pleased to present the Import Trade Trends Report. This report is produced semiannually and features graphical analysis and...

  3. U.S. Customs and Border Protection Import Trade Trends - FY 2010, Year-End Report

    Data.gov (United States)

    Department of Homeland Security — U.S. Customs and Border Protection is pleased to present the Import Trade Trends Report. This report is produced semiannually and features graphical analysis and...

  4. U.S. Customs and Border Protection Import Trade Trends -FY2012, Year-End Report

    Data.gov (United States)

    Department of Homeland Security — U.S. Customs and Border Protection is pleased to present the Import Trade Trends Report. This report is produced semiannually and features graphical analysis and...

  5. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  6. Secure Border Gateway Protocol and the External Routing Intrusion Detection System

    National Research Council Canada - National Science Library

    Kent, Stephen

    2000-01-01

    .... The Secure BGP projects designed a secure, scalable, deployable architecture (S-BGP) for an authorization and authentication system that addresses most of the security problems associated with BGP...

  7. Tradicii rossijskogo i evropejskogo predstavlenija o gosudarstvennoj granice v uslovijah transgranichnogo regional'nogo sotrudnichestva [The traditions of Russian and European perception of the state frontier in the conditions of transborder regional cooperation

    Directory of Open Access Journals (Sweden)

    Kosov Yuri

    2012-01-01

    Full Text Available The article focuses on the state frontier in European and Russian political cultures as a major instrument for developing trans-border regional cooperation. The term ‘state frontier’ is defined through a prism of regional integration processes. The authors examine the role of trans-border relations between Russia and the European Union in promoting mutually beneficial strategic cooperation in the Baltic Sea region. Historical experience, geopolitical position, national psychology and some other factors shape common perceptions of the state frontier in mass consciousness, which can vary from country to country. The state frontier is a key imperative of trans-border regional cooperation. The trans-border relations between Russia and the EU serve a foundation for the development of strategic partnership, and it is cross-border cooperation in the Baltic Sea region that proves to be most efficient in this respect. At present, there are several cooperation mechanisms and programmes in place which are aimed at enhancing Russia — EU relations in the Baltic Sea region. In the long-term perspective, the development of regional integration processes in the Baltic Sea region is seen as one of the key elements for increasing and strengthening strategic cooperation between Russia and the EU.

  8. The functional power of the CPLP in the framework ok development cooperation in food security and nutrition (FSN

    Directory of Open Access Journals (Sweden)

    Manuel Lapão

    2016-05-01

    Full Text Available The Community of Portuguese Speaking Countries (CPLP, about to celebrate its twenty year of existence, was born to preserve the language and a common cultural heritage and has been gradually strengthening other policy dimensions which have led to increased visibility. The cooperation in the areas of Health and Food and Nutrition Security (SAN is such an example. In fact, the "Food Security and Nutrition Strategy (ESAN-CPLP", adopted in 2011, is a real and operational tool to improve levels of human development in the member states of the CPLP, and is recognized in international fora as an example of good practice by partners such as the European Union, while also being perfectly aligned with the U.N.'s Goals of Sustainable Development. Despite the unique role of the CPLP and its potential functional power in the framework of international cooperation, some threats have emerged, preventing its further affirmation, namely the assertion of a clear political will by the member states. Despite the gap between the present CPLP and the Agostinho da Silva's dream of creating a true Lusophone community, its contemporary role and potential is quite clear, and outstanding are the efforts to establish in its framework the Human Right to Adequate Food.

  9. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  10. Cooperative Monitoring Center Occasional Paper/11: Cooperative Environmental Monitoring in the Coastal Regions of India and Pakistan

    Energy Technology Data Exchange (ETDEWEB)

    Rajen, Gauray

    1999-06-01

    The cessation of hostilities between India and Pakistan is an immediate need and of global concern, as these countries have tested nuclear devices, and have the capability to deploy nuclear weapons and long-range ballistic missiles. Cooperative monitoring projects among neighboring countries in South Asia could build regional confidence, and, through gradual improvements in relations, reduce the threat of war and the proliferation of weapons of mass destruction. This paper discusses monitoring the trans-border movement of flow and sediment in the Indian and Pakistani coastal areas. Through such a project, India and Pakistan could initiate greater cooperation, and engender movement towards the resolution of the Sir Creek territorial dispute in their coastal region. The Joint Working Groups dialogue being conducted by India and Pakistan provides a mechanism for promoting such a project. The proposed project also falls within a regional framework of cooperation agreed to by several South Asian countries. This framework has been codified in the South Asian Seas Action Plan, developed by Bangladesh, India, Maldives, Pakistan and Sri Lanka. This framework provides a useful starting point for Indian and Pakistani cooperative monitoring in their trans-border coastal area. The project discussed in this paper involves computer modeling, the placement of in situ sensors for remote data acquisition, and the development of joint reports. Preliminary computer modeling studies are presented in the paper. These results illustrate the cross-flow connections between Indian and Pakistani coastal regions and strengthen the argument for cooperation. Technologies and actions similar to those suggested for the coastal project are likely to be applied in future arms control and treaty verification agreements. The project, therefore, serves as a demonstration of cooperative monitoring technologies. The project will also increase people-to-people contacts among Indian and Pakistani policy

  11. Cross-Border Cooperation (CBC in Southern Europe—An Iberian Case Study. The Eurocity Elvas-Badajoz

    Directory of Open Access Journals (Sweden)

    Rui Alexandre Castanho

    2017-03-01

    Full Text Available The experiences of cross-border cooperation (CBC, undertaken not only in Europe but throughout the world, have enabled areas to gain greater importance in recent decades at an international level, showing potential for integrative functions and joint development as exemplified by several CBC projects. The present paper assesses the impact of CBC projects by analyzing a protocol established in 2013 between the cities of Elvas and Badajoz, which induced the creation of the Eurocity Elvas-Badajoz. The paper kicks off with a critical review on territorial factors for success in CBC areas, considering the analysis of several case studies throughout Europe. The lessons learned, taken from the analyzed case studies, and the identified territorial success factors were used as assessment points for the investigation of the target study area, the Eurocity ElvasBadajoz. The investigation explores public participation perceptions towards the identification of what changes with respect to standards of life with the CBC project, providing the current state of affairs and identifying where to place efforts in order to reach sustainable development for the region. While being a transition area, it presents several opportunities for growth. These opportunities have not yet been object of analysis and debate with respect to lasting, sustainable successful growth. The present research enables the identification of several territorial factors for success in the study area, such as the connectivity/movement between cities and strong political commitment. From the identified critical factors, it was possible to highlight the importance of public transportation as a priority for achieving success in this CBC project.

  12. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  13. Cooperación transfronteriza en investigación sobre diabetes mellitus tipo 2: México-Estados Unidos U.S.-Mexico cross-border cooperation in research on diabetes mellitus type 2

    Directory of Open Access Journals (Sweden)

    Jaume Canela-Soler

    2010-09-01

    Full Text Available OBJETIVO: Describir y analizar con un enfoque de estudio de caso el Proyecto de Prevención y Control de la Diabetes en la Frontera México-Estados Unidos (PDF-México/Estados Unidos, un esfuerzo de cooperación en investigación en salud en el que participaron instituciones federales, estatales y locales de ambos países. MÉTODOS: El proyecto utilizó un modelo de igual representación, participación, consenso y liderazgo compartido, con la participación de más de 130 instituciones coordinadas por organismos de ambos países. Se estudió una muestra aleatoria, multietápica, estratificada y por conglomerados de 4 020 personas mayores de 18 años que respondieron un cuestionario de preguntas relacionadas con la diabetes mellitus tipo 2 (DM2 y la salud. El análisis estadístico de la información muestral obtenida tuvo en cuenta el efecto del diseño. RESULTADOS: La prevalencia de DM2 diagnosticada fue de 14,9% (intervalo de confianza de 95% [IC95%]: 12,5-17,6 y la prevalencia de DM2 diagnosticada ajustada por edad fue de 19,5% (IC95%: 16,8-22,6 en la parte mexicana y de 16,1% (IC95%: 13,5-19,2 en la estadounidense. La prevalencia de la DM2 y los factores de riesgo no fueron exactamente iguales a lo largo de la frontera. CONCLUSIONES: La ejecución del PDF-México/Estados Unidos ha permitido por primera vez considerar la franja fronteriza entre ambos países como una unidad para la investigación epidemiológica. En iniciativas fronterizas futuras, se sugiere fortalecer el entendimiento mutuo de la estructura sociopolítica y de las formas de actuación por parte de las instituciones y otras entidades participantes en ambos lados de la frontera.OBJECTIVE: To describe and analyze, utilizing a case study approach, the U.S.- Mexico Border Diabetes Prevention and Control Project, a health research cooperation initiative incorporating the participation of federal, state, and local institutions of both countries. METHODS: A model of equal

  14. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  15. Trans-American Security: What's Missing? Strategic Forum, Number 228, September 2007

    National Research Council Canada - National Science Library

    Einaudi, Luigi R

    2007-01-01

    .... While traditional national security concerns have diminished, new issues are coming to the fore. Criminal gangs operating in urban areas throughout the hemisphere threaten security and engage in transnational criminal activities across borders...

  16. Surveillance Unattended Foliage Penetrating Radar for Border Control and Homeland Protection

    Directory of Open Access Journals (Sweden)

    Felicia Amato

    2013-06-01

    Full Text Available The increasing request for safety, security and environment protection at local and national level reveal the deficiency of the traditional surveillance and control centers to satisfy the needs and requirements of modern border control systems for homeland protection where land border is expected to be monitored as well as the maritime one. This is, for instance, the case of any land border affected by hidden immigration and/or illegal traffics as well as any small areas such as critical infrastructures or military/ civilian posts in forest or jungle environment characterized by vegetation. In such challenging environment, logistics constraints strongly recommend to have very low power devices able to operate months or years without maintenance. A such scenario should be the perfect place for implementing an Unattended Ground Sensors (UGS network making use FOliage PENetration (FOPEN radar for border control. The paper aims to present the basic characteristics and preliminary results of a Surveillance Unattended FOPEN (SUF radar suitable for detecting moving targets, people or vehicles, in dense forest environment.

  17. Fronteras 1976. San Diego/Tijuana--The International Border in Community Relations: Gateway or Barrier?

    Science.gov (United States)

    Skagen, Kiki, Ed.

    Nine papers comprise the proceedings from the conference on cultural interdependence between the border regions of San Diego, California, and Tijuana, Mexico. The papers discuss the following: (1) insurgence of the Southwest's Spanish-speaking minority since 1960; (2) opportunities for cooperation between the United States and Mexican governments;…

  18. Emerging Trends in Development of International Information Security Regime

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2016-01-01

    Full Text Available The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany. The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

  19. Improving customs’ border control by creating a reference database of cargo inspection X-ray images

    OpenAIRE

    Selina Kolokytha; Alexander Flisch; Thomas Lüthi; Mathieu Plamondon; Adrian Schwaninger; Wicher Vasser; Diana Hardmeier; Marius Costin; Caroline Vienne; Frank Sukowski; Ulf Hassler; Irène Dorion; Najib Gadi; Serge Maitrejean; Abraham Marciano

    2017-01-01

    Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and the trend towards 100% screening. It is therefore a goal to advance inspection methods to enable successf...

  20. Domestic cooperation in combating illegal nuclear traffic - Experience of the Emergency Service Center

    International Nuclear Information System (INIS)

    Smagala, G.; Tanczyk, R.

    2001-01-01

    Full text: Poland's experience in combating illicit trafficking in nuclear and radioactive materials dates from the end of 1990 when the government decided to expand detection capabilities at the border check-points and initiated a gradual deployment of the portal radiation devices to detect all attempts of imported commodities with raised radiation level. Although the country had already had well-developed regulations in place as well as accountability and control systems over nuclear material, radiation sources and devices, the need to enforce the control activities and to strengthen cooperation among the nuclear safety and radiological protection bodies and the law enforcement authorities appeared. Then, besides the importation of the post Chernobyl contamination transports, Poland experienced: the lost and vagabonding nuclear materials or radioactive sources from the former Soviet/Russian military bases deployed in Poland; the tourism trafficking in radioactive materials The task of combating illegal radioactive traffic has been entrusted to: the Border Guard and Customs services - at the borders; the Police and State Security services - mainly within the state Some contribution to that action have had also the recycling of metallurgical scrap plants, which decided to install fixed radiation control devices to protect their products from the presence of radioactive isotopes. The duty of the coordinator as well as providing an immediate assistance in case of a seizure or a suspicion about the seizure of unknown radioactive material, fulfils the Emergency Service Centre (ODSA) at the Central Laboratory for Radiological Protection (CLOR). ODSA has been established in the mid-60s and its fundamental responsibility is to collect notifications on radiological emergency events and to organize help to liquidate consequences of a radiation incident with involved sources. All users of radiation sources and the law enforcement officers are obliged to inform ODSA about

  1. Mission impossible or border security – Practical and effective infection control on air ambulances

    Directory of Open Access Journals (Sweden)

    M. Kuhn*

    2013-12-01

    These principles have been applied to our air ambulance system based from Lanseria International Airport. By combining preventative and control measures, there has been no breach in our infection control strategies, as evidenced by no growth noted on specific and random swabs even when more and more ”super bugs” are being identified in hospital. As an air ambulance service flying patients from various African countries, we have the responsibility to conduct our own ”Border Security” to keep our hospitals, patients, aircraft and crews clean and safe. In this presentation we will share our ”Border Security” principles and experiences with the audience.

  2. Illela border market: origin and contributions to trans-border ...

    African Journals Online (AJOL)

    Illela border market: origin and contributions to trans-border relations between Nigeria and Niger republic. ... cordial relations between her and her immediate neighbours and thus stem the scourge of smuggling and other trans-border crimes which have negatively affected the Nigerian economy and her international image.

  3. The financing of cooperative businesses

    Directory of Open Access Journals (Sweden)

    Alfredo Ispizua

    2005-12-01

    Full Text Available Concern for adequate funding, both at birth and consolidation of the cooperative enterprise, has been, is and will be a constant concern in the cooperative world. So, have emerged in the legal field, a number of financial instruments of various kinds: as equity securities or special interests that seek to cover traditional financing gaps.

  4. Trans-European transport network and cross-border governance

    DEFF Research Database (Denmark)

    Guasco, Clement Nicolas

    2014-01-01

    for coordinating knowledge, efforts and solutions across several national systems. In order to understand this governance setting, one needs to understand the specific quality of transnational governance in the EU, which is neither purely international nor federally integrated. The transport corridor between Malmö......This article looks at the implementation of trans-European transport corridors in the EU and the influence it has on governance within EU member-states. It considers the implementation of such a scheme in the context of cross-border cooperation and discusses the system of governance necessary...

  5. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  6. How to form on food and nutritional security for decision makers of communities and cooperative on Cuban

    Directory of Open Access Journals (Sweden)

    Inés Margarita Torres Rivero

    2013-12-01

    Full Text Available The purpose of this work is to support a training strategy for policy decision makers and managers of local projects Integrated in Alimentary and Nutritional Security (SAN in communities and cooperative, sustained on a pedagogical approach, based on the relationship between the components of the SAN, the government official's functions (FG and the administration of local projects integrated as way of performance of this subject. The objective of the strategy is to achieve that decision makers of Pinar del Rio province, can appropriate the knowledge, abilities and values for facilitating their integral preparation related with the SAN, and can negotiate the existent potentialities in communities and cooperative, develop local projects in SAN that supplement the emanated politics from state upper level, then the strategy allows a pertinent acting that impacts in the town that is an inevitable necessity for Cuba and specifically for this province, which is the most vulnerable province to environmental changes that so much influences in SAN.

  7. 33 CFR 117.925 - Cooper River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Cooper River. 117.925 Section 117.925 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements South Carolina § 117.925 Cooper River. The draw of the Seaboard...

  8. 33 CFR 117.713 - Cooper River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Cooper River. 117.713 Section 117.713 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements New Jersey § 117.713 Cooper River. (a) The drawspans for the...

  9. Interdepartmental Cooperation in Defence Issues and Strategic Intelligence

    Directory of Open Access Journals (Sweden)

    Nebojsa Nikolic

    2016-05-01

    Full Text Available The motivation for this paper comes from one successfully conducted empirical research about motivation of potential candidates to serve in the active reserve as a kind of military service which is recently introduced in the Serbian Army. The research team was faced with a set of problems related to the deadlines, resources and mandate issues. A solution was found in agile interdepartmental cooperation. Firstly, we started with identification of missing resources and mandates of our research team. Then, we investigated where we could find the missing issues. After that, we established lines for cooperation with other departments in the MoD. The clarity of interdepartmental communication and concretisation of demands and expectations were crucial for success. In the end we realized the full potential of interdepartmental cooperation and started to think about that phenomenon in the wider context of defence and security issues. We found some other examples of interdepartmental cooperation in earlier efforts of the defence sector reform, as well as some results in other armies. The paper presents strengths and opportunities of interdepartmental cooperation through temporary engaged working groups in the specific defence sector environment, as well as potential obstacles. In a wider aspect, interdepartmental cooperation in defence and security issues becomes more and more important because of new security challenges we are facing today.

  10. The Securitization of Migration: An Analysis of United States Border Security and Migration Policy Toward Mexico

    Science.gov (United States)

    2013-03-01

    constituted officer of the law , or to prevent the commission of a felony.109 On 27 February 1925, the U.S. Congress passed Public Law 502 (PL502), which...INS Immigration and Naturalization Service IRCA Immigration Reform and Control Act MOU Memorandum of Understanding NAFTA North American Free...major border communities, law enforcement officials conduct patrols behind massive fences while floodlights illuminate the border at night in an

  11. International Security in the World Economic Relations

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P

    2016-05-01

    Full Text Available The article discusses the urgent topic of the evolution of international relations, the issue of establishing international security, and the development of international economic cooperation based on the principles of security. In order to analyze the current status of international security in the world and to identify key factors that hinder the way of establishing a positive global community, researches by the international analytical centers together with the institutes for international security and cooperation have been generalized. To this end, both the status of and changes in the Global Peace Index in the recent years has been disclosed, the position of Ukraine in the world according to this index has been examined. It has been proven that the main international security problems are related to the armed conflicts, civil wars, political violence, terrorism impacting the development of humanity as a whole, the status of international relations, the evolution of the world economy as well as national economies. Further researches should be focused on how the status of peace in the countries impacts their economic status and the status of international cooperation in other areas of economic cooperation, excluding the military. It should be answered particularly, how the above indicated status affects strengthening the Ukraine's position in the world.

  12. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  13. Maritime Security Concerns of the East African Community (EAC ...

    African Journals Online (AJOL)

    The maritime domain of the East African Community (EAC) is affected by a number of maritime security threats, including piracy, armed robbery against ships and an ongoing maritime border dispute between Kenya and Somalia. Neither the EAC nor its member States have long-term and holistic maritime security policies.

  14. Fifty Feet Above The Wall: Cartel Drones in the U.S.-Mexico Border Zone Airspace, and What to do About Them

    Science.gov (United States)

    2018-03-01

    troop movements and border security personnel. It is sensible that the drug cartels, who have a history of adopting technology to perform surveillance...countering narco- drones at the U.S.–Mexico border. 14. SUBJECT TERMS U.S.–Mexico border, drug cartel, emerging threat, disruptive technology ...Forces Commander Michael Waltz. He contends, “unfortunately, I don’t think we’re ready right now…We don’t have the technology —both the detection

  15. The Colombian side of the colombian-brazilian border. An approach using the category of lawless area

    Directory of Open Access Journals (Sweden)

    Luis Fernando Trejos Rosero

    2015-01-01

    Full Text Available This study uses the category of lawless areas as an approach to the complex security situation resulting from increasing ties between localized criminality and transnational organized crime networks on the Colombian side of the Colombian-Brazilian border. The permanent presence of illegal armed actors in this border area is largely caused by the absence and weak presence of the Colombian State at its margins. The methodology used is both bibliographic and descriptive.

  16. Unresolved legal questions in cross-border health care in Europe: liability and data protection.

    Science.gov (United States)

    van der Molen, I N; Commers, M J

    2013-11-01

    Directive 2011/24/EU was designed to clarify the rights of EU citizens in evaluating, accessing and obtaining reimbursement for cross-border care. Based on three regional case studies, the authors attempted to assess the added value of the Directive in helping clarify issues in to two key areas that have been identified as barriers to cross-border care: liability and data protection. Qualitative case study employing secondary data sources including research of jurisprudence, that set up a Legal framework as a base to investigate liability and data protection in the context of cross-border projects. By means of three case studies that have tackled liability and data protection hurdles in cross-border care implementation, this article attempts to provide insight into legal certainty and uncertainty regarding cross-border care in Europe. The case studies reveal that the Directive has not resolved core uncertainties related to liability and data protection issues within cross-border health care. Some issues related to the practice of cross-border health care in Europe have been further clarified by the Directive and some direction has been given to possible solutions for issues connected to liability and data protection. Directive 2011/24/EU is clearly a transposition of existing regulations on data protection and ECJ case law, plus a set of additional, mostly, voluntary rules that might enhance regional border cooperation. Therefore, as shown in the case studies, a practical and case by case approach is still necessary in designing and providing cross-border care. © 2013 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  17. Border Encounters: American Cultural Politics and the U.S.-Mexico Border

    OpenAIRE

    Reimer, Jennifer Andrea

    2011-01-01

    AbstractBorder Encounters: American Cultural Politics and the U.S.-Mexico BorderbyJennifer Andrea ReimerDoctor of Philosophy in Ethnic StudiesUniversity of California, BerkeleyProfessor José David Saldívar, Co-ChairProfessor Laura E. Pérez, Co-ChairBorder Encounters: American Cultural Politics and the U.S.-Mexico Border is a transnational, interdisciplinary cultural study of the contemporary U.S.-Mexico border that argues for the critical role of the international border in the racial past, p...

  18. Regionalism, Security and Cooperation in Oceania

    Science.gov (United States)

    2015-06-01

    Cooperation in Oceania Introduction Australia, by dint of geography, trade and investment links, tourism , aid, defense assets and sport , has exercised a...storm damage). Potential second-order consequences include economic loss from these events, declining revenues from tourism , and emigration to escape...bridges, dams, schools, hospitals, sports facilities and government buildings. China also funds commercial projects that can deliver immediate

  19. Surveillance at sea: The transactional politics of border control in the Aegean.

    Science.gov (United States)

    Dijstelbloem, Huub; van Reekum, Rogier; Schinkel, Willem

    2017-06-01

    The relationship between vision and action is a key element of both practices and conceptualizations of border surveillance in Europe. This article engages with what we call the 'operative vision' of surveillance at sea, specifically as performed by the border control apparatus in the Aegean. We analyse the political consequences of this operative vision by elaborating on three examples of fieldwork conducted in the Aegean and on the islands of Chios and Lesbos. One of the main aims is to bring the figure of the migrant back into the study of border technologies. By combining insights from science and technology studies with border, mobility and security studies, the article distinguishes between processes of intervention, mobilization and realization and emphasizes the role of migrants in their encounter with surveillance operations. Two claims are brought forward. First, engaging with recent scholarly work on the visual politics of border surveillance, we circumscribe an ongoing 'transactional politics'. Second, the dynamic interplay between vision and action brings about a situation of 'recalcitrance', in which mobile objects and subjects of various kinds are drawn into securitized relations, for instance in encounters between coast guard boats and migrant boats at sea. Without reducing migrants to epiphenomena of those relations, this recalcitrance typifies the objects of surveillance as both relatable as well as resistant, particularly in the tensions between border control and search and rescue.

  20. Subregional cooperation and protection of the arctic marine environment: The Barents Sea

    International Nuclear Information System (INIS)

    Stokke, Olav Schram

    1997-01-01

    The report deals with questions related to effectiveness of subregional co-operation in the Barents Sea. Efforts have differed from global processes by their clearer programmatic profile. Relatively more resources, in terms of both expertise and financial funds, have been invested in order to enhance the knowledge-base for management decisions in the region as well as the administrative and technical capacity to avoid behaviour liable to threaten the marine environment. Many of the programmatic activities encouraged at other levels have been planned, financed and organised at the subregional level. Comparatively less attention has been given to establishing new regulative norms for environmental protection from either industrial or military activity in the region. The Regional Council ensures that both county level decision makers and representatives of the indigenous population are involved. A point is the general balance between the environmental and the economic component. Moreover, the inclusiveness of the Barents Council provides linkages to potential partners in development found beyond the Barents Sea area. The subregional level has served to relate environmental protection to broader foreign policy issues and has strengthened environmental networks across the Nordic Russian divide which in turn has generated financial resources and expertise. The main reason for the higher fund raising capacity of subregional processes is that geographic proximity ensures denser networks of interdependence partly by the fact that Nordic neighbours have a clear self interest in financing environmental projects in Russia, particularly those addressing industrial pollution from the border areas and those designed to prevent dumping of radioactive waste and partly by ensuring that environmental projects may serve broader purposes associated with national security. The willingness on the part of Norway and other Nordic states to use their financial powers for problem solving

  1. The Border Multiple

    DEFF Research Database (Denmark)

    Addressing and conceptualizing the changing character of borders in contemporary Europe, this book examines developments occurring in the light of European integration processes and an on-going tightening of Europe's external borders. Moreover, the book suggests new ways of investigating the nature...... of European borders by looking at border practices in the light of the mobility turn, and thus as dynamic, multiple, diverse and best expressed in everyday experiences of people living at and with borders, rather than focusing on static territorial divisions between states and regions at geopolitical level...

  2. The Uzbekistan Kyrgyzstan Border: Institutional Legitimacy and Regional Stability

    Science.gov (United States)

    2017-06-01

    and Lenzi Sherfedinov, “Land, Water, and Ecology ,” in Ferghana Valley, edited by Starr, 255. 18 challenges face this region, including terrorism...see Robert Nisbet, The Quest for Community: A Study in the Ethics of Order and Freedom (Wilmington, DE: ISI Books, 2010), originally published by... ecological problems.”377 These security challenges are not only interrelated but also dependent on the condition of state borders. As Karimov

  3. Nuclear Security and the Way Forward

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2013-01-01

    Nuclear security has always been taken seriously. There is ample evidence that traditional deterrence does not necessarily obstruct those with malicious intent, who can also operate across borders. This understanding of the threat has highlighted the need to adopt a vigorous approach to protecting nuclear materials, associated facilities and activities in order to strengthen nuclear security worldwide. States recognize that there is a credible threat of nuclear or other radioactive material falling into the wrong hands and that this threat is global. An international legal framework for nuclear security, national nuclear security infrastructures, and the IAEA's leading role are some of the building blocks of an effective international nuclear security framework that contributes to effectively addressing this threat

  4. Regional cooperation planning. Project planning for JAEA/SNL regional cooperation on remote monitoring

    International Nuclear Information System (INIS)

    Olsen, John

    2006-01-01

    Developing cooperation between the JAEA's NPSTC and the NNCA may take advantage of bilateral activities between those parties and SNL. The merger of JNC and JAERI has affected the schedule for JAEA/SNL cooperation. Also, the evolution of the NNCA as an independent agency has slowed the projected schedule for cooperation between the JAEA and the NNCA. A potential schedule for establishment of a quadrilateral remote monitoring system may include interim activities, securing an agreement of some type, and actual establishment of VPN links. A parallel schedule might exist for informing other regional parties and gaining their interest. (author)

  5. U.S.-Mexico cross-border workforce training needs: survey implementation.

    Science.gov (United States)

    Rosales, Cecilia B; Nuno, Tomas; Dieke, Ada; Galvez, Francisco Navarro; Dutton, Ronald J; Guerrero, Robert; Dulin, Paul; Jiménez, Elisa Aguilar; Granillo, Brenda; de Zapien, Jill Guernsey

    2011-01-01

    Since the tragic events experienced on September 11, 2001, and other recent events such as the hurricane devastation in the southeastern parts of the country and the emergent H1N1 season, the need for a competent public health workforce has become vitally important for securing and protecting the greater population. The primary objective of the study was to assess the training needs of the U.S. Mexico border states public health workforce. The Arizona Center for Public Health Preparedness of the Mel and Enid Zuckerman College of Public Health at The University of Arizona implemented a border-wide needs assessment. The online survey was designed to assess and prioritize core public health competencies as well as bioterrorism, infectious disease, and border/binational training needs. Approximately 80% of the respondents were employed by agencies that serve both rural and urban communities. Respondents listed 23 different functional roles that best describe their positions. Approximately 35% of the respondents were primarily employed by state health departments, twenty-seven percent (30%) of the survey participants reported working at the local level, and 19% indicated they worked in other government settings (e.g. community health centers and other non-governmental organizations). Of the 163 survey participants, a minority reported that they felt they were well prepared in the Core Bioterrorism competencies. The sections on Border Competency, Surveillance/Epidemiology, Communications/Media Relations and Cultural Responsiveness, did not generate a rating of 70% or greater on the importance level of survey participants. The study provided the opportunity to examine the issues of public health emergency preparedness within the framework of the border as a region addressing both unique needs and context. The most salient findings highlight the need to enhance the border competency skills of individuals whose roles include a special focus on emergency preparedness and

  6. Establishing Trafficking in Human Beings for the Purpose of Organ Removal and Improving Cross-Border Collaboration in Criminal Cases: Recommendations

    OpenAIRE

    Holmes, Paul; Rijken, Conny; D'Orsi, Sergio; Esser, Luuk; Hol, Floor; Gallagher, Anne; Greenberg, Galit; Helberg, Louis; Horvatits, Lisa; McCarthy, Sean; Ratel, Jonathan; Scheper-Hughes, Nancy; Forsythe, John

    2016-01-01

    Abstract In this short summary report on the legal definition of trafficking in human beings for the purpose of organ removal and improving cross-border collaboration in criminal cases, challenges, and recommendations in the areas of defining the crime, criminal investigation and prosecution, and cross-border cooperation are made. These are the outcomes of a working group discussion during the writers' conference of the HOTT project, a European Union-funded project against trafficking in huma...

  7. Devices and dressings to secure peripheral venous catheters to prevent complications.

    Science.gov (United States)

    Marsh, Nicole; Webster, Joan; Mihala, Gabor; Rickard, Claire M

    2015-06-12

    methodological procedures expected by Cochrane. We included six RCTs (1539 participants) in this review. Trial sizes ranged from 50 to 703 participants. These six trials made four comparisons, namely: transparent dressings versus gauze; bordered transparent dressings versus a securement device; bordered transparent dressings versus tape; and transparent dressing versus sticking plaster. There is very low quality evidence of fewer catheter dislodgements or accidental removals with transparent dressings compared with gauze (two studies, 278 participants, RR 0.40; 95% CI 0.17 to 0.92, P = 0.03%). The relative effects of transparent dressings and gauze on phlebitis (RR 0.89; 95% CI 0.47 to 1.68) and infiltration (RR 0.80; 95% CI 0.48 to 1.33) are unclear. The relative effects on PVC failure of a bordered transparent dressing and a securement device have been assessed in only one small study and these were unclear. There was very low quality evidence from the same single study of less frequent dislodgement or accidental catheter removal with bordered transparent dressings than securement devices (RR 0.14, 95% CI 0.03 to 0.63) but more phlebitis with bordered dressings (RR 8.11, 95% CI 1.03 to 64.02) (very low quality evidence). A small single study compared bordered transparent dressings with tape and found very low quality evidence of more PVC failure with the bordered dressing (RR 1.84, 95% CI 1.08 to 3.11) but the relative effects on dislodgement were not clear (very low quality evidence). The relative effects of transparent dressings and a sticking plaster have only been compared in one small study and are unclear. More high quality RCTs are required to determine the relative effects of alternative PVC dressings and securement devices. It is not clear if any one dressing or securement device is better than any other in securing peripheral venous catheters. There is a need for further, independent high quality trials to evaluate the many traditional as well as the newer, high use

  8. Northeast Asian economy cooperation: study on energy resource cooperation in Northeast Asian region

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Woo Jin [Korea Energy Economics Institute, Euiwang (Korea)

    1999-12-01

    In Northeast Asian region, there are East Russia with abundant resources, Japan a large energy consumption country, Korea and China with rapidly increasing energy consumption due to their economic development, but the utilization rate of East Russian resources are very low and the resource trading and investment among Korea, China and Japan are also low. Korea and Japan use most of energy imported from Middle East. It is expected that import of petroleum and gas except coal will be increasing in China and most of imported energy will be imported mainly from the Middle East. For Korea, with not much energy resources and foreign-oriented economic system, if investment on resource development among Northeast Asian countries is active and energy transportation among these countries is liberalized, the enhancement of energy cooperation in Northeast Asia has a high possibility to provide North and South Korean energy cooperation as well as to secure energy security and to develop energy industry. Therefore, Korean government needs to promote Northeast Asian energy cooperation by taking its lead. (author). 28 refs., 8 figs., 44 tabs.

  9. Networked solutions of radiation control of state borders and urban areas

    International Nuclear Information System (INIS)

    Kulik, Victor; Gordeev, Alexander; Mamedov, Arif

    2008-01-01

    Full text: Prevention of illicit trafficking in radioactive and nuclear materials through state borders as well as the disperse of radioactive materials in urban area is a challenging task of national security departments in many countries. To solve this task, appropriate actions of personnel on-site equipped by radiation detectors such as fixed radiation portal monitors or mobile personal radiation detectors are required. However, users of radiation equipment such as Customs, Border Guard and Police Services often perform radiation control as additional responsibility to their main duties. Furthermore, these users have no sufficient expertise in radiation control and need real-time remote expert help to interpret readings of radiation equipment and expert support in decision making process. Polimaster has developed complete solution called Nuclear Protection Network system (NPNET) for high-effective radiation control on State Borders as well as inside a country. NPNET system intended for efficient interaction and on-line data exchange between a user, radiation control instrument, for example a personal radiation detector or radioisotope identifier, and remote Command Center. Availability of such system allows to solve more efficiently tasks of detection, localization and identification of ionizing radiation sources, to properly interpret false alarms (e.g. at detention of a passenger having passed radio-therapy etc.) and effectively prevent illicit trafficking radioactive and nuclear materials. The NPNET system can cover territory as large as city or even a state and provides assistant of infinite number of independent user groups. NPNET has a module structure and could be easily adapted to any specific user's requirements. Thus, the radiation mobile system NPNET is an effective tool for prevention of illicit trafficking of nuclear and radioactive materials and is recommended for use by Border guards, Customs, Securities and emergency situations services. (author)

  10. Revitalising Borders: Memory, Mobility and Materiality in a Latvian-Russian Border Region

    Directory of Open Access Journals (Sweden)

    Aija Lulle

    2016-04-01

    Full Text Available In this paper I investigate how an international border is 'revitalised' in political discourses as opposed to lived experiences. Based on narratives I have collected from border dwellers on both sides of the current border between Latvia and Rus-sia and placing them into a broader context of current border debates, I analyse how geographical and social mobility is remembered from Soviet times and reworked in current contexts. I argue that while politically the border is revitalised through aban-doning and forgetting the Soviet past and through the idea of constant threats in the future, locally it is revitalised through giving a life to the abandoned: memories of 'vigorous times' in life-courses and material things. People who dwell at the border did not move themselves: the international border moved several times in one cen-tury leaving border dwellers' memories and significant places on the 'other' side. I focus on how these borders were crossed in the past, how they are (not crossed now, and the social meanings assigned to these circumstances. In the current con-text I follow diverse paths of reasoning that describe how the uneven flow of goods and people through the Latvian-Russian border shapes the power dynamic against which the people living in the border area used to reconstruct imaginaries of 'Soviet times' versus 'Europe' and 'vigorous times' versus decline.

  11. 10 CFR 710.6 - Cooperation by the individual.

    Science.gov (United States)

    2010-01-01

    ... obligation to cooperate applies when completing security forms, during the course of a personnel security... authorization, including but not limited to, personnel security interviews, DOE-sponsored mental evaluations... individual subject to § 709.3(d) to consent to and take an event-specific polygraph examination. A refusal to...

  12. Structure and headship of northern border homes in the last decade

    Directory of Open Access Journals (Sweden)

    Eunice D. Vargas Valle

    2013-01-01

    Full Text Available The objective of this study was to describe the trends in household structure and female headship on the northern border of Mexico between 2000 and 2010, as well as the changes in their demographic profiles. There were three relevant trends: the increase in single person households, the slight decrease in extended households and the rise in female headship. These trends indicate the intersection of complex structural and conjunctural processes. On the one hand, population aging is an ongoing process, and the cultural processes linked to the value of individual autonomy versus familial altruism continue advancing as seen by the rise in men living alone and women heading households. On the other hand, conjunctural processes such as the economic crises and the recent migratory and security policies of the United States have influenced the reduction of internal immigration to the border and the increase of return migration from this country, which in turn have contributed to modifying the composition of border households.

  13. ITRAP - an international pilot study on border monitoring systems

    International Nuclear Information System (INIS)

    Beck, P.; Duftschmid, K.E.

    1999-01-01

    The paper describes the design and preliminary results of an extended pilot study of commercially available monitoring systems for the detection of nuclear and other radioactive materials at borders. The study consists of a laboratory test phase and field tests at the Austrian/Hungarian border and the Vienna airport, each for a duration of one year. The results will be used to derive realistic performance requirements for border control systems in view of optimized technical and economic conditions as well as to propose an 'investigation level'. The ITRAP study consists of three phases. In the first phase equipment currently available on the market is subjected to laboratory testing at the Austrian Research Centres Seibersdorf. The instrument categories include hand-held, portable, and fixed-installed equipment. The test criteria defined as minimum requirements have been established together with the manufacturers. The laboratory tests started in May 1998 and will last until end of this year. During the second phase, the field study, equipment passing the laboratory tests will be installed at a major Austrian-Hungarian border crossing (Nickelsdorf) for monitoring of cars, trucks and trains, as well as at the Vienna airport for pedestrians, luggage and cargo. In this phase the results gained from the lab tests about the 'fitness for use' will be verified in practice, in close co-operation with the law enforcement officers at the borders. Also training issues and questions of maintenance and support shall be evaluated. In the third phase, realistic specifications and performance requirements shall be derived with the help of international experts and selected specialists from the users and manufacturers. The results of the field study will focus not only on the technical aspects of monitoring equipment (e.g. detection threshold and rate of false alarms) but also on the operational (e.g. ease of use, reliability, training requirements, field support) and economic

  14. 78 FR 64968 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2013-10-30

    ... regarding the Partner Government Agency--Message Set (PGA-MS). 2. The Global Supply Chain Subcommittee... the Global Shipment Identification Number (GSIN) as a possible tool for use in Distribution Chain... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...

  15. Russia and China in the 21st century. Moving towards cooperative behaviour

    Directory of Open Access Journals (Sweden)

    Silvana Malle

    2017-07-01

    Full Text Available Political and economic rapprochement is taking place between Russia and China in a number of fields: energy, arms production, trade in national currencies and strategic projects in transport and supporting infrastructure. This development, fostered by Western policies and actions, including sanctions related to Ukraine, appears to be strengthening despite reservations related to uneasy precedents, contrasting visions and uncertain economic projections. Chinese policies aiming at European markets via the revival of the Silk Road assist this development. The One Belt-One Road is projected as an alternative, or supplement, to the maritime routes made unsafe by contiguous countries' unrest, criminality and the assertive control of the seas by the United States. While Russia, promoting friendly investment structures, moves eastwards to develop the Russian Far East bordering China, the latter expands westwards engaging in laborious negotiations with Central Asian countries and costly investments in infrastructure and logistics. In each area, the article maintains that both countries, despite economic and political competition and fear of losing control, have interest in cooperation and discusses the areas where this is taking place, albeit slowly and with difficulty. Whether economic cooperation can develop into a strategic alliance including defence is discussed in the light of joint military exercises, arms trade and plans to broaden the scope of the Collective Security Treaty Organisation, the Shanghai Cooperation Organisation (of which India and Pakistan have recently become members, and the Common ASEAN Community. This path is difficult and marred by members' conflicting interests. But some positive outcomes should not be ruled out.

  16. "Transatlantic cooperation on terrorism and Islamist radicalisation in Africa: the Franco-American axis"

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2018-01-01

    Transatlantic cooperation on security has a long history. In Africa, transatlantic cooperation on security is basically between France and the United States. This paper asks why the two former competitors in Africa started to cooperate and also why they are so willing to engage militarily....... It suggests that the perception of a serious threat from terrorism and Islamist radicalisation overrules differences in decision-making systems....

  17. 19 CFR 113.1 - Authority to require security or execution of bond.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority to require security or execution of bond. 113.1 Section 113.1 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS General Provisions § 113.1 Authority to require security or...

  18. The impact of the maquiladoras on health and health policy along the U.S.-Mexico border.

    Science.gov (United States)

    Williams, D M; Homedes, N

    2001-01-01

    Over the last three and one-half decades, the development of twin industrial plants, maquilas, along the U.S.-Mexico border has resulted in industrialization of the northern tier of Mexican states and rapid population growth on both sides of the border. Maquilas have been responsible for some environmental contamination and may contribute to changes in family cohesiveness. At the same time they have not supported the needed expansion of public infrastructure. These are major public health consequences that must be considered by both countries. Solutions will require better cooperative efforts than have occurred in the past.

  19. Theoretical Aspects of Cross-border Integration-based Economic Cooperation

    Directory of Open Access Journals (Sweden)

    Bilchak V.

    2014-09-01

    Full Text Available In this article the author analyses theoretical aspects of border economy in the conditions of modern processes of integration. The author describes the existing schools and concepts of integration stressing the role of government regulation relating to the deformations in the development of the world economic mechanism. Modern studies focus on the evolution of integration processes, which has largely affected the key elements of the world economic mechanism from classical political economy, monopoly regulation. This resulted in monopolistic competition, imperfect competition, and oligopoly – largely, through all fields and poles of economic growth to certain elements of government regulation and social reproduction on the international scale. The author examines the key elements and stages of economic integration. These stages assume a number of consecutive forms: free trade zone, customs union, common market, complete economic integration, and economic union. The article shows that the transition occurs from the lowest to the highest stages — from the processes of integration involving, firstly, trade market and then capital and labour markets to the integration of social sphere. The theoretical aspects of all these transformations can be easily traced in the case of EU integration processes.

  20. The Evolution of European Security: From Confrontation to Cooperation

    Science.gov (United States)

    2013-03-01

    Vasconcelos , (Paris: The European Union Institute for Security Studies, 2009), 41. 60 Ibid. 61 European Union Home Page, “Common Security and...of ESDP,” in What Ambitions for European Defense in 2020?, 2nd ed., ed. Álvaro de Vasconcelos (Paris: The European Union Institute for Security

  1. Security and Peace Mechanisms for Good Governance in Nigeria ...

    African Journals Online (AJOL)

    In Nigeria, governments at all levels have intensified efforts to address issues bordering on insecurity with a view to building security and peace for good governance. It is however, disheartening that despite various security measures put in place to tackle the problem, Nigeria is yet to be free from recurrent cases of armed ...

  2. Emergency management on the island of Ireland – Recent cross-border developments

    Directory of Open Access Journals (Sweden)

    Joyce Finian

    2015-12-01

    Full Text Available Emergency management has developed separately in Northern Ireland and the Republic of Ireland as a result of the differences in the political, legal, organisational and cultural backgrounds that exist in the two jurisdictions. Good cross-border cooperation has existed at individual organisational level between the principal emergency response agencies for many years. Now that regions in Europe are becoming more connected it is becoming increasingly obvious to agencies with responsibility for emergency management on both sides of the border that we need to be better prepared and ready to work effectively together to deal with any major emergency that may arise along the border. Emergencies and natural or manmade disasters do not respect geographical borders, particularly on a landmass as small as the island of Ireland. It is recognised that there is a need for more formalised joint planning and greater collaboration by the statutory agencies, which will result in a more coordinated and effective response to any possible major emergencies or disasters that may occur along the border areas. This paper reviews the current emergency management arrangements in the Republic of Ireland and Northern Ireland, how the structures, roles and responsibilities of the various agencies involved differ, and how a move to greater collaboration has occurred, as well as examining the drivers for this collaboration, how this has manifested itself so far, and how the potential for pragmatic, flexible and creative solutions will achieve further progress in the coming years.

  3. Sub regional cooperation and protection of the arctic marine environments: The Barents Sea

    Energy Technology Data Exchange (ETDEWEB)

    Stokke, Olav Schram

    1997-07-01

    The report deals with questions related to effectiveness of subregional co-operation in the Barents Sea. Efforts have differed from global processes by their clearer programmatic profile. Relatively more resources, in terms of both expertise and financial funds, have been invested in order to enhance the knowledge-base for management decisions in the region as well as the administrative and technical capacity to avoid behaviour liable to threaten the marine environment. Many of the programmatic activities encouraged at other levels have been planned, financed and organised at the subregional level. Comparatively less attention has been given to establishing new regulative norms for environmental protection from either industrial or military activity in the region. The Regional Council ensures that both county level decision makers and representatives of the indigenous population are involved. A point is the general balance between the environmental and the economic component. Moreover, the inclusiveness of the Barents Council provides linkages to potential partners in development found beyond the Barents Sea area. The subregional level has served to relate environmental protection to broader foreign policy issues and has strengthened environmental networks across the Nordic Russian divide which in turn has generated financial resources and expertise. The main reason for the higher fund raising capacity of subregional processes is that geographic proximity ensures denser networks of interdependence partly by the fact that Nordic neighbours have a clear self interest in financing environmental projects in Russia, particularly those addressing industrial pollution from the border areas and those designed to prevent dumping of radioactive waste and partly by ensuring that environmental projects may serve broader purposes associated with national security. The willingness on the part of Norway and other Nordic states to use their financial powers for problem solving

  4. 46 CFR 7.120 - Mexican/United States border to Point Fermin, CA.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Mexican/United States border to Point Fermin, CA. 7.120 Section 7.120 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC... from the southerly tower of the Coronado Hotel in approximate position latitude 32°40.8′ N. longitude...

  5. 78 FR 43220 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2013-07-19

    ... Standards Working Group (ISWG) and the Trusted Trader Measures Working Group. 6. The Global Supply Chain... Distribution Chain Management in Intellectual Property Rights Compliance. 4. The One U.S. Government at the... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...

  6. Dream vs. reality: seven case-studies on the desirability and feasibility of cross-border hospital collaboration in Europe.

    Science.gov (United States)

    Glinos, Irene A; Baeten, Rita

    2014-09-01

    Despite being a niche phenomenon, cross-border health care collaboration receives a lot of attention in the EU and figures visibly on the policy agenda, in particular since the policy process which eventually led to the adoption of Directive 2011/24/EU. One of the underlying assumptions is that cross-border collaboration is desirable, providing justification to both the European Commission and to border-region stakeholders for promoting it. The purpose of this paper is to question this assumption and to examine the role of actors in pushing (or not) for cross-border collaboration. The analysis takes place in two parts. First, the EU policies to promote cross-border collaboration and the tools employed are examined, namely (a) use of European funds to sponsor concrete border-region collaboration projects, (b) use of European funds to sponsor research which gives visibility to cross-border collaboration, and (c) use of the European Commission's newly acquired legal mandate to encourage "Member States to cooperate in cross-border health care provision in border-regions" (Art. 10) and support "Member States in the development of European reference networks between health care providers and centres of expertise" (Art. 12). Second, evidence gathered in 2011-2013 from seven European border-regions on hospital cross-border collaboration is systematically reviewed to assess the reality of cross-border collaboration - can it work and when, and why do actors engage in cross-border collaboration? The preliminary findings suggest that while the EU plays a prominent role in some border-region initiatives, cross-border collaboration needs such a specific set of circumstances to work that it is questionable whether it can effectively be promoted. Moreover, local actors make use of the EU (as a source of funding, legislation or legitimisation) to serve their needs. Copyright © 2014. Published by Elsevier Ltd.

  7. Developing Distance Learning Environments in the Context of Cross-Border Cooperation

    Directory of Open Access Journals (Sweden)

    Sebastian Fuicu

    2017-04-01

    Full Text Available By using a plethora of technologies and formats, the distance learning paradigm offers access to education through a large spectrum of subjects which are situated in different geographic areas. This paper presents the successful collaboration between Politehnica University of Timisoara, Romania, and the Technical Faculty "Mihajlo Pupin" of Zrenjanin, Serbia, which offer a low maintenance cooperation model based on a web cast system that allows subjects from both countries to have access to each other’s educational material. The aim of this project is to raise the interest of pupils, students and graduates to the latest information regarding technical content used in the IT industry. The access takes place in real time and from the distance without the necessity of being present in order to receive the information. The obtained results are very encouraging regarding the usage of such a distance learning environment and the further development of such tools and cooperation.

  8. Counterproliferation, Border Security and Counterterrorism Subject-Related Laws and Regulations, Including Export Control Regimes in South-Eastern European Countries

    International Nuclear Information System (INIS)

    Bokan, S.

    2007-01-01

    gaps exist, much less fill them. All this suggests that, to fulfil obligations under UNSC Resolutions 1540 and 1373, States must enact harmonized criminal prohibitions and authorization for law enforcement cooperation in order to establish a seamless web of security among all nations. Failure to do so implicitly poses a threat to international peace and security. One of the main issues which deserve to be further addressed and which prompts the continuation of the Southeast Europe Counterproliferation, Borger Security and Counterterrorism (CBSC) Working Group is to harmonize national laws and regulations that deal with deterring, detecting and interdicting WMD. Inventory of relevant CBSC subject-related laws of the Southeast Europe countries, including Export Control Laws was created and prepared for further consideration and harmonization by judiciary experts, with the aim to develop m odel laws . Let me very briefly present you the main features of the SEDM CBSC subject-related laws and regulations. This paper will present that inventory which includes the membership in the international Conventions, Treaties and Arrangements and also the membership in Multilateral Export Control Regimes of Southeast Europe countries. Also, it will be presented the membership in the international legal instruments that play an integral part in the global fight against terrorism. (author)

  9. Memorandum of Understanding on cooperation and consultation on nuclear installations near borders

    International Nuclear Information System (INIS)

    1977-01-01

    This Agreement signed on 27 September 1977 lays down that the Contracting Parties will inform each other about all nuclear installations constructed along the common border. Nuclear installations within the meaning of the Agreement are installations for the production, processing, reprocessing, manufacture or fission of nuclear fuels and radioactive waste storage. The information to be communicated includes plans and decisions on siting, construction and operation of such installations and relevant documents. The Agreement provides for consultation between the Parties on safety aspects and lays down in detail all the conditions for communication of information. (NEA) [fr

  10. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    Science.gov (United States)

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  11. Nordic Horizons for a ‘Council of the Isles’? Instituting Regional Cooperation

    DEFF Research Database (Denmark)

    McQuaid, Sara Dybris

    2013-01-01

    activities and response sites for cross-border challenges in the spaces between political and social union. It argues that while the institutionalised cooperation between the variety of administrations across the Isles and between the Nordic countries provide specific sites of ‘transnational democracy...

  12. International Military Cooperation: From Concepts to Constructs

    Science.gov (United States)

    D'Orazio, Vito

    2013-01-01

    International cooperation on issues of security is a central concept in many theoretical debates in international relations. This dissertation is an attempt to lay the foundation for measuring military cooperation and understanding the forces brought forth through its expansion. The central notion is that the set of policies related to military…

  13. Global Nuclear Safety and Security Network

    International Nuclear Information System (INIS)

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  14. The Border Multiple

    DEFF Research Database (Denmark)

    of European borders by looking at border practices in the light of the mobility turn, and thus as dynamic, multiple, diverse and best expressed in everyday experiences of people living at and with borders, rather than focusing on static territorial divisions between states and regions at geopolitical level...

  15. Securing the Chernobyl exclusion zone against illegal movement of radioactive materials

    International Nuclear Information System (INIS)

    Bondarenko, O. O.; Proskura, M. I.; Duftschmid, K. E.; Kravchencko, N. E.

    2004-01-01

    . Within the framework of the IAEA Nuclear Security Program the technical cooperation project S trengthening Security of Nuclear Materials in Ukraine ( UKR/0/008) is aimed primarily to strengthen protection the entrance/exit checkpoints of the Chernobyl exclusion zone and adjacent State borders of Ukraine against illicit movement of radioactive materials (including nuclear materials). The particular situation of the exclusion zone presents a high risk of uncontrolled movement of radioactive materials from and into the exclusion zone. In view of the future construction of the S helter-2 a nd decommissioning of the three closed reactor blocks it is expected that the traffic through the exclusion zone will considerably increase in the next years and those large amounts of possibly contaminated metal scrap, construction material and equipment will leave the zone. There is also a risk of illegal movement of radioactive waste into the zone, possibly also through the international border, which could make the zone to an illegal dumping ground for radioactive waste. As practice shows theft of nuclear materials cannot be excluded. The general concept of the project is based on modernization of old and deployment of new vehicle (road and railway) and pedestrian monitoring equipment at all checkpoints of the exclusion zone including road checkpoints, train stations and river ports. A central station of data acquisition and management is to be located in Chernobyl. The equipment to be installed has to meet new technical requirements developed by IAEA. This includes, e.g. sensitivity of gamma and neutron detection, identification of innocent alarms caused by NORM materials or medical radioisotopes, accurate indication of the source position in the vehicle, and remote identification of license plate by advanced video systems. The implementation of the project and deployment of the equipment is expected to start in 2003 and should be completed in 2005. (Author)

  16. Infrastructure development through civil nuclear cooperation

    International Nuclear Information System (INIS)

    Humphrey, A.M.; Burkart, A.R.

    2010-01-01

    Due to growing concerns over electricity demand, energy security, and climate change, numerous countries are considering the construction of new nuclear power plants. Most of these will be built in nations with existing nuclear power programs, but an increasing number of States have expressed serious interest in developing new nuclear power programs. These countries will be faced with many challenges in establishing the robust infrastructures necessary for the safe, secure, and safeguarded deployment of nuclear power. Fortunately, there is much a State can gain through cooperation with other States with more developed programs. By sharing information on previous experience and established best practices, an emerging nuclear energy State can benefit from the lessons learned by its partners. Through a broad range of civil nuclear cooperation, the United States is helping new entrants develop the sound infrastructure necessary to deploy nuclear power plants with the highest standards of safety, security, and nonproliferation

  17. Threats to cross-border wildlife linkages in the Sky Islands Wildlands Network

    Science.gov (United States)

    Kim Vacariu

    2005-01-01

    One of the greatest challenges facing conservationists in the Sky Islands region is finding a realistic means to maintain historic travel routes for wide-ranging species crossing the United States-Mexico border. This challenge is made difficult due to the ongoing efforts by the Federal government to install additional security infrastructure to stem the flood of...

  18. The Dilemma of Porous Borders: Uganda’s Experience in Combating Terrorism

    Science.gov (United States)

    2017-01-10

    burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA...that laxity in immigration control, poor remuneration , and corruption among security officials at border stations complicates the challenge of porous...Special Branch was disbanded and PATU placed under a newly created Directorate of Counter Terrorism. Since then, a

  19. International co-operation. Key issue paper no. 6

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    In accordance with guidance provided by the Steering Group, this report assesses the adequacy and effectiveness of international co-operation relating to the nuclear fuel cycle, with a view toward identifying any needed new forms or arrangements for co-operation. In more specific terms, the Steering Committee`s guidance identified the following questions: Is the existing international framework sufficient for: the safe and secure operation of the fuel cycle; the economic and orderly development of the world`s nuclear energy systems (or their phase-out should this take place); international co-operation in R and D; international co-operation in industrial activities? Are there places where these requirements overlap or interact so as to impede activities which are desirable? Can new forms of co-operation be foreseen which would make it easier to implement any of the fuel cycle options in a safe, secure and responsible way? Are there other new forms of international co-operation which would affect the fuel cycle, e.g. regional institutions; international plutonium management regime and/or storage? Finally: What is the appropriate role of IAEA in any of these?.

  20. 77 FR 5521 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2012-02-03

    ... recommendations on how to proceed on those topics: The work of the Global Supply Chain Security Air Cargo... Partnership Against Terrorism (C-TPAT) program and Beyond the Border (BTB)--Report by the Global Supply Chain... Intellectual Property Rights (IPR) Enforcement Subcommittee: IPR Distribution Chain Management concept. Prior...

  1. Beyond Kargil: The technology of peace in India-Pakistan border relations

    Energy Technology Data Exchange (ETDEWEB)

    Tahir-Kheli, S.; Biringer, K.L.

    2000-01-12

    The potential for cooperation between India and Pakistan is substantial. Topics as widely varying as national security, the environment and trade hold the potential for improved bilateral relations. This paper looks at a few areas in which monitoring technology could contribute to enhancing cooperative border agreements between the two nations. The goal of the paper is not to provide prescriptive solutions to regional problems, but to expand the number of options being considered for improving Indian-Pakistan relations. Many of the impediments to bilateral progress are a result of a history of conflict and mistrust. By utilizing technical monitoring and inspections, each side can begin to replace suspicion and doubt with knowledge and information useful in making informed political, economic and military decisions. At the same time, technical monitoring and inspections can build confidence through common interactions. India and Pakistan have pledged to resolve their disputes, including Kashmir, through dialogue. Implementation of that pledge is influenced by a number of factors, including changes in the political systems and the fortunes of the leadership. Events of the past year and a half have severely tested these two governments' ability to move forward along a constructive and positive path. Testing of new missile systems both preceded and followed testing of nuclear weapons in May 1998. Both countries disregarded subsequent international displeasure as they proceeded to openly declare their respective nuclear capability. Their brief engagement with each other in February 1999 and movement toward a rapprochement diluted international condemnation of their nuclear activity. Within a recent period of nine months however, progress in the dialogue has been stalled first by the Pakistani move in Kashmir in May 1999, then by the Indian election in the summer of 1999 and most recently by the military coup in Pakistan.

  2. Beyond Kargil: The technology of peace in India-Pakistan border relations

    International Nuclear Information System (INIS)

    Tahir-Kheli, S.; Biringer, K.L.

    2000-01-01

    The potential for cooperation between India and Pakistan is substantial. Topics as widely varying as national security, the environment and trade hold the potential for improved bilateral relations. This paper looks at a few areas in which monitoring technology could contribute to enhancing cooperative border agreements between the two nations. The goal of the paper is not to provide prescriptive solutions to regional problems, but to expand the number of options being considered for improving Indian-Pakistan relations. Many of the impediments to bilateral progress are a result of a history of conflict and mistrust. By utilizing technical monitoring and inspections, each side can begin to replace suspicion and doubt with knowledge and information useful in making informed political, economic and military decisions. At the same time, technical monitoring and inspections can build confidence through common interactions. India and Pakistan have pledged to resolve their disputes, including Kashmir, through dialogue. Implementation of that pledge is influenced by a number of factors, including changes in the political systems and the fortunes of the leadership. Events of the past year and a half have severely tested these two governments' ability to move forward along a constructive and positive path. Testing of new missile systems both preceded and followed testing of nuclear weapons in May 1998. Both countries disregarded subsequent international displeasure as they proceeded to openly declare their respective nuclear capability. Their brief engagement with each other in February 1999 and movement toward a rapprochement diluted international condemnation of their nuclear activity. Within a recent period of nine months however, progress in the dialogue has been stalled first by the Pakistani move in Kashmir in May 1999, then by the Indian election in the summer of 1999 and most recently by the military coup in Pakistan

  3. Azerbaijan-Russia Borderline Security

    Directory of Open Access Journals (Sweden)

    Ekaterina V. Arkhipova

    2017-03-01

    Full Text Available The Azerbaijan-Russia borderline mainly goes by the Caucasian mountain range and close to the Samur riverbed. Main border posts are situated close to the Caspian seashore while the locals living in the Upper Dagestan area have difficulties with crossing borderline. The locals are represented by the so called “divided peoples” whose living area was divided with the state border after 1991. The former inner borders ignored ethnic areas but now they became the lines crossing the ethnic groups of Legins, Avars, Tzakhurs and Rutuls. Certainly, those peoples are interested in specific rules for crossing the border. At the same time, their areas have not got the equipped border offices and they have to spend a lot of time and money for travelling to the neighboring districts via Baku or Vladikavkaz. Such problems arouse the radical demands among locals. The Lezgin movement for an independent Lezgistan is the most famous among them. Its supporters were involved in a terrorist attack in Baku in 1990-s and now they collect files about any problems connected with border issues, including the results of a demarcation process. They attract attention to the facts of all assignments made by Russian representatives. The activity of other ethnic groups was comparatively lower and they could make an agreement with local authorities about division of powers. Obviously, any solution about development of the border infrastructure may stabilize the separatism activity in the area. The author determines the key challenges and threats to cross-border security at Azerbaijan-Russia borderline on the basis of analysis of Federal and regional media, declarations made by representatives of the local and borderline authorities, as well as online activities of national movements. The author reveals the infrastructure factors of ensuring cross-border activity, social and economic conditions of borderline districts development. The suggestion is made on the need to develop

  4. Co-operatives and Normative Control

    DEFF Research Database (Denmark)

    Bregn, Kirsten; Jagd, Søren

    1992-01-01

    This paper explores the conditions for applying normative control in co-operatives. For normative control to be effective two conditions are found particularly important: Individuals must be morally involved and the organization must have a system of making it possible to link common norms...... and individual action. If these conditions are not fulfilled, as may be the case in many co-operatives, normative control cannot be expected to work. The problems of normative control in co-operatives may then not be caused by the use of normative control as such, but may instead be a problem of securing...

  5. Post-'92 Helsinki. Towards an operational institution for comprehensive security

    International Nuclear Information System (INIS)

    Ghebali, V.Y.

    1992-01-01

    Discussing the concept of comprehensive security the author reviews aims of the Forum for Security Cooperation to be held in Vienna in September 1992. They are: 1. To negotiate specific new conventional disarmament measures, provisions harmonizing the obligations assumed under various international instruments in this area; 2. To provide a framework for consultation, cooperation and ongoing dialogue on security questions; 3. To elaborate on the theme of conflict prevention

  6. Cross-border temporary agency work : Social sustainability of a business model (too often) based on regulatory arbitrage

    NARCIS (Netherlands)

    Houwerzijl, Mijke; Rombouts, Bas

    Presentation held at the European Regional Congress of the International Society for Labour and Social Security Law (ISLSSL) on Temporary Agency Work in the context of cross-border movement & service provision within the EU.

  7. Establishing Trafficking in Human Beings for the Purpose of Organ Removal and Improving Cross-Border Collaboration in Criminal Cases: Recommendations.

    Science.gov (United States)

    Holmes, Paul; Rijken, Conny; D'Orsi, Sergio; Esser, Luuk; Hol, Floor; Gallagher, Anne; Greenberg, Galit; Helberg, Louis; Horvatits, Lisa; McCarthy, Sean; Ratel, Jonathan; Scheper-Hughes, Nancy; Forsythe, John

    2016-02-01

    In this short summary report on the legal definition of trafficking in human beings for the purpose of organ removal and improving cross-border collaboration in criminal cases, challenges, and recommendations in the areas of defining the crime, criminal investigation and prosecution, and cross-border cooperation are made. These are the outcomes of a working group discussion during the writers' conference of the HOTT project, a European Union-funded project against trafficking in human beings for the purpose of organ removal.

  8. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  9. Some controversy about law on private security

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir

    2014-01-01

    Full Text Available The Republic of Serbia is one of the last countries that legally regulate the private security sector, which is a new conceptual system of the national security system. Since the law is expected to solve many issues and dilemmas, and bring order to the area, which by some accounts is a very profitable branch of economy. Expectations were that by the end to regulate issues such as: 1 the need for institutionalization of partnership between the public and private sectors for mutual benefit, 2 the need of expressing mutual interest to establish the desired condition of security in the entire society and 3 the need to define the mechanisms and authority to achieve mentioned above. Based on this, legal framework of private security should explicitly provide: 1 a new role of the private sector, 2 communication and data exchange between the public and private sector, 3 mandatory notification about prepared or committed criminal acts on which there is information, 4 cooperation in the tasks of necessarily protected facilities, 4 cooperation in crisis situations including natural disasters, traffic accidents, strikes, sabotage, terrorist attacks, etc., 5 cooperate in the selection and training of staff and 6 cooperation in planning activities and project design of security. This paper presents a critical review of some theoretical and professional controversies in the solutions provided by law, for the purpose of answering whether it is achieving the purpose of passing of such a legal act.

  10. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  11. US/Japan cooperation in high energy physics

    Science.gov (United States)

    1993-11-01

    The objective of the Implementing Arrangement was to further the energy programs of both countries by establishing a framework for cooperation in the field of high energy physics, including research, accelerator and detector instrumentation research and development, the fabrication and subsequent use of new experimental devices and facilities, and related joint efforts as may be mutually agreed. Over the years, this cooperation has been very effective and has strengthened the overall collaborative efforts and the understanding between our nations and their citizens. It has demonstrated to the world our ability to work together to attack difficult problems. High Energy Physics goes across national borders; the bond is clearly intellectual and common ground is shared for the benefit of all in a most effective manner. This review covers the activities conducted under the aegis of the US/Japan Committee for Cooperation in High Energy Physics during the past five years (1988-1993). This was the second such US review of the US/Japan cooperative activities; the first was held in 1987.

  12. Oil and gas, strategic regional cooperation between Persian Gulf countries

    Energy Technology Data Exchange (ETDEWEB)

    Zalloi, Mir Mahdi

    2010-09-15

    Almost two-thirds of proven oil and a third of world natural gas resources are in the Persian Gulf countries. Unfortunately strategic region of Persian Gulf in the past three decades faced with many security challenges due to wars and political conflicts. For security in this region, there are several methods such as military treaties between regional countries or Military presence of foreign countries, but historical evidence has shown, none of them could not guarantee the stable security in this region. The regional cooperation between countries can be replaced to mentioned methods. IPI Gas pipeline is an objective sample for this regional cooperation.

  13. IAEA, EU Senior Officials Review Nuclear-Related Cooperation, Chart Way Ahead

    International Nuclear Information System (INIS)

    Amano, Y.

    2014-01-01

    International Atomic Energy Agency (IAEA) and European Union officials met this week for the second annual Senior Officials Meeting to review and further strengthen their nuclear-related cooperation. In the past year, the two institutions have improved collaboration in nuclear safety, security, safeguards and peaceful use of nuclear energy through implementing a number of initiatives. In 2013, new contracts for projects have been signed amounting to approximately 24 million euros. These included an EU Council decision to support IAEA nuclear security and verification activities worth of 8.05 million euros. Furthermore, a Memorandum of Understanding establishing a framework for cooperation to help improve nuclear safety was signed, as well as the Practical Arrangement on technical nuclear security issues. The EU and the IAEA have also worked to explore and identify new areas for cooperation such as using nuclear applications for socio-economic development. The meeting addressed enhanced cooperation in the areas of nuclear safety, nuclear security, nuclear applications, nuclear energy and safeguards. Participants agreed on the following steps, including holding a Senior Officials Meeting planned in early 2015 in the premises of the European Commission in Luxembourg

  14. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  15. Maritime Security Cooperation in the Strait of Malacca

    National Research Council Canada - National Science Library

    Massey, Anthony S

    2008-01-01

    .... This change can be attributed to the relaxation of historical tensions, the recognition of a common threat in piracy and maritime terrorism, an increase in extra-regional pressure to cooperate...

  16. Erasing lines: Territorial cooperation, sovereignty and European construction (1948-1980

    Directory of Open Access Journals (Sweden)

    Luis Dominguez Castro

    2011-04-01

    Full Text Available The process of European integration, controlled by nation-states, has generated supranational dynamics affecting the sovereignty of the states themselves. The border, one of the most visible symbols of national sovereignty, has been overcome in physical and economic —though not legal— terms. This was achieved first, by the creation of the customs union and later by the single market. In this area of overcoming boundaries, local and regional actors have played a leading role through territorial and cross-border cooperation. Using bibliographical and documentary sources, mainly from the European Navigator, this study analyzes the origins of the early cooperation structures located on the bank of the Rhine, in Frisia and in the Nordic countries. We specifically focus on who these actors were, what their motivations, goals and characteristics were, their Europeanization and the role of the nation-states. The conclusion reached leads us to argue that, if in fact new transnational spaces are established, the objectives of these structures have more to do with local economic development than with identity factors that challenge existing national sovereignty.

  17. Reflection on the Judicial Activism or Constructivism: In Perspective of Being an Instrument of Cooperation in Judicial Facing Issues of Social Security and Labor

    Directory of Open Access Journals (Sweden)

    Antonio Gomes de Vasconcelos

    2016-10-01

    Full Text Available The article proposes a present thinking as the possibility of reaching solutions to some social security and labor issues in democratic rule of law using judicial cooperation in the search for effective social law of social security. The current legal constructivism, also called judicial activism in its manifestation of legal instrument to weigh yourself to get and verify the approach of social dialogue for more proactive attitude of the court, in which the actors involved in the conflict are called to have a more active participation on problem situations, requiring them more than mere legal interpretation in philosophical hermeneutics.

  18. THE SOCIO-ECONOMIC IMPORTANCE OF PROGRAMS FOR THE FINANCING OF CROSS-BORDER COOPERATION

    Directory of Open Access Journals (Sweden)

    Mioara BORZA

    2015-12-01

    Full Text Available The topic of European funding shows a great interest for present and, especially, for the future. The common problems of areas implied in the cross-border programs are correlated to socio-economic development of communities. By this paper we propose an analysis, by inventory type, descriptive and qualitative, of implemented projects and of the perspectives for projects in 2014-2020 period. The results of paper consist in identification of solid arguments about the importance and necessity of these programmes and projects.

  19. The international cooperation using the example of the reactor accident in Chernobyl

    International Nuclear Information System (INIS)

    Molitor, Norbert

    2017-01-01

    The explosion of the reactor unit 4 of the NPP Chernobyl and the subsequent fire was up to now the most severe accident in the civil nuclear industry. The consequences of the accident far outside the Ukraine and the former Soviet Union demonstrated that nuclear safety is a trans-border challenge. The mitigation of the accident consequences and the recovery of safety for the public, the workers and the environment required outstanding efforts and the international cooperation was of significant importance. The contribution discusses experiences and practical aspects of the international cooperation and implications for future cooperation options for the long-term removal of accident consequences.

  20. Border installations

    International Nuclear Information System (INIS)

    Lenaerts, Koen

    1988-01-01

    Border installations cover all nuclear plants located near the border with a neighbouring state. However, the actual distance depends on the context. The distance can vary considerably. Also the prohibition on siting near a heavily populated area also defines the actual distance variably. The distance criteria may be modified by other factors of topography, prevailing climate and so on. Various examples which illustrate the problems are given. For example, the Creys-Melville nuclear power plant is 80km from Geneva and the Cattonam installation is 12km from the French border with Luxembourg and Germany. The Cattenom case is explained and the legal position within the European Institutions is discussed. The French licensing procedures for nuclear power stations are described with special reference to the Cattenom power plant. Border installations are discussed in the context of European Community Law and Public International Law. (U.K.)

  1. THE NORTHERN BORDER A FORGOTTEN NATIONAL SECURITY THREAT

    Science.gov (United States)

    2017-04-06

    Deputy Director of the DEA, Jack Riley.70 However, they have been seen recently expanding their physical and permanent presence in Canada. In 2015...balanced approach. Notes 1 Jane A. Bullock, George D. Haddow, and Damon P. Coppola, Homeland Security: The Essentials (Waltham, MA : Butterworth -Heinemann...Michoacán Family (La Familia Michoacána or LFM), Knights Templar (Los Caballeros Templarios or LCT), and Los Zetas.” Jack Riley, Acting Deputy

  2. MEMS and MOEMS for national security applications

    Science.gov (United States)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  3. Corporate strategic plan for safeguards and security

    International Nuclear Information System (INIS)

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department's diverse security needs. As an integral part of the nation's security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation's and international security environments

  4. Continuation or Equilibration: The Algerian Conflict and European Security

    National Research Council Canada - National Science Library

    Lynch, Michael

    1997-01-01

    .... Algeria's conflict has ramifications that travel far beyond its borders. Europe states rely upon Algerian natural gas for their energy needs, and are fearful of the impact of Islamic revivalism on their security situations...

  5. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  6. Nuclear proliferation and the potential threat of nuclear terrorism. 8 November 2004, Sydney, Australia, Asia-Pacific Nuclear Safeguards and Security Conference

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Today, the focus of the world is on nuclear proliferation and the potential threat of nuclear terrorism in Asia and the Pacific, and this address is presenting the perspectives on the challenges IAEA faces, and how the IAEA is working to strengthen nuclear security and the nuclear non-proliferation regime. But one would emphasize at the outset that, while much of our work must begin locally and regionally, we must not forget to think globally, because ultimately the existence of a nuclear threat anywhere is a threat everywhere, and as a global community, we will win or lose this battle together. This presentation, discusses cooperation, assistance, regional and international networks, and the importance of learning from each other. In effect, the focal subject is 'security culture', a mindset that, while providing the impetus for local and regional action, thinks globally and is fully capable of extending across borders. Sixty years ago, on a day in August, the dawn of the Nuclear Age in Asia left nearly a quarter of a million people dead, with two devices considered crude by modern standards. For six decades, we have managed to avoid a repeat of that event, but remain haunted by the prospect. It is my firm belief that we cannot move out from under the shadow of Hiroshima and Nagasaki until we are ready to make that move collectively, and build a system of security that transcends borders, that focuses on the equal value of every human life, and in which nuclear weapons have no place. May it not ultimately be said of our civilization that we created the inventions that led to our own demise

  7. Reprint of: Dream vs. reality: seven case-studies on the desirability and feasibility of cross-border hospital collaboration in Europe.

    Science.gov (United States)

    Glinos, Irene A; Baeten, Rita

    2015-01-01

    Despite being a niche phenomenon, cross-border health care collaboration receives a lot of attention in the EU and figures visibly on the policy agenda, in particular since the policy process which eventually led to the adoption of Directive 2011/24/EU. One of the underlying assumptions is that cross-border collaboration is desirable, providing justification to both the European Commission and to border-region stakeholders for promoting it. The purpose of this paper is to question this assumption and to examine the role of actors in pushing (or not) for cross-border collaboration. The analysis takes place in two parts. First, the EU policies to promote cross-border collaboration and the tools employed are examined, namely (a) use of European funds to sponsor concrete border-region collaboration projects, (b) use of European funds to sponsor research which gives visibility to cross-border collaboration, and (c) use of the European Commission's newly acquired legal mandate to encourage "Member States to cooperate in cross-border health care provision in border-regions" (Art. 10) and support "Member States in the development of European reference networks between health care providers and centres of expertise" (Art. 12). Second, evidence gathered in 2011-2013 from seven European border-regions on hospital cross-border collaboration is systematically reviewed to assess the reality of cross-border collaboration - can it work and when, and why do actors engage in cross-border collaboration? The preliminary findings suggest that while the EU plays a prominent role in some border-region initiatives, cross-border collaboration needs such a specific set of circumstances to work that it is questionable whether it can effectively be promoted. Moreover, local actors make use of the EU (as a source of funding, legislation or legitimisation) to serve their needs. Copyright © 2014. Published by Elsevier Ltd.

  8. Education Requirements of Command Positions in the U.S. Border Patrol

    Science.gov (United States)

    2015-06-12

    commander. Degrees in Culinary Arts , Fashion Design, or Film Studies are thus considered as relevant and valuable for command as degrees in Border...Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security...Z39.18 iii MASTER OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE Name of Candidate: Julio C. Peña Thesis Title: Education Requirements of

  9. Bordering on Failure: Mexican Instability, Drug Wars, and the Threat to U.S. Security

    Science.gov (United States)

    2012-04-19

    NAFTA was that Mexico had to demonstrate it was not a one party political system; thus, the PRI began to loosen its suppression of opposition...are recruiting Texas school age children to support Cartel operations. The border region constitutes 9.4% of the state’s population and now has

  10. U.S.-MEXICO TECHNOLOGY TRANSFER; BILATERAL TECHNICAL EXCHANGES FOR SUSTAINABLE ECONOMIC GROWTH IN THE BORDER REGION

    Energy Technology Data Exchange (ETDEWEB)

    Jimenez, Richard, D., Dr.

    2007-10-01

    s challenging environmental issues. The results also brought focus to the potential contributions that DOE’s science and technology could make for solving the many difficult, multi-generational problems faced by hundreds of bi-national communities along the 2,000-mile shared border of the United States and Mexico. Efforts to address these U.S.-Mexico border issues were initially sponsored by the DOE’s Albuquerque and Carlsbad offices. In subsequent years, the U.S. Congress directed appropriations to DOE’s Carlsbad office to address public health, safety and security issues prevalent within U.S.-Mexico border communities. With ASL’s assistance, DOE’s Albuquerque office developed contacts and formed partnerships with interested U.S and Mexican government, academic, and commercial organizations. Border industries, industrial effluents, and public health conditions were evaluated and documented. Relevant technologies were then matched to environmental problem sets along the border. Several technologies that were identified and subsequently supported by this effort are now operational in a number of U.S.-Mexico border communities, several communities within Mexico’s interior states, and in other parts of Latin America. As a result, some serious public health threats within these communities caused by exposure to toxic airborne pollutants have been reduced. During this time, DOE’s Carlsbad office hosted a bilateral conference to establish a cross-border consensus on what should be done on the basis of these earlier investigative efforts. Participating border region stakeholders set an agenda for technical collaborations. This agenda was supported by several Members of Congress who provided appropriations and directed DOE’s Carlsbad office to initiate technology demonstration projects. During the following two years, more than 12 private-sector and DOE-sponsored technologies were demonstrated in partnership with numerous border community stakeholders. All technologies

  11. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  12. Study on Mode of Laos-China Cross-Border Collaboration Strategy Facing Symbiosis Relation

    OpenAIRE

    Thiravong , Sisavath; Xu , Jingrong; Jing , Qin

    2015-01-01

    International audience; Laos is a country with abundant natural resources, low labor costs and land rents, which has natural geo-economic relationship with China, and gradually became one of the important destinations of Chinese enterprises’ foreign direct investment. Meanwhile, China has become the largest overseas investment country in Laos. Based on the symbiotic relationship between Laos and China, this paper studies the dynamics of Laos-China cross-border cooperation from three aspects, ...

  13. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Science.gov (United States)

    2012-08-30

    ... border. The Public Safety and Homeland Security Bureau (Bureau), by this action, affords interested... INFORMATION CONTACT: Brian Marenco, Policy and Licensing Division, Public Safety and Homeland Security Bureau... 2007, the Commission delegated authority to Public Safety and Homeland Security Bureau to propose and...

  14. Cognitive communication and cooperative hetnet coexistence selected advances on spectrum sensing, learning, and security approaches

    CERN Document Server

    Bader, Faouzi

    2014-01-01

    This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.

  15. The Arctic Region: A Requirement for New Security Architecture?

    Science.gov (United States)

    2013-03-01

    cooperation and mutually beneficial partnerships . Denmark’s security policy states that existing international law and established forums of cooperation...increase leadership in multinational forum and, develop comprehensive partnerships without the need to create a new security organization. Figure 3...Arctic region. Endnotes 1 Government of Canada, “Canada’s Arctic foreign policy” (Ottawa, Canada, 2007), 2. 2 WWF Global, “Arctic oil and gas”, http

  16. Sub-Regional Cooperation of the Republic of Moldova on the South-East European Dimension

    Directory of Open Access Journals (Sweden)

    Maria DIACON

    2017-06-01

    Full Text Available Formation of the country image on the world arena can be analyzed from the perspective of sub-regional cooperation. In this respect, we emphasize that Moldova has joined a number of initiatives, programs and organizations which, by their status and the range of the promoted objectives, became "antechamber" to the European Union. Fixing the borders of the sub-regional cooperation area, we note that in the Central Europe Moldova attends the Central European Initiative, while in the South-East Europe are carried out activities in the South-East European Cooperation Process and the Organization for the Black Sea Economic Cooperation and assists in the Organization for Democracy and Economic Development GUAM.

  17. Efficient Security Mechanisms for the Border Gateway Routing Protocol

    Science.gov (United States)

    1997-08-22

    Finding Algorithm for Loop- Free Routing. IEEE/ACM Transactions on Networking, 5(1):148{160, Feb. 1997. [7] International Standards Organization. ISO/IEC...Jersey 07974, Feb. 1985. ftp://netlib.att.com/netlib/att/cs/ cstr /117.ps.Z. [16] S. L. Murphy. Presentation in Panel on \\Security Architecture for the

  18. Mariposa port of entry bottleneck study : facilitating efficient, secure and economical cross-border transportation movements.

    Science.gov (United States)

    2008-10-01

    The Arizona-Sonora border has become increasingly important to both states economy : due to increased trade between the regions following the 1994 passage of the North American : Free Trade Agreement (NAFTA) and the establishment of maquiladora in...

  19. Security dimension of the Canada-EU relationship

    Directory of Open Access Journals (Sweden)

    O. M. Antokhiv­Skolozdra

    2014-05-01

    In particular, it defines that the Canadian Government accepted the fact of strengthening the security part of the European Union activity in a reserved manner, as it could cause decrease in influence of this North American State in Euro­Atlantic area. It outlines the main directions of cooperation, scrutinizes institutional mechanisms of interaction and emphasizes the key challenges of security dimension of bilateral relations.  It deals with the peculiarities of Canada’s participation in military and civil actions under the auspices of the European Union and stresses that the limited military potential of Ottawa makes its effective participation in bilateral cooperation with the European partners less possible. It stresses the adherence of priority in relations between Canada and the United States in security sphere and underlines the significant role of the North Atlantic Treaty Organization in its interaction on the security and defense issues between Canada and the European Union. It emphasizes that the official Ottawa insists on NATO playing the leading role in providing security in Euro­Atlantic area. It illustrates, however, that due to a number of reasons, in particular, lack of initiative in advancing European security and defense policy, the Canadian Government on current stage don’t present particular interest in activating interaction with their European partners in this sphere. It depicts also that Canada and the European Union have started developing cooperation outside ESDP on domestic security, in particular, on struggle against organized crime and other challenges of current society, which has encouraged institutionalization in relationship of the European Union and the Europol.

  20. The role of optics in secure credentials

    Science.gov (United States)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  1. Multi-TSO cross border balancing mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Llorens, Maria Luisa; Moreno, Laura; Fuente, Jose Ignacio de la; Junco, Paula; Arenillas, Jorge [Red Electrica de Espana (REE) S.A.U., Madrid (Spain). Operation Markets Dept.; Pereira, Pedro [REN - Servicos, S.A., Lisbon (Portugal). Gabinete Mercado e Liquidacoes; Chabanne, Colas [RTE Reseau de Transport d' Electricite, Paris (France). Markets Dept.; Apoyan, Lalake; Barbieri, Galileo [RTE Reseau de Transport d' Electricite, Paris (France). Cross-Border Market Design

    2012-07-01

    The balancing market integration has been highlighted as a necessary step to reach the European Union goal for the development of an effective, competitive single market for electricity across Europe. In this paper it is described the work done by RTE, REE and REN regarding the design of a non-discriminatory, efficient and reliable multi-TSO Cross Border Balancing Mechanism at regional level, extendible to other control areas. The implementation of this multi-TSO Cross Border Balancing Mechanism will aim at increasing the operational security, enhancing the Liquidity and Competition of balancing markets, facilitating the integration of energy produced by Renewable Energy Sources while optimizing the use of Interconnection capacities. With this mechanism, the three TSOs will be able to exchange to each other balancing energy through the available interconnection capacities after the last intraday market sessions. This mechanism will be based on a common IT platform where TSOs will share their available surplus of reserves and communicate their balancing needs. The available interconnection capacities will be taken into account in an automatic and centralized way. Two main options are investigated regarding the allocation method: on the one hand, the first come first served approach (FCFS), on the other hand, the ''social welfare'' optimization approach. (orig.)

  2. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  3. Cross-border Portfolio Investment Networks and Indicators for Financial Crises

    Science.gov (United States)

    Joseph, Andreas C.; Joseph, Stephan E.; Chen, Guanrong

    2014-02-01

    Cross-border equity and long-term debt securities portfolio investment networks are analysed from 2002 to 2012, covering the 2008 global financial crisis. They serve as network-proxies for measuring the robustness of the global financial system and the interdependence of financial markets, respectively. Two early-warning indicators for financial crises are identified: First, the algebraic connectivity of the equity securities network, as a measure for structural robustness, drops close to zero already in 2005, while there is an over-representation of high-degree off-shore financial centres among the countries most-related to this observation, suggesting an investigation of such nodes with respect to the structural stability of the global financial system. Second, using a phenomenological model, the edge density of the debt securities network is found to describe, and even forecast, the proliferation of several over-the-counter-traded financial derivatives, most prominently credit default swaps, enabling one to detect potentially dangerous levels of market interdependence and systemic risk.

  4. 75 FR 40864 - Notice of Fiscal Year 2010 Border Grant Funding and Solicitation for Applications

    Science.gov (United States)

    2010-07-14

    ... Federal Grant Web site, http://www.grants.gov . Eligible projects for funding with BEG are identified in... applications for BEG funding at the Federal Grant Web site, http://www.grants.gov . FOR FURTHER INFORMATION... the MOE explanation, http://www.fmcsa.dot.gov/safety-security/grants/beg/moe.aspx . The Border...

  5. Perspektivy setevogo sotrudnichestva Rossii i stran ES v innovacionnoj sfere na Baltike [Innovations in the Baltic Sea Region and Network Cooperation between Russia and the EU

    Directory of Open Access Journals (Sweden)

    Fedorov Gennady

    2013-01-01

    Full Text Available Transnational (involving countries and cross-border (involving adjacent regions of different countries cooperation and integration are rapidly developing in the Baltic Sea region. Russia lags behind the Nordic countries and Germany as far as innovative development is concerned; yet our national pace here is comparable to that of Poland and the three Baltic States. At the same time, the features of innovative cooperation vary a great deal depending on the group of countries involved in cooperation processes. Independent of its type, however, international cooperation is beneficial for all parties concerned and should therefore be more actively encouraged. Northwestern Federal District traditionally plays a special role in the development of EU-Russia cooperation, since a number of its regions border on the EU countries. The district participates in the development of network innovative structures within the Baltic Sea region. It takes an active part in cross-border cooperation — activities that involve the formation of transborder innovative clusters. There are high expectations associated with the formation of such territorially localised innovative networks, as the Helsinki — Saint Petersburg — Tallinn and Tricity (Gdansk, Gdynia, Sopot — Kaliningrad — Klaipeda transborder innovative clusters. The city of Saint Petersburg and the adjacent Leningrad region, as well as the Kaliningrad region can become innovative development corridors between Russia and the EU and, eventually, develop into the ‘economic growth poles’ of the Russian Federation.

  6. Revisiting the soft security debate: From European progress to ...

    African Journals Online (AJOL)

    Given the extended scope of security sectors falling within the ambit of soft security regional co-operation is indispensable – a phenomenon most visible in European security architecture and that of Northern Europe in particular. Not only European decision-makers, however, pursue the soft security option. As Africa entered ...

  7. The household food insecurity and health outcomes of U.S.-Mexico border migrant and seasonal farmworkers.

    Science.gov (United States)

    Weigel, M Margaret; Armijos, Rodrigo X; Hall, Yolanda Posada; Ramirez, Yolanda; Orozco, Rubi

    2007-07-01

    Emerging evidence suggests chronic household food insecurity has an adverse effect on health. This study examined the prevalence, predictors and health outcomes associated with food insecurity in 100 migrant and seasonal farmworker (MSFW) households living on the U.S.-Mexico border. Data were collected using the U.S. Food Security Scale, California Agricultural Worker's Health Survey, and objective anthropometric, clinical and biochemical indicators. Food insecurity affected 82% of households; 49% also had hunger. Household food insecurity was predicted by the presence of minor children in the home and low maternal education. Food insecure households were more likely to have at least one member affected by symptoms of depression (deprimido), nervios (an ethnospecific condition), learning disorders, and symptoms suggestive of gastrointestinal infection. Although not directly associated with food insecurity, adult obesity, central body adiposity, elevated blood pressure, and blood lipid and glucose disturbances were common. These findings highlight the significant food security and health challenges faced by border area MSFW families.

  8. Securing Financial Stability: Problems and Prospects for New EU Members, Report on the SUERF Seminar jointly organised with the Central Bank of Malta

    DEFF Research Database (Denmark)

    Balling, Morten

    2003-01-01

    topics are monetary policy transparency, preservation of investor confidence, the adequacy of the legal framework governing the financial sector, asset price volatility, size and volatility of cross-border capital flows, implications of bank privatisations, increasing market shares of foreign banks......The article gives an overview of twelve contributions to a seminar organised in March 2003 by SUERF in cooperation with the Central Bank of Malta. The contributions analyse from different perspectives the problems related to securing financial stability in the EU accession countries. Important......, integration of European supervisory systems, choice of exchange rate regime and government debt policy. Four of the contributions are country case studies in which the financial stability experiences of countries that have become members of the EMU are described. Udgivelsesdato: July...

  9. Border Crossing/Entry Data - Border Crossing/Entry Data Time Series tool

    Data.gov (United States)

    Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...

  10. Cross-border jurisdiction and assistance in insolvency: the position in Malaysia and Singapore

    OpenAIRE

    Omar, PJ

    2008-01-01

    Malaysia and Singapore are members of the common law family and have 'inherited' their company and insolvency law from models in use in the United Kingdom with influences from Australia. It is the purpose of this article to outline the law in relation to cross-border insolvency, particularly the winding up of foreign companies, the co-operation provisions in bankruptcy and insolvency as well as more recent moves to redevelop insolvency through UNCITRAL and Asian Development Bank initiatives.

  11. "Recruitment to the organsization for security and co-operation in Europe`s mission to Bosnia- Herzegovina" : applying organizational theory to effective peacebuilding

    OpenAIRE

    Nørgaard, Benedicte

    2005-01-01

    Research on international peacebuilding has paid very little attention to the possible influence of internal organizational structures within the organizations carrying out the work. This thesis seeks to add to this knowledge, by providing insights into the recruitment and selection process of the Organization for Security and Co-operation in Europe (OSCE) in Bosnia-Herzegovina (BiH). The purpose of this study is to build knowledge about how the OSCE recruit, and use that knowledge to better ...

  12. High reliability - low noise radionuclide signature identification algorithms for border security applications

    Science.gov (United States)

    Lee, Sangkyu

    Illicit trafficking and smuggling of radioactive materials and special nuclear materials (SNM) are considered as one of the most important recent global nuclear threats. Monitoring the transport and safety of radioisotopes and SNM are challenging due to their weak signals and easy shielding. Great efforts worldwide are focused at developing and improving the detection technologies and algorithms, for accurate and reliable detection of radioisotopes of interest in thus better securing the borders against nuclear threats. In general, radiation portal monitors enable detection of gamma and neutron emitting radioisotopes. Passive or active interrogation techniques, present and/or under the development, are all aimed at increasing accuracy, reliability, and in shortening the time of interrogation as well as the cost of the equipment. Equally important efforts are aimed at advancing algorithms to process the imaging data in an efficient manner providing reliable "readings" of the interiors of the examined volumes of various sizes, ranging from cargos to suitcases. The main objective of this thesis is to develop two synergistic algorithms with the goal to provide highly reliable - low noise identification of radioisotope signatures. These algorithms combine analysis of passive radioactive detection technique with active interrogation imaging techniques such as gamma radiography or muon tomography. One algorithm consists of gamma spectroscopy and cosmic muon tomography, and the other algorithm is based on gamma spectroscopy and gamma radiography. The purpose of fusing two detection methodologies per algorithm is to find both heavy-Z radioisotopes and shielding materials, since radionuclides can be identified with gamma spectroscopy, and shielding materials can be detected using muon tomography or gamma radiography. These combined algorithms are created and analyzed based on numerically generated images of various cargo sizes and materials. In summary, the three detection

  13. The California Border Health Collaborative: A Strategy for Leading the Border to Better Health

    Directory of Open Access Journals (Sweden)

    Charles Edwards Matthews III

    2015-05-01

    Full Text Available There are hundreds of departments and organizations working on border health issues in the California/Baja California border region trying to protect and improve health without a collaborative structure that integrates jurisdictions and organizations. As a result, there is a need to effectively improve the health in the border region by coordinating these organizations to work together and benefit from each other’s best practices. The newly developed California Border Health Collaborative (CBHC can provide the leadership and collaborative culture to positively improve the health of the border region. This article aims to describe the development process of this collaborative to include key ingredients to success, the roles of mulit-level jurisdictions, and policy implications.This article describes the methods used to develop key aspects of collaborative leadership, strategic alignment and a common vision toward the building of this collective impact approach to border health. In addition, we describe the role of key local County (County of San Diego Live Well San Diego initiative, State, (California Department of Public Health- Office of Binational Border Health, Federal (US-Mexico Border Health Commission’s Leaders across Borders, Academia (e.g., University of California San Diego and San Diego State University and non-profit entities (e.g., Project Concern International, San Ysidro Health Center in forming the BHCC. Evaluating the consortium development process included a literature review of similar processes, a review of internal documents and an analysis of developmental events. To this point the CBHC has built a strong, cohesive collaborative on the U.S. side of the border. It is sharing and leveraging local expertise to address many border health issues. Even more importantly, the BHCC has reached a key stage in which it can effectively engage its Baja California, Mexico counterparts in a manner that will prove extremely powerful

  14. Competing security and humanitarian imperatives in the Berm

    Directory of Open Access Journals (Sweden)

    Charles Simpson

    2018-02-01

    Full Text Available Approximately 60,000 Syrians are trapped in ‘the Berm’, a desolate area on the Syria-Jordan border. When security concerns are prioritised over humanitarian needs, and aid agencies turn to militant groups to deliver aid, the consequences can be deplorable.

  15. Borders as barriers to tourism: tourists experiences at the Beitbridge Border Post (Zimbabwean side

    Directory of Open Access Journals (Sweden)

    Getrude Kwanisai

    2014-01-01

    Full Text Available International borders greatly influence tourism development. In 2012 and 2013, a decline in tourists to Zimbabwe from South Africa was partially attributed to tourist border facilitation issues. It is against this background that this study sought to establish the nature of challenges faced by tourists when using the Beitbridge border post (Zimbabwean side. Questionnaire responses were thematically analysed and the study concluded that border administrative management related issues are a major barrier to tourism. Key among the study's recommendations is that the depressed tourists' border experiences obtaining at Beitbridge border post among other constraints have to be addressed as a matter of urgency. This will enhance Zimbabwe's accessibility, tourist satisfaction and the image of the country as a destination. The paper further identifies several destination managerial implications and future research priorities.

  16. OPPORTUNITIES AND RISKS OF CROSS-BORDER COOPERATION OF REGIONS OF THE SOUTHERN MACROREGION OF RUSSIA AND REGIONS OF THE SOUTH-EAST OF UKRAINE IN THE CONDITIONS OF UNCERTAINTY

    Directory of Open Access Journals (Sweden)

    Inna Mitrofanova

    2015-09-01

    Full Text Available In article the political and economic innovations connected with the transformation of the region «Donbass» in the context of decrease of the risks caused by a military-political and economic conflict in Ukraine are investigated. On the basis of creative synthesis of theoretical and practical approaches of studying the evolution of nonlinear economic systems and the formation of megaregions, and also the analysis of the geopolitical situation developing on the world scene between Russia, the USA and China provisions are developed according to which the region «Donbass» can be considered as «a critical point» of the European regionalization. Authors believe that the important strategic prospect of border cooperation of Russia and Ukraine is connected with the formation of a cross-border agglomeration «Nizhnedonbassky» and «Verkhnedonbassky» the creation of which consists in realization of the linking function between Nizhnedonbassky, Volga region, Moscow and Petersburg transport corridors. One of the condition of social and economic stabilization in the subjects of the foreign Caspian and the Black Sea zones is the realization of geotransit capacity of the region «Donbass» with the formation of a geotransit architecture of its economy. Strategically realization of the processes of an international city formation is possible either on the basis of federal principles or by a geopolitical split of the territory of the region “Donbass” on the line Kharkov – Donetsk – Lugansk with a bent to Russia.

  17. Everyday violence, structural racism and mistreatment at the US-Mexico border.

    Science.gov (United States)

    Sabo, Samantha; Shaw, Susan; Ingram, Maia; Teufel-Shone, Nicolette; Carvajal, Scott; de Zapien, Jill Guernsey; Rosales, Cecilia; Redondo, Flor; Garcia, Gina; Rubio-Goldsmith, Raquel

    2014-05-01

    Immigration laws that militarize communities may exacerbate ethno-racial health disparities. We aimed to document the prevalence of and ways in which immigration enforcement policy and militarization of the US-Mexico border is experienced as everyday violence. Militarization is defined as the saturation of and pervasive encounters with immigration officials including local police enacting immigration and border enforcement policy with military style tactics and weapons. Data were drawn from a random household sample of US citizen and permanent residents of Mexican descent in the Arizona border region (2006-2008). Qualitative and quantitative data documented the frequency and nature of immigration related profiling, mistreatment and resistance to institutionalized victimization. Participants described living and working in a highly militarized environment, wherein immigration-related profiling and mistreatment were common immigration law enforcement practices. Approximately 25% of respondents described an immigration-related mistreatment episode, of which 62% were personally victimized. Nearly 75% of episodes occurred in a community location rather than at a US port of entry. Participant mistreatment narratives suggest the normalization of immigration-related mistreatment among the population. Given border security remains at the core of immigration reform debates, it is imperative that scholars advance the understanding of the public health impact of such enforcement policies on the daily lives of Mexican-origin US permanent residents, and their non-immigrant US citizen co-ethnics. Immigration policy that sanctions institutional practices of discrimination, such as ethno-racial profiling and mistreatment, are forms of structural racism and everyday violence. Metrics and systems for monitoring immigration and border enforcement policies and institutional practices deleterious to the health of US citizens and residents should be established. Copyright © 2014

  18. Security Threats Emerging from the Middle East and North Africa

    OpenAIRE

    Çınar, Bekir

    2015-01-01

    The main security threats affecting the Middle East and North African (MENA) region arise from energy insecurity, immigration and terrorism. These threats would remain if authorities and other stake holders do not address the root causes of the problems, which are artificial national borders, authoritarian regimes and lack of pluralist education. This paper suggests that lifting state borders and setting up regional economic communities such as the EU may ease conflicts in the region which ca...

  19. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  20. Indonesian Maritime Security Cooperation In the Malacca Straits

    Science.gov (United States)

    2015-06-01

    Chokepoints,” July 2, 2005, http://www.wallstreetbear.com/board/view.php?topic=31801&post=103853. 86 Sam Bateman , Joshua Ho, and Jane Chan, Good...Cooperation as Part of the Solution to Piracy—The Importance of ReCAAP in Southeast Asia.” Master’s thesis, Lund University, 2012. Bateman , Sam, Joshua

  1. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  2. Business, brokers and borders

    DEFF Research Database (Denmark)

    Walther, Olivier

    Using social network analysis, this paper studies the structure of trade networks that developed across West African borders. The first part aims to understand the centralization of cross-border trade networks. In a business environment where transaction costs are extremely high, we find...... developed with foreign partners from a different origin, religion or culture. In the second part, we study the spatial structure of trade networks and the influence of national borders on the development of social ties. The paper shows that the spatial form of trade networks is constrained by the historical...... origin of the traders engaged in cross-border activities. In those markets where trade is recent and where most of the traders are not native of the region, national borders are likely to exert a greater influence than in those regions where trade has pre-colonial roots....

  3. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  4. Economic analysis of the cross-border coordination of operation in the European power system

    International Nuclear Information System (INIS)

    Janssen, Tanguy

    2014-01-01

    The electricity high voltage transmission networks are interconnected over most of the continents but this is not the case of the power system organizations. Indeed, as described with the concept of integrated power system, the organization over these large networks is divided by several kinds of internal borders. In this context, the research object, the cross-border coordination of operation, is a set of coordination arrangements over internal borders between differing regulatory, technical and market designs. These arrangements can include for instance the famous market couplings, some cost-sharing agreements or common security assessments among several other solutions. The existence and improvement of the cross-border coordination of operation can be beneficial to the whole integrated power system. This statement is verified in the European case as in 2012 where several regional and continental coordination arrangements are successfully implemented.In order to benefit from the European experience and contribute to support the European improvement process, this thesis investigates the cross-border coordination of operation in the European case with four angles of study. First, a modular framework is built to describe the existing solutions and the implementation choices from a regulatory point of view. Second, the thesis analyses the tools available to assess the impact of an evolution of the cross-border coordination. Third, the role of the European Union (EU) is described as critical both for the existing arrangements and to support the improvement process. The last angle of study focuses on two dimensions of the economic modes of coordination between transmission system operators. (author)

  5. Secure Cooperative Data Access in Multi-Cloud Environment

    Science.gov (United States)

    Le, Meixing

    2013-01-01

    In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…

  6. Dynamic Security Assessment of Danish Power System Based on Decision Trees: Today and Tomorrow

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Liu, Leo; Chen, Zhe

    2013-01-01

    The research work presented in this paper analyzes the impact of wind energy, phasing out of central power plants and cross border power exchange on dynamic security of Danish Power System. Contingency based decision tree (DT) approach is used to assess the dynamic security of present and future...

  7. The impact of the European insolvency regulation on lenders, lending decisions, the structuring of transactions and enforcement of security

    OpenAIRE

    Sharma, R

    2011-01-01

    This Thesis seeks to shed light on the issue of how far secured creditor rights are protected in EU cross-border insolvencies by focusing on the perspective and position of English lenders. The main thread throughout is the legal concerns faced by lenders when lending to a company incorporated in England and Wales which operates across the European Union and has assets and creditors spread across various Member States. The initial stages of the structuring of a cross-border security arrangeme...

  8. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  9. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  10. Nuclear Security and Nuclear Safeguards; Differences, Commonalities and Synergies

    International Nuclear Information System (INIS)

    Jorant, C.

    2015-01-01

    Reference to the three S's in the nuclear world is recurring and much has been said about the need to build on synergies to reinforce safeguards, safety and security. In practice, the 3S's communities are seldom interconnected even though some interaction can be observed between safety and security and security and safeguards. Ensuring a better understanding between those three sectors about their scope, requirements, implementation methods and tools would stimulate cooperation. The second Nuclear Security Summit and particularly the industry related event stressed the synergies between safety and security. The first IAEAs Security Conference organized in July 2013 did not address specifically nuclear safeguards and security relations. Last Security Summit took place in The Hague in March 2014 and this type of issue was not really raised either. The safeguards Symposium provides a timely opportunity to tackle possible enhanced cooperation between safeguards and security communities and assess the prospect for addressing such issue at the next and allegedly last security summit in 2016. This presentation will analyze the differences and commonalities between those two sectors, in particular with regards to the objectives and actors, the organization and technicalities, or to the conceptual approaches (DBT and APA/SLC, attractiveness/accessibility). It will then assess the possible synergies or cooperation between both communities. It will discuss the merits of a global and comprehensive involvement of the different actors, (State, industry and international bodies including the NGOs) and of exchanges on good practices to contribute to a common understanding and references while allowing for an adaptable and national approach. Indeed the need to reassure the stakeholders, including the general public, that security, as well as safeguards are addressed in a consistent manner worldwide is of utmost importance for building future nuclear energy programmes on a

  11. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1993-01-01

    The three notions, disarmament, national security and interdependence, which are well known, need a new reading in the today's mission for the United Nations, to facilitate the democratic, evolutionary renewal of the the interdependent world, in which disarmament could play an important role without putting at risk national security, which is of primary concern for the majority of Member States. The recognition of the unity of the wold and its interdependence is the main focal point in the process of transition of the international community to the new world system of peace, cooperation and security based on United Nations Charter. This system was outlined at the Forty-fourth session of the General Assembly, and adopted by Member States as a resolution entitled 'Enhancing international peace, security and international cooperation in all its aspects in accordance with the Charter of United Nations'

  12. A thirsty dragon. Rising Chinese crude oil demand and prospects for multilateral energy security cooperation

    Energy Technology Data Exchange (ETDEWEB)

    Causevic, Amar

    2012-07-01

    The Chinese appetite for energy could potentially result in two scenarios. Each of these will systematically be developed and examined in the course of this paper. The pessimistic scenario foresees energy-driven foreign policy placing China in a dangerous confrontation with the U.S., Japan, the EU and India. American, Indian and Chinese navies are already competing across the Indian Ocean, with participants upgrading their naval forces, building deep-sea ports, constructing military bases and forging alliances across the Indian Ocean. They have not yet entered into conflict, but as their naval presence increases, the possibility of an armed clash grows. This scenario represents a 'nightmare option' that could have grave consequences for the entire globe, as the U.S., China, India and two EU members are all states armed with nuclear weapons. Conversely, an opposite scenario can be envisaged. A liberal integrationist perspective offers huge potential for multilateral energy security cooperation. Despite all tensions, China, the West and India are oil importers, and, as consumers, they could work together in fostering common strategies. What is more, their economies are mutually intertwined, and any conflict would bring about fatal collateral damage to the economic well-being of all parties. In short, China and America and potentially India could synchronize approaches to energy issues and address worries about growing global competition for crude oil. Being that as it may, China's further integration into multilateral energy organizations - notably the Organisation for Economic Co-operation and Development (OECD) International Energy Agency (IEA) - will not be an easy task. Introduction of the new standards and requirements could be a burden for Chinese economic development. Membership in the IEA would reduce freedom in energy policy-making as it requires intelligencesharing, market liberalization and surrendering a certain degree of national

  13. Cross-border policy effects on alcohol outcomes: drinking without thinking on the u.s.-Mexico border?

    Science.gov (United States)

    Mills, Britain A; Caetano, Raul; Vaeth, Patrice

    2014-11-01

    Rates of alcohol-related outcomes are sensitive to policy differences in politically distinct, adjacent territories. Factors that shape these cross-border effects, particularly when the policy differences are longstanding, remain poorly understood. We compared the ability of 2 classes of variables with theoretical relevance to the U.S.-Mexico border context-bar attendance and alcohol-related social-cognitive variables-to explain elevated drinking on the U.S. side of the border relative to other areas of the United States. Data were collected from multistage cluster samples of adult Mexican Americans on and off the U.S.-Mexico border (current drinker N = 1,351). Structural equation models were used to test drinking context (frequency of bar attendance) and 6 different social-cognitive variables (including alcohol-related attitudes, norms, motives, and beliefs) as mediators of border effects on a composite drinking index. The border effect on drinking varied by age (with younger adults showing a stronger effect), consistent with previous findings and known risk factors in the region. Contrary to theoretical expectations, 6 different social-cognitive variables-despite relating strongly with drinking-were comparable in border and nonborder areas (within and across age) and played no role in elevated drinking on the border. Conversely, elevated drinking among border youth was mediated by bar attendance. This mediated moderation effect held after adjusting for potential sociodemographic and neighborhood-level confounders. Increased drinking among U.S.-Mexico border youth is explained by patterns of bar attendance, but not by more permissive alcohol-related social-cognitive variables in border areas: Border youth attend bars and drink more than their nonborder counterparts, despite having comparable alcohol-related beliefs, attitudes, norms, and motives for use. Alcohol's heightened availability and visibility on both sides of the border may create opportunities for

  14. Armenia, Azerbaijan, and Georgia: Security Issues and Implications for U.S. Interests

    Science.gov (United States)

    2010-03-11

    reaction border forces. The Georgian Border Police responded that there were no terrorists in the Gorge and retorted that “the Russian side has never...106 N.Bogdanova, “Azerbaijan, U.S. Develop Package of Proposals During Security Dialogue,” Trend News, November 5, 2009...Georgia since the August [2008] conflict. No part of the $1 billion U.S. assistance package went to the Ministry of Defense.”129 In addition, no FMF

  15. Strategic Implications of the Evolving Shanghai Cooperation Organization

    Science.gov (United States)

    2014-08-01

    SCO information superhighway” (of which no details have yet been publicly re- leased) and to establish secure electronic cross- border links. • The...most powerful tool, an international terrorism intelligence sharing database. As well as collection from online, electronic , and print media, the...effective system to address global challenges and threats. 28 • Preparing and conducting scientific conferenc - es and seminars, and promoting the

  16. Computer security incident response team effectiveness : A needs assessment

    NARCIS (Netherlands)

    Kleij, R. van der; Kleinhuis, G.; Young, H.J.

    2017-01-01

    Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad-hoc basis, in close cooperation with other teams, and in

  17. SECURITY EDUCATION IN AFRICA: PATTERNS AND PROSPECTS

    African Journals Online (AJOL)

    Esterhuyse

    simple as teaching small arms safety to recruits includes all three elements, where the repetitive drill is ... the capacity to provide higher education as the Bologna process defines it: is a police academy or staff .... Formed police units for crowd control or border security may be part of the ...... other settings (Brazil and Indonesia).

  18. Some of the results of the protection measures in the field of ionizing radiation at FRY border crossings

    International Nuclear Information System (INIS)

    Benderac, R.; Kokotovic, J.; Kolundzija, V.

    2002-01-01

    Full text: SUMMARY: The paper describes some of the results of the protection measures in the field of ionizing radiation at FRY border crossings where there were placed stationary monitors of gamma-radiation. The Institute of Security as licensed institution for ionizing radiation detection, designed and placed stationary devices MZ - 100 at border crossings check points named Kelebija, Horgos, Vatin, Gradina, Presevo, Djeneral Jankovic, Batrovci and the ship lock 'Djerdap-I'. CONCLUSION: Over the several years ago IAEA and its member states as well as other international organizations have become increasingly aware of the consequences which might result from illegal activities involving these materials. Therefore initiatives to strengthen physical protection regime are strongly supported and steps towards improving security of nuclear and other radioactive material have already been taken. Yugoslavia as IAEA member state wishes to contribute to the all together efforts in reducing the possibility of illegal activities such as theft, sabotage and trafficking, involving nuclear materials and other radioactive materials, and on the associated proliferation threat and radiation risks. Therefore relevant national bodies prepare project proposal titled 'PREVENTION OF ILLICIT TRAFFICKING IN NUCLEAR AND RADIOACTIVE MATERIALS IN THE FEDERAL REPUBLIC OF YUGOSLAVIA'. Significant work is ahead in this field, since harmonization of radiological control at our border crossings must be achieved. (author)

  19. 77 FR 76504 - Notice of Meeting of the Advisory Committee on Commercial Operations of Customs and Border...

    Science.gov (United States)

    2012-12-28

    ... its business. Registration: If you plan on attending, please register either online at https://apps...-of-business on January 11, 2013. If you have completed an online on-site registration and wish to... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection [Docket No. USCBP-2012-0046...

  20. Mutual Trust and Cross-Border Enforcement of Judgments in Civil Matters in the EU: Does the Step-by-Step Approach Work?

    NARCIS (Netherlands)

    Zilinsky, M.

    2017-01-01

    Mutual trust is one of the cornerstones of cooperation in the field of European Union private international law. Based on this principle the rules on the cross-border recognition and enforcement of judgments in the European Union are still subject to simplification. The step-by-step approach of the

  1. Security Sector Reform’s Utility in Conflict Prevention

    Science.gov (United States)

    2013-12-10

    Publications, 1994), 18. 40 Many of these countries in Africa are states in name only due to ill defined borders, fiscal limitations, nomadic ...Security Watch, 12 OCT 2009), Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013]. 85...ISN Security Watch, 12 OCT 2009. Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013

  2. International cooperation in the solution to trade-related invasive species risks.

    Science.gov (United States)

    Perrings, Charles; Burgiel, Stas; Lonsdale, Mark; Mooney, Harold; Williamson, Mark

    2010-05-01

    In this paper, we consider the factors behind the growth of invasive species as a global problem, and the scope for international cooperation and coordination in addressing that problem. This is limited by the terms of the various international agreements governing trade, health, and biodiversity. The default strategy in most cases has two parts: border protection and the control of or adaptation to introduced species that have escaped detection at the border. Most invasive species policy involves unilateral national defensive action as opposed to coordinated international action. We argue that an important part of the solution to the problem lies in global coordination and cooperation in the management of both pathways and sanitary and phytosanitary risks at all scales. More particularly, because invasive species are an externality of trade, transport, and travel that involve public goods, they require collective regulation of international markets that goes beyond that admitted under the World Trade Organization's (WTO) Agreement on the Application of Sanitary and Phytosanitary Measures. We argue that it is important to bring that agreement into conformity with the International Health Regulations (IHR), and to develop an international mechanism to generate and disseminate information on invasive species risks and their impacts.

  3. United States-Gulf Cooperation Council Security Cooperation in a Multipolar World

    Science.gov (United States)

    2014-10-01

    in U.S.-forged security alliances . Finally, the events of the Arab Spring beginning in 2010, which swept away several governments and have led to...wealthiest countries on a per capita basis. Storming ahead with post-modern skylines, and rapidly growing nonoil sectors such as tourism , culture, real...estate, and finance, many GCC members are now economic political brands in their own right, ranging from Dubai’s metropolism to Qatar’s knowledge

  4. US-French nuclear cooperation: its past, present and future

    International Nuclear Information System (INIS)

    Lewis, Jeffrey; Tertrais, Bruno

    2015-10-01

    It is now a matter of public record that France and the United States conducted in-depth cooperation on ballistic missiles and, later, on nuclear weapons safety and security starting with the Nixon and Pompidou Administrations. The existence of a deep France-US strategic nuclear cooperation exists as a historical counter-narrative to the notion of France as a fully independent nuclear power, but also as a reluctant US strategic partner. Today, both countries conceive of their interests globally, and share similar outlooks regarding strategic challenges from countries such as Russia, China, Pakistan, Iran and North Korea. The United States and France have worked particularly closely in the P5+1 context to reach a diplomatic solution to Iran's growing nuclear capabilities. As permanent members of the United Nations Security Council, they are key partners on crisis management, regarding Libya, Syria, or Ukraine. Cooperation on counter-terrorism has been stepped up since the events of January 2015 in France. The two countries cooperate closely in Sahel and in Iraq. This short briefing provides new information on past nuclear cooperation and seeks to address the following question: given the existence of deep US-UK and UK-French nuclear ties, would enhanced US-French cooperation - the 'third side of the triangle' - be useful either strategically, in terms of enhancing the stability of deterrence, or financially? (authors)

  5. Security in transnational interoperable PPDR communications: Threats and requirements

    NARCIS (Netherlands)

    Ferrús, R.; Sallent, O.; Verkoelen, C.; Fransen, F.; Saijonmaa, J.; Olivieri, C.; Duits, M.; Galin, A.; Pangallo, F.; Modi, D.P.

    2015-01-01

    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery

  6. Why Border Enforcement Backfired.

    Science.gov (United States)

    Massey, Douglas S; Durand, Jorge; Pren, Karen A

    2016-03-01

    In this article we undertake a systematic analysis of why border enforcement backfired as a strategy of immigration control in the United States. We argue theoretically that border enforcement emerged as a policy response to a moral panic about the perceived threat of Latino immigration to the United States propounded by self-interested bureaucrats, politicians, and pundits who sought to mobilize political and material resources for their own benefit. The end result was a self-perpetuating cycle of rising enforcement and increased apprehensions that resulted in the militarization of the border in a way that was disconnected from the actual size of the undocumented flow. Using an instrumental variable approach, we show how border militarization affected the behavior of unauthorized migrants and border outcomes to transform undocumented Mexican migration from a circular flow of male workers going to three states into an eleven-million person population of settled families living in 50 states.

  7. International Issues, High-Stakes Testing, and Border Pedagogy: Social Studies at Border High School

    Science.gov (United States)

    Cashman, Timothy G.; McDermott, Benjamin R.

    2013-01-01

    A recently constructed border wall stands within walking distance of Border High School (BHS) and was created to impede the flow of people, goods, fauna, and contraband from Mexico into the United States (U.S.). The reality, however, is that this geopolitical border is fluid, allowing connections between sociopolitical zones. The researchers…

  8. Cross-border shopping and tourism destination marketing

    DEFF Research Database (Denmark)

    Makkonen, Teemu

    2016-01-01

    This article addresses the economic impact that cross-border shopping has on the local tourism industry and the ways that cross-border shopping is taken advantage of in tourism destination marketing. Southern Jutland–situated in Denmark just north of the German border, where border shops situated......-border shopping into tourism destination marketing strategies. The results have wider relevance for other border regions.......This article addresses the economic impact that cross-border shopping has on the local tourism industry and the ways that cross-border shopping is taken advantage of in tourism destination marketing. Southern Jutland–situated in Denmark just north of the German border, where border shops situated...... just south of the same border enable Danes to capitalize on the lower value added tax levels in Germany–is utilized as an illustrative case example. The data was collected by analysing the relevant tourism destination marketing material and via interviews with local destination marketing organizations...

  9. Border mythology: Turner and modernity

    Directory of Open Access Journals (Sweden)

    Jorge E. Brenna B.

    2011-07-01

    Full Text Available Modernity has been creating spaces, new boundaries and borders, as metaphysical, mythological and symbolic marks of physical and imaginary territories. Modern space and its borders are metaphors, boundaries that are created, walls that rise to identify with some and categorize others. In this short paper we want to approach the problem of the transformation of the idea of border (geographical, cultural, symbolic, etc., for a reflection on the transformations of that civilized obsession called border. The border has always been a reference in facing the identities, names, symbols, different imaginary: it is more confrontational line between two otherness. From the previous framework, we reflect on Turnerian mythology, as we believe that behind the creation of the imagination of the northern border is the mythical vision of the American frontier as ideological canon that explains and confirms the presence of the white race in a border re–made in the image and likeness of the “American Dream”. Frederick Turner’s reflection on the role of the frontier in American history is not only the study of the importance of progress towards the West but –even more so, is the analysis of meaning that had the American frontier as a historical process that ended in 1893, as Turner said, but rather extended into the twentieth century and continues to constantly shaping the process of territorialization of the border.

  10. Border trees of complex networks

    International Nuclear Information System (INIS)

    Villas Boas, Paulino R; Rodrigues, Francisco A; Travieso, Gonzalo; Fontoura Costa, Luciano da

    2008-01-01

    The comprehensive characterization of the structure of complex networks is essential to understand the dynamical processes which guide their evolution. The discovery of the scale-free distribution and the small-world properties of real networks were fundamental to stimulate more realistic models and to understand important dynamical processes related to network growth. However, the properties of the network borders (nodes with degree equal to 1), one of its most fragile parts, remained little investigated and understood. The border nodes may be involved in the evolution of structures such as geographical networks. Here we analyze the border trees of complex networks, which are defined as the subgraphs without cycles connected to the remainder of the network (containing cycles) and terminating into border nodes. In addition to describing an algorithm for identification of such tree subgraphs, we also consider how their topological properties can be quantified in terms of their depth and number of leaves. We investigate the properties of border trees for several theoretical models as well as real-world networks. Among the obtained results, we found that more than half of the nodes of some real-world networks belong to the border trees. A power-law with cut-off was observed for the distribution of the depth and number of leaves of the border trees. An analysis of the local role of the nodes in the border trees was also performed

  11. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  12. U.S.A./Mexico Adult Literacy Project: Educacion sin Fronteras/Education without Borders. Final Report, January 1, 1993 - September 30, 1993.

    Science.gov (United States)

    Hacienda La Puente Unified School District, City of Industry, CA.

    A cooperative literacy education program involving Mexico and the United States' border states is documented. The project has three objectives: to (1) implement the Mexican literacy agency's approach to promoting literacy among native Spanish speakers; (2) coordinate U.S./Mexico literacy task force activities; and (3) develop an immigrants' rights…

  13. Hmong Across Borders or Borders Across Hmong? Social and Political Influences Upon Hmong People

    Directory of Open Access Journals (Sweden)

    Prasit Leepreecha

    2014-12-01

    Full Text Available The Hmong are a transnational ethnic people, because of their dispersal from China into Southeast Asia in the early 19th century and from Southeast Asia to Western countries from 1975 onward. However, even within the context of Southeast Asia and southern China, the Hmong are a transnational ethnic group, due to state boundaries and the enforcement of international laws.Scholars speak as though the Hmong population has crossed political and legal borders by their movement across state boundaries and international borders. However, I argue that it is the political, social, and legal borders that have cut across the Hmong people and subjected them to be citizens of different modern nation-states. Even in the present time, these borders still, and continuously, play important roles that cross and divide the Hmong people into distinctive subgroups and fragments. In this article, I will start by describing the generally understood situation of Hmong being across national borders, and then will explain my argument that borders are across the Hmong.

  14. Example of a single national regulator responsible for both transport safety and security

    International Nuclear Information System (INIS)

    Karhu, P.; Lahkola, A.; Markkanen, M.; Hellstén, S.

    2016-01-01

    Safety and security in the use of nuclear energy and in the use of radiation, including the transport of nuclear and other radioactive material, share a common objective: to protect people, society, environment, and future generations from the harmful effects of ionizing radiation. Some measures for safety contribute to those for security, and vice versa, while some requirements of one conflict with those of the other. The differences in the requirements arise from the difference in the threat against which the measures are designed: accident vs. intent. A coordinated approach endeavours to take advantage of the similarities and to avoid the problems caused by the differences. One way to implement it is to have one competent authority responsible for the regulatory control of safety and security. It is the experience in Finland that this enables an efficient regulatory system. From the operators’ point of view, a one-stop shop regulatory authority ensures that requirements for safety and security are consistent. Both safety and security require the involvement of and cooperation between several authorities—regulatory, rescue, law enforcement—and operators. The approach in Finland is built on cooperation and a clear division of competences and responsibilities. One regulatory authority provides a fixed point of contact within the professional cooperation network as well as for the public. The one regulatory authority is also easily identifiable, as appropriate, as a point of contact in international cooperation in implementing nuclear and radiation safety and security. Whatever the national regulatory framework and the assignment of responsibilities between authorities, cooperation is essential in house, nationally, and internationally. (author)

  15. Structuring Cooperative Nuclear RIsk Reduction Initiatives with China.

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Larry [Stanford Univ., CA (United States); Reinhardt, Jason Christian [Stanford Univ., CA (United States); Hecker, Siegfried [Stanford Univ., CA (United States)

    2017-03-01

    The Stanford Center for International Security and Cooperation engaged several Chinese nuclear organizations in cooperative research that focused on responses to radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas. Initiatives were identified in three primary research areas: 1) detection and interdiction of smuggled nuclear materials; 2) nuclear forensics; and 3) radiological (“dirty bomb”) threats and countermeasures. Initial work emphasized the application of systems and risk analysis tools, which proved effective in structuring the collaborations. The extensive engagements between national security nuclear experts in China and the U.S. during the research strengthened professional relationships between these important communities.

  16. The Migrant Border Crossing Study: A methodological overview of research along the Sonora-Arizona border.

    Science.gov (United States)

    Martínez, Daniel E; Slack, Jeremy; Beyerlein, Kraig; Vandervoet, Prescott; Klingman, Kristin; Molina, Paola; Manning, Shiras; Burham, Melissa; Walzak, Kylie; Valencia, Kristen; Gamboa, Lorenzo

    2017-07-01

    Increased border enforcement efforts have redistributed unauthorized Mexican migration to the United States (US) away from traditional points of crossing, such as San Diego and El Paso, and into more remote areas along the US-Mexico border, including southern Arizona. Yet relatively little quantitative scholarly work exists examining Mexican migrants' crossing, apprehension, and repatriation experiences in southern Arizona. We contend that if scholars truly want to understand the experiences of unauthorized migrants in transit, such migrants should be interviewed either at the border after being removed from the US, or during their trajectories across the border, or both. This paper provides a methodological overview of the Migrant Border Crossing Study (MBCS), a unique data source on Mexican migrants who attempted an unauthorized crossing along the Sonora-Arizona border, were apprehended, and repatriated to Nogales, Sonora in 2007-09. We also discuss substantive and theoretical contributions of the MBCS.

  17. Straddling the border

    DEFF Research Database (Denmark)

    Eilenberg, Michael

    2011-01-01

    border between the Indonesian province of West Kalimantan and the Malaysian state of Sarawak on the island of Borneo. Based on local narratives, the aim of this paper is to unravel the little known history of how the Iban segment of the border population in West Kalimantan became entangled in the highly...

  18. Border Crossing/Entry Data

    Data.gov (United States)

    Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...

  19. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  20. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    Science.gov (United States)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.