WorldWideScience

Sample records for cooperative border security

  1. Cooperative Monitoring Center Occasional Paper/7: A Generic Model for Cooperative Border Security

    Energy Technology Data Exchange (ETDEWEB)

    Netzer, Colonel Gideon

    1999-03-01

    This paper presents a generic model for dealing with security problems along borders between countries. It presents descriptions and characteristics of various borders and identifies the threats to border security, while emphasizing cooperative monitoring solutions.

  2. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options

    Energy Technology Data Exchange (ETDEWEB)

    Qojas, M.

    1999-03-01

    This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

  3. Cross-border innovation cooperation

    DEFF Research Database (Denmark)

    Hjaltadóttir, Rannveig Edda; Makkonen, Teemu; Sørensen, Nils Karl

    2017-01-01

    Finding a suitable partner is paramount for the success of innovation cooperation. Thus, this paper sets out to analyse the determinants of cross-border innovation cooperation in Denmark by focusing on partner selection. The aim of the article is to investigate determinants of partner selection...... by taking the location of the partners into account. In particular, the discussion is tied to the notion of varying knowledge bases firms utilize in their innovation creation processes. Firm level data from the 2010 Community Innovation Survey in Denmark was utilized to analyse cross-border innovation...... of innovativeness increase the likelihood of cross-border innovation cooperation. Accordingly, geographical proximity to international borders is found to have a significant, positive effect on selecting partners within the European Union. The multivariate probit model shows that the decision of choosing a domestic...

  4. Securing the Borders: Creation of the Border Patrol Auxiliary

    Science.gov (United States)

    2007-05-05

    DATES COVERED 00-00-2007 to 00-00-2007 4. TITLE AND SUBTITLE Securing the Borders: Creation of the Border Patrol Auxillary 5a. CONTRACT NUMBER...Substantial work experience which demonstrates an ability to (1) take charge, make sound decisions , and maintain composure in stressful situations; (2...applicable laws, court decisions , and law enforcement procedures; and 4. Develop and maintain contact with the network of informants. ¾ To qualify at

  5. Border Security: Barriers Along the U.S. International Border

    Science.gov (United States)

    2006-10-30

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL33659 Border Security...Presidencia,” May 12, 2005. Translation by CRS. Available at [http://www.presidencia.gob.mx/actividades/crecimiento/?contenido=18195& pagina =31]. Last

  6. Food security in a world without borders.

    Science.gov (United States)

    de Haen, Hartwig; Thompson, Brian

    2003-01-01

    is through community nutrition programmes that encourage the full participation and co-operation of the entire community, maximise the utilisation of local resources, grasp the benefits of new technologies for productivity gains, involve multiple sectors and engage strong political commitment. The international community will be judged by its treatment of its most vulnerable members. The international community has repeatedly declared that it is dedicated to the eradication of poverty. Eliminating hunger and malnutrition is a vital first step. The political will to fight hunger and a firm commitment to invest in agriculture' and rural development are critical elements in any effort to achieve sustainable alleviation of hunger and poverty. This meeting and the WFS:FYL provide the additional impetus to meet the challenge of achieving food and nutritional security in a world without borders and free from hunger and malnutrition.

  7. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  8. Border Security -- One Step Toward Resolving the Conflict in Iraq

    National Research Council Canada - National Science Library

    Bennett, Mark S

    2005-01-01

    .... It will do this by proving that border security is a key component to suppressing the Iraqi insurgency and that border security operations have been hindered by a lack of interagency coordination...

  9. INFORMATION SECURITY IN LOGISTICS COOPERATION

    Directory of Open Access Journals (Sweden)

    Tomasz Małkus

    2015-03-01

    Full Text Available Cooperation of suppliers of raw materials, semi-finished products, finished products, wholesalers, retailers in the form of the supply chain, as well as outsourcing of specialized logistics service require ensuring adequate support of information. It concerns the use of appropriate computer tools. The security of information in such conditions of collaboration becomes the important problem for parties of contract. The objective of the paper is to characterize main issues relating to security of information in logistics cooperation.

  10. Nuclear Security in Action at Malaysian Borders

    International Nuclear Information System (INIS)

    Dahlstrom Danielle

    2013-01-01

    ''For Malaysia, trade has to be a transparent'', explained Raja Adnan, the Director General of the Malaysian Atomic Energy Licensing Board (AELB). ''Goods are imported and exported, not just between two countries, but are in transit between several countries. Nuclear security measures help to guarantee open trade and makes sure that everyone is trading responsibly,'' emphasized Adnan. Officials from AELB prepare for a joint Indonesian-Malaysian exercise in effective border control by reviewing their national standard operating procedures (SOPs) on nuclear security, which were developed in close coordination with the IAEA

  11. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    on Integrated Management of Nuclear Materials to introduce modern technology development on nuclear safeguards, material accounting and control, and physical protection in October 2005. After the Tech Demo, a series of cooperation projects on nuclear safeguards and security were developed. To support the security of 2008 Beijing Summer Olympic Games, China Atomic Energy Authority (CAEA), worked with IAEA and the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA), carried out trainings for the officials from public security, border control and customs, etc. for strengthening the response capabilities to the Major Public Events (MPEs) and implemented physical security upgrades and radioactive sources recovery at facilities near Olympic venues. As a partner state of the Global Initiative to Combat Nuclear Terrorism, China organized a scenario-based workshop on radioactive detection and emergency response in cooperation with U.S. in December 2007, more than 60 Participants from 20 more countries participated the workshop. To strengthen the training capability on nuclear safeguards and security, CAEA and the IAEA jointly established a 'CAEA-IAEA Joint Training Center on Nuclear Safeguards and Security' in December 2006, located at China Institute of Atomic Energy (CIAE). International Cooperation is a very important element in developing global nuclear security regime. China is willing to make continuous efforts to promoting the development of nuclear security through international cooperation. (author)

  12. Border Security: Immigration Issues in the 108th Congress

    National Research Council Canada - National Science Library

    Seghetti, Lisa M

    2004-01-01

    .... Prior to the terrorist attacks, the priorities for border security policy were beginning to shift from immigration-related issues to issues related to facilitating legitimate cross-border commerce...

  13. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  14. Border Security: Barriers Along the U.S. International Border

    Science.gov (United States)

    2009-03-16

    1980). 120 Mexican Government Press Release, “Crecimiento con Calidad: El Presidente Vicente Fox encabezará la cena de gala de la XI Cumbre Anual...and Roads at Various Project Areas Located in California, Arizona, New Mexico , and Texas...Diego Border Primary Fence The USBP’s San Diego sector extends along the first 66 miles from the Pacific Ocean of the international border with Mexico

  15. The tension between cross-border cooperation in the European Area of Freedom, Security and Justice and the fundamental rights of mentally ill offenders in detention.

    Science.gov (United States)

    Meysman, Michaël

    2016-01-01

    In two recent judgements, the European Court of Human Rights (ECtHR) has given an alarming signal regarding the placement, care and treatment of mentally disordered offenders in Belgium. This article analyses these judgements and the Court's assessment that Belgium faces a structural problem regarding the detention of people with a mental illness in prison. By exploring other recent ECtHR decisions across the EU and combining this with an analysis of international norms and standards, it contends that there is something amiss regarding the post-trial approach towards mentally disordered offenders in an EU-wide context. The potential hazards of this situation, from both an individual and an EU perspective are then presented by analysing the EU Framework Decision on the transfer of prisoners (which aims to facilitate offender rehabilitation) and the EU Court of Justice's interpretation of the relationship between instruments like the Framework Decision that are based on mutual recognition and fundamental rights. Lastly, the EU's initiative for enhancing procedural rights in criminal proceedings through the Roadmap trajectory, and the subsequent Commission Recommendation of 27 November 2013, are scrutinized. Based on this research, the article pinpoints the flaws and vacuums that currently exist for mentally disordered offenders, and the negative outcome this may have on the legitimacy and effectiveness of the European Area of Freedom, Security and Justice. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Cross-border cooperation potential in fostering redevelopment of degraded border areas - a case study approach.

    Science.gov (United States)

    Alexandre Castanho, Rui; Ramírez, Beatriz; Loures, Luis; Fernández-Pozo, Luis; Cabezas, José

    2017-04-01

    Border interactions have reached unprecedented levels in recent decades, not only due to their potential for territorial integration but also considering their role in supranational processes, such as landscape reclamation, infrastructure development and land use planning on European territory. In this scenario, successful examples related to the redevelopment of degraded areas have been showing positive impacts at several levels, such as the social, economic, environmental and aesthetic ones which have ultimately related this process, positively, to sustainability issues. However, concerning to border areas, and due to their inherent legislative and bureaucratic conflicts, the intervention in these areas is more complex. Still, and taking into account previously developed projects and strategies of cross-border cooperation (CBC) in European territory it is possible to identified that the definition of common master plans and common objectives are critical issues to achieve the desired territorial success. Additionally, recent studies have put forward some noteworthy ideas highlighting that it is possible to establish a positive correlation between CBC processes and an increasing redevelopment of degraded border areas, with special focus on the reclamation of derelict landscapes fostering soil reuse and redevelopment. The present research, throughout case study analysis at the Mediterranean level - considering case studies from Portugal, Spain, Monaco and Italy - which presents specific data on border landscape redevelopment, enables us to conclude that CBC processes have a positive influence on the potential redevelopment of degraded border areas, considering not only urban but also rural land. Furthermore, this paper presents data obtained through a public participation process which highlights that these areas present a greater potential for landscape reclamation, fostering resource sustainability and sustainable growth. Keywords: Spatial planning; Land

  17. MATRIX FOR COOPERATION IN THE CROSS-BORDER AREAS

    Directory of Open Access Journals (Sweden)

    Marcela ȘLUSARCIUC

    2014-06-01

    Full Text Available The crossborder areas have no constitutional competences, therefore most of the times they are not part of the decision making process in the agreements in cross-border relationships. Although the states are the ones to decide the policies and the agreements based on their own legal rules, considering the shape of the new European Union, they should more and more accept the conditionality of a regional overstate structure linked only to some geographical parts of the countries. The present paper proposes a theoretical and intuitive frame for assessing the cross-border areas based on the factors that are influencing it, starting from a listing of them, secondly grouping them in separating and uniting, then finding the significant differences. The matrix of factors can be used for conflict resolution or for development of cross-border areas as long as it shows the points that will be a potential obstacle or a source for cooperation.

  18. Nuclear security at Zimbabwe’s borders

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2016-01-01

    Enhancing detection capabilities at the Victoria Falls border crossing provides confidence to people visiting Zimbabwe that measures are in place to prevent disruption caused by radioactive materials and helps to protect the local environment.

  19. Experiences in Regional Cross Border Co-operation in River Management. Comparing Three Cases at the Dutch–German Border

    NARCIS (Netherlands)

    Wiering, M.A.; Verwijmeren, J.A.; Lulofs, K.; Feld, C.

    2010-01-01

    Cross border co-operation is increasingly viewed as an obvious and logical consequence of an integrated perspective on river management. Consequently, we would expect an increase of cross border co-operation and collaboration in EU member states, through joint planning, co-management or

  20. Sustainable Planning of Cross-Border Cooperation: A Strategy for Alliances in Border Cities

    Directory of Open Access Journals (Sweden)

    Joanna Kurowska-Pysz

    2018-05-01

    Full Text Available In recent years, cooperation among nations has become a critical issue towards sustainable development of neighbor cities in border areas. In this regard, sustainable common planning approaches and policies are an increasing reality, particularly in European territories. Considering the significant amount of cross-border cooperation (CBC projects and strategies within Europe, it is crucial to promote research approaches that are able to identify the most positive approaches towards the establishment of alliances in border territories, serving as pivotal methodologies for achieving success. Contextually, the present study considered direct and indirect research methods and tools, literature reviews, data collection, computer-assisted telephone interviewing (CATI and computer-assisted web interview (CAWI, all applied over two European border cities: Cieszyn (Poland and Cesky Tesin (Czech Republic. These methods enabled the assembly of perspectives of local authorities, public and private institutions, non-governmental organizations, and entrepreneurs from the cities under study. Through the analysis of the collected data, five conditions have been identified for the success of strategic alliances in CBC projects: (i well defining the alliance goals; (ii ensuring participation in the alliance of various groups of stakeholders; (iii involvement of both partners with extensive experience in CBC; (iv ensuring the coherence of the key objective; and (v guaranteeing the alliance benefits both sides. These conditions might effectively contribute to achieve more successful outputs in CBC projects, highlighting the relevance of previously developed strategies on the definition of future approaches.

  1. Border Protection and National Security of Mongolia

    Science.gov (United States)

    2006-09-01

    simple acts, such as a cartographer labeling an island “Turkish” instead of “ Greek ,” have triggered the mobilization of armed forces on both sides as...been replaced with marble columns that are guaranteed to last for a century. Parts of the state borders in some directions have been negotiated and

  2. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  3. Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?

    Science.gov (United States)

    Linnell, John D. C.; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Kusak, Josip; Skrbinsek, Tomaz; Buuveibaatar, Bayarbaatar; Bischof, Richard; Breitenmoser, Urs

    2016-01-01

    The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures. PMID:27331878

  4. Border Security Fencing and Wildlife: The End of the Transboundary Paradigm in Eurasia?

    Science.gov (United States)

    Linnell, John D C; Trouwborst, Arie; Boitani, Luigi; Kaczensky, Petra; Huber, Djuro; Reljic, Slaven; Kusak, Josip; Majic, Aleksandra; Skrbinsek, Tomaz; Potocnik, Hubert; Hayward, Matt W; Milner-Gulland, E J; Buuveibaatar, Bayarbaatar; Olson, Kirk A; Badamjav, Lkhagvasuren; Bischof, Richard; Zuther, Steffen; Breitenmoser, Urs

    2016-06-01

    The ongoing refugee crisis in Europe has seen many countries rush to construct border security fencing to divert or control the flow of people. This follows a trend of border fence construction across Eurasia during the post-9/11 era. This development has gone largely unnoticed by conservation biologists during an era in which, ironically, transboundary cooperation has emerged as a conservation paradigm. These fences represent a major threat to wildlife because they can cause mortality, obstruct access to seasonally important resources, and reduce effective population size. We summarise the extent of the issue and propose concrete mitigation measures.

  5. Expeditionary Border Security Operations: Eliminating the Seams

    National Research Council Canada - National Science Library

    Zinno, Michael J

    2008-01-01

    .... This convergence greatly expands the scope and capability of each individual terrorist or criminal organization and the cumulative effect can overwhelm the security forces of many nations and provide...

  6. Concepts and Practices of Cooperative Security

    DEFF Research Database (Denmark)

    Keating, Vincent; Wheeler, Nicholas J

    2013-01-01

    This chapter considers how the security dilemma can be overcome in ways that promote cooperation and even trust, mitigating or transcending the international uncertainty that can otherwise inhibit interstate cooperation. It argues that there are two mechanisms to create the trust necessary...... for the development of a security community, Charles Osgood's GRIT strategy and a unilateral 'leap of trust.' Both of these, however, initially require elites to develop security dilemma sensibility. The long-term stability of security communities is fundamentally linked to the presence of embedded trust among...

  7. Sustainable rural development and cross-border cooperation

    Directory of Open Access Journals (Sweden)

    Stojanović Žaklina

    2009-01-01

    Full Text Available The concept of sustainable rural development comprises three aspects - social, economical and ecological. They are supposed to act in synergy, but, at the same time, these aspects are supposed to be competitive. Agriculture, as a traditional activity of rural economy, contributes to the sustainable development of rural areas only if there is an adequate resources management. If not, there will be a significant degradation of rural environment. These are the reasons why sustainable agriculture development is emphasized since it maximizes productivity and minimizes negative effects on nature and human resources. In this context, one should observe the connection between agriculture and tourism existing in the EU, where the application of sustainable agricultural development concept produces external effects connected to biodiversity protection and environment in rural areas. These become a good foundation for the development of rural and ecotourism. EU enlargement induced diversification of support programmes that EU gives to the candidate countries, as well as to those who are just entering the process of stabilization and association to the EU. Through cross-border cooperation projects, many goals can be accomplished, among which aspiration for promotion of sustainable economical and social development in border regions is one of the leading. Knowing that these regions are usually passive and underdeveloped, the projects of cross-border cooperation could induce development of those activities in local economy, which could bring better living conditions and economic prosperity on the one hand, and protection of environment on the other. Examples of this kind of projects in Serbia can usually be found in rural and ecotourism development.

  8. The new strategic balance and cooperative security

    International Nuclear Information System (INIS)

    Simpson, J.

    1995-01-01

    The new strategic balance and cooperative security in the world now is discussed including the following issues: strategic balances and the features of the old strategic environment; the main characteristics of the new political and security environment; the future role of nuclear weapons; the role of arms limitation agreements

  9. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  10. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  11. The Analysis of the Determinants of Sustainable Cross-Border Cooperation and Recommendations on Its Harmonization

    Directory of Open Access Journals (Sweden)

    Joanna Kurowska-Pysz

    2017-12-01

    Full Text Available Cross-border partnerships are a distinctive example of inter-organizational cooperation, embedded, in terms of territory, in the neighboring borderland regions of two or more countries. The aim of this paper is to identify factors that contribute to the sustainable cross-border cooperation and affect motivation to increase cooperation between cross-border partners. The objective implementation is connected with the verification of a hypothesis referring to the possible impact of the European Union funds on the trans-boundary cooperation transformations. Results of desk research and quantitative research involving IDI, CATI, CAWI and CATI and PAPI data collection methods, implemented in the Polish–Czech borderland in 2016 were used in this paper. Research on the Polish–Lithuanian borderland was also used in the paper to conduct comparative analysis, useful to identify and evaluate factors motivating sustainable cross-border cooperation in the Czech–Polish borderland. The sustainable, cross-border and inter-organizational cooperation in the borderlands results from the simultaneous interaction of three groups of factors: (1 people and institutions (the quality of interpersonal relationships; (2 cross-border planning, procedures and support mechanisms (e.g., the possibility of jointly planning the cross-border cooperation and obtaining EU funds for the development of the borderlands as well as the availability of other funds helpful in this kind of cooperation; and (3 environment (historical affinity and geographical proximity of neighboring border regions, system support at the regional and local level in neighboring countries.

  12. Cooperative Monitoring Center Occasional Paper/13: Cooperative monitoring for confidence building: A case study of the Sino-Indian border areas

    Energy Technology Data Exchange (ETDEWEB)

    SIDHU,WAHEGURU PAL SINGH; YUAN,JING-DONG; BIRINGER,KENT L.

    1999-08-01

    This occasional paper identifies applicable cooperative monitoring techniques and develops models for possible application in the context of the border between China and India. The 1993 and 1996 Sino-Indian agreements on maintaining peace and tranquility along the Line of Actual Control (LAC) and establishing certain confidence building measures (CBMs), including force reductions and limitation on military exercises along their common border, are used to examine the application of technically based cooperative monitoring in both strengthening the existing terms of the agreements and also enhancing trust. The paper also aims to further the understanding of how and under what conditions technology-based tools can assist in implementing existing agreements on arms control and confidence building. The authors explore how cooperative monitoring techniques can facilitate effective implementation of arms control agreements and CBMS between states and contribute to greater security and stability in bilateral, regional, and global contexts.

  13. Measuring the Effectiveness of Border Security Between Ports of Entry

    Science.gov (United States)

    2010-01-01

    ts of migration. Massey, Durand, and Malone (2003) argue that neoclassical theory has limited explanatory power and, in fact, that immigration is...interpreted in the context of dif- ferent theories of how and why immigration occurs. Various theories explain immigration— for example, as a migrant’s...Durand, and Malone, 2003). One theory of how border security aff ects migration is that migrants employ a cost-benefi t calculation when deciding

  14. Study on the Flexibility in Cross-Border Water Resources Cooperation Governance

    Science.gov (United States)

    Liu, Zongrui; Wang, Teng; Zhou, Li

    2018-02-01

    Flexible strategy is very important to cross-border cooperation in international rivers water resources, which may be employed to reconcile contradictions and ease conflicts. Flexible characters of cross-border cooperation in international rivers water resources could be analyzed and revealed, using flexible strategic management framework, by taking international cooperation protocols related to water from Transboundary Freshwater Disputes Database (TFDD) as samples from the number of cooperation issues, the amount of management layers and regulator agencies in cooperation organization and the categories of income (cost) distribution (allocation) mode. The research demonstrates that there are some flexible features of cross-border cooperation in international rivers water resources: Riparian countries would select relative diversification strategies related to water, tend to construct a flexible cooperation organization featured with moderate hierarchies from vertical perspective and simplified administrations from horizontal perspective, and adopt selective inducement modes to respect ‘joint and several liability’.

  15. Improving food security empowerment in Indonesia- Timor Leste border

    Science.gov (United States)

    Dewi, G. D. P.; Yustikaningrum, R. V.

    2018-03-01

    Post Referendum 1999, Indonesia and Timor Leste have a strategic challenge to provide food consistently around the border. This research intended to discover an appropriate strategy to tackle fragility of food security in the land border of Indonesia-Timor Leste, to improve collaborative actions between parties, as well as, opportunity to actualize food cross-border trading between local farmers and factories. For the result, there are two approaches will be applied. First, the empowerment term refers to the strategy of empowerment in strengthening the capability and capacity of human capital as one of the determinant factors of the resilience and self-sufficiency achievement. Second, the gender approach looks at the women and men build confidence, resilience, and independence which one of them through an educational intervention that enable the local people to manage food chain. Atambua is a region count as relatively as high poverty, poor human capital, weak quality and competitiveness of agriculture products, livestock and fishery, SMEs, and infrastructure. Thus, field study research is applied to find the actual and strategic effort aim to lead the achievement of food security and to engage Atambua over food trade to Timor Leste.

  16. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  17. Cross-border Co-operation and Policy Networks in West Africa

    DEFF Research Database (Denmark)

    Trémolières, Marie; Walther, Olivier

    This publication examines how policy actors involved in cross-border co-operation contribute to the regional integration process in West Africa. It uses a pioneering methodology, known as social network analysis, to visualise the formal and informal relationships between actors involved in cross...... West Africa to develop cross-border initiatives in a number of ways. Combining these two analyses with the perceptions of regional policy makers as to which border areas they consider as priorities for regional integration, the publication concludes with the analytical foundations for more effective......-border policy networks, showing that borders have notable and diverse impacts on exchanges of information and the relative power of networks. The report then analyses a range of regional indicators of co-operation potential, visually demonstrating that borders can also affect the ability of sub-regions within...

  18. Defense Security Cooperation Agency Vision 2020. Update 1

    Science.gov (United States)

    2015-10-01

    the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers

  19. Securing cooperation from persons supplying statistical data.

    Science.gov (United States)

    AUBENQUE, M J; BLAIKLEY, R M; HARRIS, F F; LAL, R B; NEURDENBURG, M G; DE SHELLY HERNANDEZ, R

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary.Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary.Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made.Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements.The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information.Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and Neurdenburg

  20. Prospects for the Cross-Border Cooperation between Russia and Poland in the Field of Tourism

    Science.gov (United States)

    Zaitseva, Natalia A.; Korneevets, Valentin S.; Semenova, Lyudmila V.

    2016-01-01

    The relevance of the research topic is driven by the increasing role of cross-border cooperation for economic development of regions of the neighbouring countries located in the immediate vicinity to the border, as well as for the tourism development. The purpose of scientific research, the results of which are presented in the article, was the…

  1. Enhancing regional security agreements through cooperative monitoring

    International Nuclear Information System (INIS)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  2. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  3. Problems and Prospects of Cross-Border Cooperation in Tourism between Russia and Europe

    Directory of Open Access Journals (Sweden)

    Zaitseva Natalia A.

    2016-09-01

    Full Text Available The relevance of this research is related to the increasing role of tourism in the world in general and in border areas in particular. This article sets out to identify the problems and prospects of the development of cross-border cooperation in tourism between Russia and European countries. The authors focus on the scientific and theoretical aspects of cross-border cooperation and examine the role of tourism, and recreational potential and its effective use. The authors employ the methods of expert judgement and statistical analysis, refer to the surveys of Russian and European consumers showing their preferences, as well as to the authors’ own materials. The analysis makes it possible to have a deeper insight into the issue of cross-border cooperation in tourism between Russia and European countries and to assess the prospects of it. The authors provide an assessment of changes in the socio-economic relations between Russia and European countries and identify key problems in the development of cross-border cooperation in tourism. These problems relate to both macroeconomic and regional/industrial factors. The article is of interest for researchers studying cross-border tourism, the regional and local administrations of border areas of Russia and European countries, and representatives of the tourism business.

  4. Cross-Border Cooperation as a Tool of Escaping Crisis Conditions in Slovenia

    Directory of Open Access Journals (Sweden)

    Simona KUKOVIČ

    2018-02-01

    Full Text Available The article puts an emphasis on cross-border cooperation between Slovenian municipalities and municipalities in neighboring countries of Croatia, Austria, Hungary and Italy. The aim is to analyze different paths and methods of cross-border cooperation Slovenian municipalities are using in order to further own development and somewhat escape fi nancial crisis conditions autonomously. In Slovenia every third municipality is border municipality, which means that at least small part of their territory borders with the territory of municipality in one of the neighboring four countries. Since the central government does not rigidly regulate cross-border cooperation, but allows municipalities autonomy, each municipality can in its own way develop various forms and degrees of cooperation which are more or less intensively refl ected in the proper functioning of these municipalities. In this sense we present our thesis that cross-border cooperation is becoming one of the important sources of investment and economic development of otherwise heavily crisis-affected local communities in Slovenia.

  5. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao

    2018-01-09

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  6. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao; Yang, Liang; Alouini, Mohamed-Slim

    2018-01-01

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  7. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  8. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  9. Crossing borders: Security and privacy issues of the European e-passport

    NARCIS (Netherlands)

    Hoepman, J.H.; Hubbers, E.; Jacobs, B.P.F.; Oostdijk, M.D.; Wichers Schreur, R.

    2008-01-01

    The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of

  10. Cross-border Co-operation Networks in West Africa

    DEFF Research Database (Denmark)

    Walther, Olivier

    Long seen as artificial barriers inherited from decolonisation, West African borders now lie at the heart of policies designed to encourage regional trade and combat political instability. This rediscovery of the peripheries of the nation state has fostered a proliferation of institutional...

  11. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    Protection’s office responsible for securing the United States’ land border in the Detroit area. PoD provides a wide rage of cargo processing functions...a wide range of threats. Improper trademark labeling, tariffs, import quotas, agricultural issues, narcotics, human trafficking, and terrorism are...unloaded a truck, CBP agents search through the cargo. They open boxes, use hand-held radiation detectors, canines , and x-ray machines to inspect the

  12. [U.S.-Mexico cross-border cooperation in research on diabetes mellitus type 2].

    Science.gov (United States)

    Canela-Soler, Jaume; Frontini, María; Cerqueira, Maria Teresa; Ruiz-Holguín, Rosalba; Díaz-Apodaca, Beatriz A

    2010-09-01

    To describe and analyze, utilizing a case study approach, the U.S.- Mexico Border Diabetes Prevention and Control Project, a health research cooperation initiative incorporating the participation of federal, state, and local institutions of both countries. A model of equal representation, participation, consensus, and shared leadership was used, with the participation of more than 130 institutions. A sample of 4 020 people over 18 years of age was obtained by a random, multistage, stratified, clustered design. A questionnaire about diabetes mellitus type 2 (DM2) and health was applied. The statistical analysis took into account the design effect. The prevalence of diagnosed DM2 was 14.9% (95% confidence interval [95% CI]: 12.5-17.6) and the prevalence of diagnosed DM2 adjusted by age was 19.5% (95% CI: 16.8-22.6) on the Mexican side of the border and 16.1% (IC95%: 13.5-19.2) on the U.S. border side. There were differences between the DM2 prevalence and risk factors along the border. The U.S.-Mexico Border Diabetes Prevention and Control Project allowed the border zone between the two countries to be considered, for the first time ever, as a unit for epidemiological research. A shared understanding among all participating institutions and entities of sociopolitical structures and procedures is required for effective border health cooperation initiatives.

  13. Knowledge transfer and innovation in cross-border cooperation programmes between Finland and Russia

    DEFF Research Database (Denmark)

    Makkonen, Teemu; Williams, Allan; Weidenfeld, Adi

    2017-01-01

    Cross-border cooperation (CBC) at the European Union’s (EU) external borders has been promoted via programmes, such as the European Neighbourhood and Partnership Instrument (ENPI), funded jointly by the EU and participating countries. However, little empirical attention has been laid to these pro...... the actors in opposing sides of the border, is actually the main factor that facilitates and creates potential for learning, knowledge transfer and innovation to take place in the Finnish-Russian cross-border region....... to these programmes in terms of their role in enhancing cross-border knowledge transfer and innovation, particularly in the field of tourism. To shed light on the issue, semi-structured interviews were conducted with representatives of (12 Russian; 12 Finnish) organisations that had participated in ENPI CBC funded...... tourism related Finnish-Russian cross-border projects. The results shed light on the possibilities of and obstacles to cross-border knowledge transfer and innovation. ENPI CBC programmes between Finland and Russia are highly relevant for successful cross-border knowledge transfer and innovation...

  14. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  15. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  16. Knowledge of Practice: A Multi-sited Event Ethnography of Border Security Fairs in Europe and North America

    NARCIS (Netherlands)

    Baird, T.E.

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce

  17. Cross-border cooperation in inner Scandinavia: A territorial impact assessment

    Energy Technology Data Exchange (ETDEWEB)

    Medeiros, Eduardo, E-mail: emedeiros@campus.ul.pt

    2017-01-15

    The use of territorial impact assessment procedures is gaining increasing relevance in the European Union policy evaluation processes. However, no concrete territorial impact assessment tools have been applied to evaluating EU cross-border programmes. In this light, this article provides a pioneering analysis on how to make use of territorial impact assessment procedures on cross-border programmes. More specifically, it assesses the main territorial impacts of the Inner Scandinavian INTERREG-A sub-programme, in the last 20 years (1996–2016). It focuses on its impacts on reducing the barrier effect, in all its main dimensions, posed by the presence of the administrative border. The results indicate a quite positive impact of the analysed cross-border cooperation programme, in reducing the barrier effect in all its main dimensions. The obtained potential impact values for each analysed dimension indicate, however, that the ‘economy-technology’ dimension was particularly favoured, following its strategic intervention focus in stimulating the economic activity and the attractiveness of the border area. - Highlights: • A territorial impact assessment method to assess cross-border cooperation is proposed. • This method rationale is based on the main dimensions of the barrier effect. • This method identified positive impacts in all analysed dimensions. • The economy-technological dimension was the most positively impacted one.

  18. Czech-German Cross-Border Cooperation in the enlarged European Union

    Czech Academy of Sciences Publication Activity Database

    Houžvička, Václav

    2005-01-01

    Roč. 3, č. 1 (2005), s. 1-3 ISSN 1214-7567 R&D Projects: GA AV ČR(CZ) IBS7028301 Institutional research plan: CEZ:AV0Z70280505 Keywords : European Union * local elites * cross/border cooperation Subject RIV: AO - Sociology, Demography

  19. Border Security: The Role of the U.S. Border Patrol

    National Research Council Canada - National Science Library

    Nunez-Neto, Blas

    2005-01-01

    .... Today, the USBP's primary mission is to detect and prevent the entry of terrorists, weapons of mass destruction, and illegal aliens into the country, and to interdict drug smugglers and other criminals along the border...

  20. Security cooperation with China: Analysis and a proposal. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Wilborn, T.L.

    1994-11-25

    The author examines U.S.-China security cooperation before Tiananmen Square; the strategic context in which it took place; and the strategic environment of U.S.-China relations at the present time. As a member of the U.N. Security Council and one of the five acknowledged nuclear powers, China`s actions can influence a wide range of U.S. global interests. Continued U.S.-China security cooperation will contribute to stability in an important region of the world and help achieve U.S. global objectives. He concludes that, although the reasons which justified the program of security cooperation with China during the cold war are irrelevant today, security cooperation and military-to-military relations are highly desirable in the current strategic environment.

  1. Shaping the Victim: Borders, security, and human trafficking in Albania

    Directory of Open Access Journals (Sweden)

    James Campbell

    2013-09-01

    Full Text Available Borders are productive sites where knowledge is gathered and migrant populations are formed. The knowledge gathered from victims of trafficking reinforces a victim narrative that represents a perceived threat to society by highlighting violence, criminality, coercion, and naivety. Using Albania as a case in point, the article looks at trafficked people and the narratives of victimhood that surround them. In the case of trafficked people, the border projected out towards other states produces a discursively defined victim of trafficking. When projected back within the national territory, the border essentially produces a criminalised sex worker. To argue this point, the article discusses the role victims of trafficking play in the EU and looks at how international norms espoused by the OSCE and IOM have prepped the Albanian border for EU ascension and created the means for governable populations within Albania.

  2. Border Security and Military Support: Legal Authorizations and Restrictions

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2006-01-01

    .... Reported escalations in criminal activity and illegal immigration, however, have prompted some law makers to reevaluate the extent and type of military support that occurs in the Mexico-United States border region...

  3. Promotion of Cultural Tourism through Cooperation in the Cross-Border Area

    Directory of Open Access Journals (Sweden)

    Rădulescu Corina Michaela

    2017-01-01

    Full Text Available The uniqueness and richness of culture and heritage in the cross-border area: Hungary, Slovakia, Romania and Ukraine (HU-SK-RO-UA creates the opportunity for developing cultural tourism through innovative tourism and integrated tourism products, with the result of promoting tourism, generally in Europe and especially in Trans-Carpatic Region. For this purpose, new projects initiated can achieve better cooperation and coordination between the relevant stakeholders in the tourism sector, as well as to develop and implement joint tourism strategies. The paper presents a project proposal on promoting the culture and heritage in HU-SK-RO-UA area, through tourism function. The main activities designed in the project lead to joint cross-border tourism management in order to increase the attractiveness of cultural sites and joint cross-border touristic offer, by strengthening joint new touristic products and organizing joint cultural events.

  4. Sustainable Development Aspects in Cross-Border Cooperation Programmes: The Case of Macedonia and Albania

    Directory of Open Access Journals (Sweden)

    Klodjan Seferaj

    2014-12-01

    Full Text Available The cross-border area between Albania and Macedonia can be considered as a region with agrarian or industrial-agrarian economy, although the overall picture should take into account significant contrasts within the region, between the two countries, but also between the southern and northern part, and between mountainous areas and lowlands. Agriculture, agribusiness, light industry, mining, energy production and tourism are the main economic sectors, which also have the biggest potential in the cross-border region. Both countries are gaining experience in EU funded cross-border cooperation programmes with other neighbouring countries and with each other. The scope of the research is the evaluation and analysis of the Integrated Pre-accession Assistance (IPA Cross-border Cooperation (CBC Programme Macedonia-Albania 2007-2013 and its sustainable development aspects. The research is trying to assess the impact of the programme since its start in 2007 and the impact of the implemented grants on the sustainable development. The importance of the sustainable development aspect is recognized and is formally included into various national strategic documents, however implementation is often problematic and sustainability aspects need to be examined on a more concrete level. The methodology used was qualitative with research tools such as desk studies of relevant program documentation, strategic and planning documentation and other relevant published materials. The desk review considered well over 40 documents relevant to the program, most of which were shared by the Ministry of European Integration (MoEI and other actors.

  5. Energy Security in Asia: Prospects for Regional Cooperation

    OpenAIRE

    Lucas, Nigel

    2014-01-01

    Three case studies illustrate some of the secondary consequences of the search for energy security and its relationship to regional trade and cooperation: the role of the People’s Republic of China, the emerging market in biofuels in Southeast Asia, and diverse feed-in tariffs for renewable energy. The three main ways regional cooperation can strengthen national policies on energy security are (i) sharing information and knowledge to create a sound evidence base for policies, (ii) agreeing on...

  6. Alternatives of Cross-Border Securities Settlement System in East Asia

    Directory of Open Access Journals (Sweden)

    Hee-Yul Chai

    2005-12-01

    Full Text Available The establishment of cross-border securities settlement system is a very important element of regional capital market integration. Despite its importance, relatively few arguments, both theoretical and practical, have been advanced on the subject. This paper aims to examine the alternatives of cross-border securities settlement system in East Asia, and analyse the feasibility and the advantages and disadvantages of each alternative. The paper underlines the need to develop a multi-currency DVP securities settlement system. The conceivable alternatives of East Asia's cross-border securities settlement system can be divided into decentralized system and centralized system. It is possible to consider a large array of institutional settings according to the depository/settlement methods. The comparison of the alternatives is based on economic efficiency, feasibility and institutional location of settlement system. In view of these criteria, it is argued that a 'big-bang' approach toward imperfectly cenralized system is the most desirable alternative.

  7. Institutionalizing cross-border cooperatives on European level in the energy sector

    International Nuclear Information System (INIS)

    Paulusma, A.C.

    2008-01-01

    The third energy package proposes the establishment of an Agency for the Cooperation of Energy Regulators (ACER) and the establishment of a European Network of Transmission System Operators for Electricity (ENTSOE) and a European Network of Transmission System Operators for Gas (ENTSOG). This legislative initiative is a response to the need to further liberalise the energy sector and to create one single energy market. The proposals wish to remedy the lack of regulatory oversight for cross border issues and the existence of a regulatory gap on cross-border issues. This article addresses these proposals and places them in a historical context. The proposals indicate that the European legislator to some degree intends to institutionalize cross border cooperation of regulators and of transmission system operators. So far cross-border cooperation mostly has been brought about on a voluntary basis and not on the basis of European law. Also this cooperation takes place on a voluntary basis and largely outside the scope of the European Commission. If the proposals are excepted they will result in new forms of cooperation in the energy sector. The Agency will be a community body with legal personality that, besides having an advisory role, will in some circumstances be able to take binding decisions. Therefore it will entail more than voluntary cooperation and be a step closer to the establishment of a European regulator. With the creation of ENTSOG and ENTSOE cooperation between transmission system operators will for the first time be obligatory and take place on the basis of European legislation. It will therefore be a new phenomenon. Nevertheless, it is not always clear from the proposals what the result in practice will be nor how the new organizations will relate to each other, to the Commission and to the national regulators and transmission system operators. Currently, the main question is whether the proposals will be adopted by the Council and the European

  8. Assessing Security Cooperation as a Preventive Tool

    Science.gov (United States)

    2014-01-01

    Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by...deductible charitable contribution at www.rand.org/giving/contribute.html R® is a registered trademark © Copyright 2014 RAND Corporation This document...OECD—See Organisation for Economic Co-Operation and Development. Organisation for Economic Co-Operation and Development, Development Assistance

  9. Diabetes among Latinos in the Southwestern United States: border health and binational cooperation

    Directory of Open Access Journals (Sweden)

    Ryan P. Casey

    2014-12-01

    Full Text Available This analysis reviews cooperation between the four border states of the United States of America (Arizona, California, New Mexico, and Texas and international partners in Mexico with regard to type 2 diabetes among Latinos. Binational cooperation, academic collaboration, preventative health initiatives, and efforts to improve health care access for the border population are highlighted. This meta-analysis of the literature points out causative factors of the increased type 2 diabetes prevalence among Latinos in the United States; an inverse correlation between diabetes and education and socioeconomic level; contributing factors, including barriers with language, health care payment, transportation, and underestimating diabetes implications; and a lack of social and environmental support for disease management. Medical and indirect costs in socioeconomic terms are also included. Cooperation between the United States and Mexico may be beneficial to promoting further collaborative efforts between these nations, and serve as a template for greater cooperative efforts to mitigate the substantial public health and socioeconomic implications of type 2 diabetes globally.

  10. Managing European Cross Border Cooperation Projects on Sustainability: A Focus on MESP Project

    Directory of Open Access Journals (Sweden)

    Corrado Schenone

    2017-01-01

    Full Text Available International cooperation is a must to achieve the goal of sustainable development, since only through cross border actions’ complex issues like environmental degradation can be faced. Supranational initiatives and shared objectives are the only path for getting a durable and effective green strategy, which transcends boundaries or governments and fosters a common effort for sustainability through networking. The European Neighborhood and Partnership Instrument (ENPI aims at reinforcing cooperation between the European Union (EU and partner countries’ regions placed along the shores of the Mediterranean Sea. To this extent, MESP (Managing the Environmental Sustainability of Ports for a durable development can be considered as a typical cross border cooperation project, willing to create a sustainable environmental management of port in northern and southern shores of the Mediterranean basin. This has been achieved through the development of specific guidelines towards environmental sustainability and the collection of common tools, methodologies, good practices and innovations focused on pollution reduction that can be replicated in Mediterranean ports and further. This was possible through the creation of a strong cooperation network and long-lasting collaborations among partners and stakeholders such as harbour cities, port authorities, universities, research centres and scientific skills.

  11. East Africa’s Fragmented Security Cooperation

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    Since the 1990s, East Africa has developed what appears to be an impressive security architecture. Katja Lindskov Jacobsen and Johannes Riber Nordby warn, however, that appearances can be deceptive. The region’s security institutions remain too nationalistic and self-interested for their own good....

  12. Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations

    Science.gov (United States)

    2015-12-01

    Journal of Criminology 49 no. 5 (2009): 628–645. 28 Torin Monahan, “The Future of Security? Surveillance Operations at Homeland Security Fusion...terrorism Imagining Future Crime in the ‘War on Terror.’” British Journal of Criminology 49 no. 5 (2009): 628–645. McLaughlin, John. “Serving the

  13. Internal Security Cooperation under Functional Expectations: Initial Law Enforcement Europeanization - Case of Finland and Estonia

    Directory of Open Access Journals (Sweden)

    Ramon Loik

    2016-03-01

    Full Text Available Law enforcement cooperation as a central part of the EU internal security policy to combat cross-border organised crime and terrorism needs to be more effective by adopting specific provisions and tools. This paper argues that functional expectations require removal of barriers and construction of a common security area, but sometimes better cooperation in practice does not fit, as Europeanization of law enforcement still lacks understanding of objectives, values and principles for improving international trust, consensus, sincere cooperation and effective national coordination. The level of Europeanization of law enforcement could be evaluated as based on the level of implementation of the EU provisions on police cooperation related to practical enforcement, factors promoting or hindering law enforcement and changes in discursive practices due to EU provisions and professional socialisation processes. Some aspects of observed inertia characterizes the slow process of transition or tendencies for absorption in which resilience meets the necessary degree of flexibility allowing for some mutual learning and cooperation, but the result is expectedly a form of accommodation of needful policy requirements in the lack of substantial change perspective.

  14. Transregional Threats and Maritime Security Cooperation

    Science.gov (United States)

    2017-08-01

    continue to grow. As of 2015, China’s coast guard had 205 ships, more than the combined coast guards of Japan, Vietnam, Indonesia, Malaysia , and the...raised the possibility of China assisting the Philippines in maritime security. • China has maritime security initiatives with Malaysia and...Pakistan. They have also conducted maritime safety drills with their Omani counterparts. In recent years, the IRIN has made efforts to operate well

  15. Cooperative monitoring and its role in regional security

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  16. Economic Co-operation Across the Finnish-Russian Border - Factors of Sluggish Development and Success of Enterprises

    OpenAIRE

    Rautio, V.; Tykkylaeinen, M.

    2000-01-01

    The post-Cold War era in Europe in the 1990s has caused people to recognize the complexity of economic development and economic co-operation. The opening of borders has not always meant an increase cross-border economic activities in general. On the contrary, the adverse socio-economic development of many border areas has been unanticipated. The Finnish-Russian border is one example of this dissonance. This paper analyses the operation of Finnish companies in economic activities in Russ...

  17. Regionalism, Security and Cooperation in Oceania

    Science.gov (United States)

    2015-06-01

    Cooperation in Oceania Introduction Australia, by dint of geography, trade and investment links, tourism , aid, defense assets and sport , has exercised a...storm damage). Potential second-order consequences include economic loss from these events, declining revenues from tourism , and emigration to escape...bridges, dams, schools, hospitals, sports facilities and government buildings. China also funds commercial projects that can deliver immediate

  18. The role of spectroscopy versus detection for border security

    International Nuclear Information System (INIS)

    Kouzes, R.T.; Ely, J.H.

    2008-01-01

    Countries around the world are deploying radiation portal monitor systems to interdict the illicit shipment of radioactive material crossing international borders. Because of their high efficiency for gamma-ray detection, most deployed systems are based on plastic scintillators and are non-spectroscopic in capability. Spectroscopic portal monitor systems are undergoing engineering development for near term deployment. The ability to identify the detected radionuclides may allow improved operational handling of radiation alarms, particularly those from the normal commerce of naturally occurring radioactive material. The goal for improved systems is to increase the sensitivity to threats while reducing the operational impact of nuisance alarms. (author)

  19. Border Cracks: Approaching Border Security From a Complexity Theory and Systems Perspective

    Science.gov (United States)

    2012-12-01

    Immigration and Naturalization Service IRS Internal Revenue Service LFM La Familia Michoacana NAFTA North American Free Trade Agreement NDIC...The judicial system ensures the laws passed, along with the enforcement, are legal and in accordance with the Constitution . Judicial rulings are...and advises governmental agencies on activities suspected of constituting threats to Canada’s national security. Additionally, CSIS conducts

  20. Re-Casting the U.S.-Mexico Border Security Net

    Science.gov (United States)

    2014-03-01

    the best fence money can buy , and they counter us with a 2,500-year-old technology.214 The incident proved that these organizations are extremely...created a demand that has attracted illicit activity. DTOs have expanded their franchises to increase the size of their profits. Border security

  1. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  2. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    Science.gov (United States)

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  3. Efficient Security Mechanisms for the Border Gateway Routing Protocol

    Science.gov (United States)

    1997-08-22

    Finding Algorithm for Loop- Free Routing. IEEE/ACM Transactions on Networking, 5(1):148{160, Feb. 1997. [7] International Standards Organization. ISO/IEC...Jersey 07974, Feb. 1985. ftp://netlib.att.com/netlib/att/cs/ cstr /117.ps.Z. [16] S. L. Murphy. Presentation in Panel on \\Security Architecture for the

  4. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    Science.gov (United States)

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  5. THE NORTHERN BORDER A FORGOTTEN NATIONAL SECURITY THREAT

    Science.gov (United States)

    2017-04-06

    Deputy Director of the DEA, Jack Riley.70 However, they have been seen recently expanding their physical and permanent presence in Canada. In 2015...balanced approach. Notes 1 Jane A. Bullock, George D. Haddow, and Damon P. Coppola, Homeland Security: The Essentials (Waltham, MA : Butterworth -Heinemann...Michoacán Family (La Familia Michoacána or LFM), Knights Templar (Los Caballeros Templarios or LCT), and Los Zetas.” Jack Riley, Acting Deputy

  6. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  7. Redistribution effects resulting from cross-border cooperation in support for renewable energy

    International Nuclear Information System (INIS)

    Unteutsch, Michaela

    2014-01-01

    It has been shown that international cooperation in achieving renewable energy targets, e.g., via a common tradable green certificate market, increases overall welfare. However, cooperation in the support of electricity from renewable energy sources also leads to regional price effects, from which some groups benefit while others lose. On a regional level, the introduction of cross-border cooperation in RES-E support generally has an opposite effect on support expenditures and wholesale electricity prices, as long as grid congestion between the different regions exists. In this paper, a theoretical model is used to analyze under which conditions different groups bene t or suffer from the introduction of cooperation. Findings of the analysis include that effects on consumers and total producers per country can only be clearly determined if no grid congestions between the countries exist. If bottlenecks in the transmission system exist, the relationship between the slopes of the renewable and the non-renewable marginal generation cost curves for electricity generation as well as the level of the RES-E target essentially determine whether these groups bene t or lose from the introduction of green certificate trading. In contrast, system-wide welfare always increases once cooperation in RES-E support is introduced. Similarly, welfare on the country level always increases (compared to a situation without RES-E cooperation) if the countries are perfectly or not at all physically interconnected. In the case of congested interconnectors, each country always at least potentially benefits from the introduction of certificate trade, taking into account possible distributions of congestion rents between the countries.

  8. Redistribution effects resulting from cross-border cooperation in support for renewable energy

    Energy Technology Data Exchange (ETDEWEB)

    Unteutsch, Michaela

    2014-01-15

    It has been shown that international cooperation in achieving renewable energy targets, e.g., via a common tradable green certificate market, increases overall welfare. However, cooperation in the support of electricity from renewable energy sources also leads to regional price effects, from which some groups benefit while others lose. On a regional level, the introduction of cross-border cooperation in RES-E support generally has an opposite effect on support expenditures and wholesale electricity prices, as long as grid congestion between the different regions exists. In this paper, a theoretical model is used to analyze under which conditions different groups bene t or suffer from the introduction of cooperation. Findings of the analysis include that effects on consumers and total producers per country can only be clearly determined if no grid congestions between the countries exist. If bottlenecks in the transmission system exist, the relationship between the slopes of the renewable and the non-renewable marginal generation cost curves for electricity generation as well as the level of the RES-E target essentially determine whether these groups bene t or lose from the introduction of green certificate trading. In contrast, system-wide welfare always increases once cooperation in RES-E support is introduced. Similarly, welfare on the country level always increases (compared to a situation without RES-E cooperation) if the countries are perfectly or not at all physically interconnected. In the case of congested interconnectors, each country always at least potentially benefits from the introduction of certificate trade, taking into account possible distributions of congestion rents between the countries.

  9. Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security

    Science.gov (United States)

    Yilmaz, Bahadır.

    2013-06-01

    Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.

  10. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  11. Security challenges to Central European bordering territories: view from the Transcarpatian region of Ukraine

    Directory of Open Access Journals (Sweden)

    Myroslava Lendel

    2015-12-01

    Full Text Available The factor of integral Central European space determines the formation of common challenges to the region's security. One part of them is not visualized or not perceived in the capital cities. These threats may be most vividly traced in the Transcarpathian region of Ukraine, taking into consideration the fact that it borders with the abovementioned countries. These are ethnopolitical threats, caused by the multiethnic population of the region, energy dependence, threats of social economic peripherization of Central European bordering territories, informational influence on the population, different attitudes to Ukraine-Russia conflict.

  12. THE RELATION BETWEEN TERRITORIAL COLECTIVITIES IN FRANCE AND THE EUROPEAN UNION. THOUGHTS ON THE CROSS-BORDER COOPERATION

    Directory of Open Access Journals (Sweden)

    CLAUDIA BARBOIU-GILIA

    2012-05-01

    Full Text Available France, one of the founding members of the European Union, is a unitary state from the administrativeterritorial point of view, based on deep centralism. Having territorial collectivities with highly complex structure (communes, departments, regions, sui-generis collectivities and overseas collectivities, France committed itself to cooperation not only between its own administrative structures, but also to cross-border cooperation within the European Union. After showing reluctance to external actions underwent by territorial collectivities, France ended up with acknowledging this right of its territorial collectivities within the «decentralized cooperation», expressly brought under regulation by the Law of 6 February 1992. According to the law, there is no need for any ratification on behalf of the State to allow cooperation between territorial collectivities, within the boundaries of their competence. The Law of 1992 thus authorized the territorial collectivities to close agreements with other collectivities from abroad. Furthermore, the Law of 4 February 1995 allowed several treaties with the border states to be signed, thus creating the SAAR-LOR-LUX region (an European cross-border region that made way for cooperation between Germany, France and Luxembourg. The French legislation also allowed several European districts to be created, acting as local groups for cross-border cooperation, created on the initiative of territorial collectivities. The aim of our study is to identify the main relationship between territorial collectivities in France and EU and to analyze the cooperation instruments used by the French collectivities in order to foster the cross-border cooperation.

  13. Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq

    National Research Council Canada - National Science Library

    Thies, Douglas G

    2007-01-01

    .... airpower security cooperation with Pakistan and Egypt. The central argument is that these cases suggest that the key variables affecting the success of airpower security cooperation as a diplomacy instrument are: 1...

  14. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  15. Securing co-operation from persons supplying statistical data

    Science.gov (United States)

    Aubenque, M. J.; Blaikley, R. M.; Harris, F. Fraser; Lal, R. B.; Neurdenburg, M. G.; Hernández, R. de Shelly

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary. Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary. Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made. Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements. The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information. Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and

  16. The Theoretical Prerequisites for the Emergence of Interactive Marketing in the System of Management of Cross-Border Economic Cooperation

    Directory of Open Access Journals (Sweden)

    Gegedosh Kristian V.

    2017-06-01

    Full Text Available The article attempts to characterize the basic theoretical aspects of marketing in cross-border cooperation. It has been found that, in the current context of the IT sector development, it is of substantial relevance to apply the benefits of online marketing together with integrating it into the international regional cross-border economic relations. The author’s own conception of the use of interactive marketing to further improve interaction of the entities of neighbouring countries in various areas of cross-border cooperation (CBC has been proposed. A layout of web site interface of the interactive cross-border business center has been developed on the example of the euroregional formation of member countries in the Interregional Association «Carpathian Euroregion». One of the main challenges to the development of the CBC today is the lack of a well-functioning mechanism of interaction of «local authorities – regional development agencies – business structures». However, after building a model for development of a cross-border economy based on interactive marketing principles, the border areas on both sides will be able to better develop the regional economy and, consequently, the social well-being of the territory as a whole.

  17. The Existence Of Leading Islands Securing And The Border Areas Unitary State Of Indonesia An Analysis In Law Perspective

    Directory of Open Access Journals (Sweden)

    Nazali

    2015-08-01

    Full Text Available Abstract The research was carried with the aim to discover the existence of securing the foremost islands and state border region of the Republic of Indonesia reviewed from a legal perspective which is directly related to the existence of security and dispute resolution methods as well as the governance of the foremost islands and border region in Kalimantan which bordering Malaysia. This study was conducted in Nunukan district and the surrounding provinces of Kalimantan in this research method that used is normative legal analysis data with juridical and qualitative descriptive approach. The results showed that the security of foremost islands and border region of law perspective in accordance with the Law No. 34 of 2004 regarding the Indonesian National Army has not been implemented to the fullest to realize the security of foremost islands and border region as the frontline of the Republic of Indonesia. The existence of leading islands securing and the border region of the Republic of Indonesia still contain many weaknesses in terms of both governance and security.

  18. Transweb and trafficking in illicit nuclear materials: beyond the borders of physical security

    International Nuclear Information System (INIS)

    Ballard, J.D.; Dilger, F.

    2005-01-01

    Full text: Transweb is a developing threat assessment analytical protocol that uses real time GIS based assessments (a.k.a., GTA for GIS Threat Assessment) to better understand potential trafficking in illicit nuclear materials that may come from energy related sites and/or weapons production facilities. This is not a physical security protocol nor is this program a border check format like the DOE's Second Line of Defense which is designed to detect special nuclear fuels. Transweb is a tool that allows the user to look at surreptitious transportation pathways that may be used to move illicit nuclear materials after they have already breached traditional physical security barriers and allows for movement prediction and potential mitigation/intervention if they are not traveling on the highways or railways, traversing the waterways, or entering ports equipped with detecting equipment like that deployed in Second Line of Defense program. Transweb is for the real world, a world where physical security may be breached and the smugglers that capture these materials do not follow the most traveled highways, railways, or waterways in a given society. Transweb focuses on the less obvious transportation routes that may be the most likely ways that illicit nuclear materials will be transported. Thus this program offers an additional layer of security analysis not currently in use as physical protection or as border mitigation. (author)

  19. EU coordination of national social security in multiple cross border situations

    NARCIS (Netherlands)

    Cremers, J.

    2011-01-01

    The coordination of the national social security is one of the crucial fields of cooperation between EU Member States. The coordination is based on the principle of application of one legislation at a time in cases of employment being executed in one or more than one Member State. Persons moving

  20. A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhipeng Tang

    2016-01-01

    Full Text Available VCC is a computing paradigm which consists of vehicles cooperating with each other to realize a lot of practical applications, such as delivering packages. Security cooperation is a fundamental research topic in Vehicular Cloud Computing (VCC. Because of the existence of malicious vehicles, the security cooperation has become a challenging issue in VCC. In this paper, a trust-based model for security cooperating, named DBTEC, is proposed to promote vehicles’ security cooperation in VCC. DBTEC combines the indirect trust estimation in Public board and the direct trust estimation in Private board to compute the trust value of vehicles when choosing cooperative partners; a trustworthy cooperation path generating scheme is proposed to ensure the safety of cooperation and increase the cooperation completion rates in VCC. Extensive experiments show that our scheme improves the overall cooperation completion rates by 6~7%.

  1. 33 CFR 165.709 - Security Zone; Charleston Harbor, Cooper River, South Carolina.

    Science.gov (United States)

    2010-07-01

    ..., Cooper River, South Carolina. 165.709 Section 165.709 Navigation and Navigable Waters COAST GUARD... § 165.709 Security Zone; Charleston Harbor, Cooper River, South Carolina. (a) Regulated area. The Coast Guard is establishing a fixed security zone on all waters of the Cooper River, bank-to-bank and surface...

  2. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  3. Latin American social medicine across borders: South-South cooperation and the making of health solidarity.

    Science.gov (United States)

    Birn, Anne-Emanuelle; Muntaner, Carles

    2018-02-22

    Latin American social medicine efforts are typically understood as national endeavours, involving health workers, policymakers, academics, social movements, unions, and left-wing political parties, among other domestic actors. But Latin America's social medicine trajectory has also encompassed considerable between-country solidarity, building on early twentieth century interchanges among a range of players who shared approaches for improving living and working conditions and instituting protective social policies. Since the 1960s, Cuba's country-to-country solidarity has stood out, comprising medic exchanges, training, and other forms of support for the health and social struggles of oppressed peoples throughout Latin America and around the world, recently via Misión Barrio Adentro in Venezuela. These efforts strive for social justice-oriented health cooperation based on horizontal power relations, shared political values, a commitment to social and economic redistribution, bona fide equity, and an understanding of the societal determination of health that includes, but goes well beyond, public health and medical care. With Latin America's left-wing surge now receding, this article traces the provenance, dynamics, impact, challenges, and legacy of health solidarity across Latin American borders and its prospects for continuity.

  4. An Analysis on Religious-Ethnic Geopolitics, Security and Development in Border Towns. Case Study: Sistan and Baluchestan

    Directory of Open Access Journals (Sweden)

    ISSA EBRAHIMZADEH

    2012-01-01

    Full Text Available Borders and border areas require security measures, which are very important to create security on the borders. The paper also analyzes the role of ethnic groups living near borderlines. Iran is an ethnically varied country and distinguishing characteristics of ethnic groups from each other in Iran is particularly concentrated on language, religion and ethnic components. These ethnic groups have been scattered as certain minority groups in border provinces and areas. The presence of Iranian nationals in the Western, Eastern and Northern borders which are contiguous with countries with the same religion and language creates by itself an appropriate context for the occurrence of ethnic crises in border areas and boundary underdevelopment is an another cause for this problem. In addition, the three components, namely religion, ethnicity, and language, should be taken into consideration in adopting policies and strategies to deal with these areas. In Sistan and Baluchestan, Iran, there are effective national strategies taking advantage of the presence and existence of religious and ethnic groups in the border towns, adopting security and development policies taking into account these two issues. They have a deep effect on regional development and national solidarity due to construction activities and infrastructure investments on the one hand and reducing insecurity and trafficking on the other hand.

  5. The role of the Public Private Partnership (PPP) in Cross Border Cooperation (CBC) as strategic practice in the EU Policies and cooperation tools for 2014-2020

    OpenAIRE

    Lussi, Manoela

    2014-01-01

    2012/2013 There is an increasingly widespread acknowledgement among all active actors in the development co-operation sector that the Public Private Partnership (PPP) can be a new important tool, not only to build important infrastructure (public works) but also to provide services to the citizens at central and local level as well as to have a strategic value in the Cross-Border Co-operation (CBC) in the next future. The European Commission defines PPPs in a rather broad and general wa...

  6. Review of depopulation of the border villages in the context of national security risk

    Directory of Open Access Journals (Sweden)

    Vukmirović Jovanka A.

    2016-01-01

    Full Text Available According to internationally comparable statistical indicators, Serbia is among the countries with the highest development disparities (regional and local, both among Balkan neighbors and European scale. Large differences in development occur during the second half of the last century, a period culminating in the failed socio-economic transition of the millennium. Devastation and depopulation are causal phenomena, the population rapidly leaving impoverished areas and gravitate to the larger centers. Conditionally speaking, the more developed cities continue to develop while poor towns and villages are still poor. Proverb says, 'Whose sheep, that and the mountains. ' Emptying the territory highly correlated with an increase in surface area of agricultural land uncultivated, thus permanently extinguished agriculture as the main activity and main source of income in rural areas. Emptying the territory is the biggest development problem in Serbia, but also represents one of the biggest national security risks. Increasingly, the question whether Serbia will in the future be able to keep the territory in which he remains without population and whether the threshold bezbednostnog risk isšražnjene administration of the territory in the border areas. This paper presents a statistical description of census data in 1971, 1981, 1991, 2002 and 2011 as well as the analysis of demographic trends in border settlements for the considered period. The paper also proposed a set of measures and recommendations for overcoming depopulation, in accordance with available resources and the natural limits of border settlements.

  7. Cooperation in the maintenance of peace and security, and disarmament

    International Nuclear Information System (INIS)

    1994-01-01

    In the face of recent fundamental changes in the international situation, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being encouraged by the international community. Towards this end, the United Nations Centre for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate an exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground, fostering the process of confidence-building and delineating areas of possible future negotiation and agreement. This publication is based on material presented at the regional meeting on the Cooperation in the maintenance of peace and security, held at the United Nations Regional Centre for Peace and Disarmament in Asia and the Pacific, in Kathmandu, Nepal, from 31 January to 2 February 1994

  8. The integrated North American electricity market : assuring an adequate supply of electricity through cross-border cooperation and trade

    International Nuclear Information System (INIS)

    Egan, T.

    2005-03-01

    The purpose of this paper is to support cooperation and discussion of the long-term sufficiency of the electricity trading system between Canada and the United States. It discusses the integrated electricity market including details on exports and imports of electricity, major transmission interconnections, the economic and environmental benefits of an integrated market and electricity generation statistics by fuel source. The paper also discusses several areas of cooperation and presents several recommendations including: greater dialogue on regional supply requirements; mandatory reliability standards; coordinated regulatory approaches to new cross-border transmission; the role of emerging generation and transmission technologies; opportunities to exchange experience and learning on demand-side measures; coordinated strategies to manage greenhouse gas and other air pollutants; and, critical infrastructure protection. The paper concludes that the integration between Canada and the United States will only increase as energy demand and trade continue to grow, making close cooperation between the two countries a necessity. 6 figs

  9. Pastoralists at War: Violence and Security in the Kenya-Sudan-Uganda Border Region

    Directory of Open Access Journals (Sweden)

    Jonah Leff

    2009-12-01

    Full Text Available The majority of those living in the border region of Kenya, Sudan, and Uganda are pastoralists, whose livelihoods are dictated by the upkeep and size of their herds. Harsh environmental conditions force pastoralists to migrate in search of water and pasturelands during the dry season. With limited access to water and competing rights to land, intertribal conflict arises when pastoralists from one tribe enter the territory of another. The increased availability of small arms in the region from past wars increasingly makes ordinary clashes fatal. Governments in the region have responded with heavy-handed coercive disarmament operations. These have led to distrust and subsequent violent clashes between communities and security providers. This report reviews the scale, consequences of, and responses to the many pastoral conflicts, utilizing methodological tools such as key informant interviews, retrospective analysis, and a thorough review of available literature.

  10. BORDERS AS AN INTERDISCPLINARY PROBLEM

    Directory of Open Access Journals (Sweden)

    Duško Vrban

    2018-04-01

    Full Text Available This article deals with the concepts of space and territoriality in law and politics seen through reflexion on borders, which are understood primarily as forms of identification and the basis for nation-building. While in the classical antiquity, borders were seen as exclusionary defensive structures, in modern international law in the 18th and 19th centuries, they became spaces for the delimitation of states sovereign territories. The author attempts to enligthen the symbolic significance of borders in modern European history, which have been connected with imperial designs, nationalist discourses and political imaginaries. Border rhetoric often emphasised territorial inclusions and exclusions relied to the concepts such as sovereignty, security and natural living space (“natural borders”. The concept of borders is also related to the understanding of the division of Earth’s surface into areas defined as regions. Regions may construct and transcend natural and political borders. Although, borders have been through world history sites of conflict, they also build ways of interconnections between locals and neighbours. The struggle over cultural and political domination and attempts to integrate and assimilate border populations were mostly reflected into deliberate linguistic policies relating to the language of administration and the public sphere. After the Second world war, the perception of borders have changed and the new understanding of borders have prevailed, based upon the idea of cooperation and the recognition of local traditions and minority rights. The principle of uti possidetis iuris was applied in order to prevent redrawing of the borders of new states and to maintain the territorial stability of the regions. But the recent migration crisis and security concerns in Europe and America have re-actualised the perception of state borders as defensive structures. Moreover, introduction of new technologies, such as ICT and the

  11. 75 FR 5287 - Federal Advisory Committee; Western Hemisphere Institute for Security Cooperation Board of...

    Science.gov (United States)

    2010-02-02

    ... Institute for Security Cooperation Board of Visitors; Charter Renewal AGENCY: Department of Defense (DoD... charter for the Western Hemisphere Institute for Security Cooperation Board of Visitors (hereafter... special government employees. With the exception of travel and per diem for official travel, Board Members...

  12. 33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.

    Science.gov (United States)

    2010-07-01

    ... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...

  13. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  14. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  15. Power, Profits, and Politics: Energy Security and Cooperation in Eurasia

    Science.gov (United States)

    Svyatets, Ekaterina

    This study explores varying outcomes of energy cooperation, defined as diplomatic relations, bilateral trade, and investment in oil and natural gas. Tests of theories pertinent to energy security - broadly speaking, realism, liberalism, and domestic politics---reveal that they alone can offer only a narrow and one-sided explanation, not embracing the complexity of energy issues. Nevertheless, using them as a starting point, this study outlined a structured framework that incorporates three variables---economic potential, geopolitical rivalry, and domestic interest groups---that are applied to the cases of U.S.-Russia, U.S.-Azerbaijan, and Russia-Germany energy ties. This study concludes that if the economic potential (defined by geographic proximity and resource availability) is very high, such as in the case of Russia-Germany, states can overcome geopolitical rivalries and historical enmities in favor of energy cooperation. However, if the economic potential is relatively low (because of geographic obstacles or easily available alternative suppliers, as in the cases of U.S.-Russia and U.S.-Azerbaijan), then geopolitics prevails---for example, to bypass Russia or to limit American access to contracts in Russia when U.S.-Russian relations are strained. In all the cases explored here, domestic interest groups have mixed influence: if they are united along energy issues, they usually successfully achieve their energy policy goals, although the impact of these groups often becomes intertwined with state interests. In other situations, when powerful interest groups are divided or focused on non-energy-related issues (such as ethnic priorities), their influence over energy deals is much lower.

  16. The Danish-German police cooperation cross Danish-German land border in Schleswig-/South Jutland

    DEFF Research Database (Denmark)

    Battrup, Gerd

    including members of the national minorities. However, the 'opening' of the now 'internal EU border' after the Danish implementation of the Schengen Agreement in March 2001 as well as a massive growth in the demand of labour in South Jutland from 2004-2009, led to a rapid increase in the cross...... patterns of migration. A larger number of Danish bikers, including members of Hell's Angels have for instance in the recent years moved to Schleswig-Holstein. Danish and German police co-operate on combating gang related crime including crime committed by gangs of bikers. However, while Germany allows...

  17. Do Coffee Farmers Benefit in Food Security from Participating in Coffee Cooperatives? Evidence from Southwest Ethiopia Coffee Cooperatives.

    Science.gov (United States)

    Shumeta, Zekarias; D'Haese, Marijke

    2018-06-01

    Most coffee in Ethiopia is produced by smallholder farmers who face a daily struggle to get sufficient income but also to feed their families. At the same time, many smallholder coffee producers are members of cooperatives. Yet, literature has paid little attention to the effect of cooperatives on combating food insecurity among cash crop producers including coffee farmers. The objective of the study was to investigate how coffee cooperative membership may affect food security among coffee farm households in Southwest Ethiopia. The study used cross-sectional household data on income, expenditure on food, staple food production (maize and teff), and utilization of improved inputs (fertilizer and improved seed) collected from 256 randomly selected farm households (132 cooperative members and 124 nonmembers) and applied an inverse probability weighting (IPW) estimation to assess the impact of cooperative membership on food security. The result revealed that cooperative membership has a positive and significant effect on staple food production (maize and teff) and facilitated technological transformation via increased utilization of fertilizer and improved seeds. Nonetheless, the effect on food expenditure and income could not be confirmed. Findings suggest a trade-off between coffee marketing and input supply functions of the cooperatives, impairing their true food security impact from the pooled income and production effect.

  18. U.S.-China Radiological Source Security Project: Continuing And Expanding Bilateral Cooperation

    International Nuclear Information System (INIS)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-01-01

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy's National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  19. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  20. Many rivers to cross. Cross border co-operation in river management

    NARCIS (Netherlands)

    Verwijmeren, J.A.; Wiering, M.A.

    2007-01-01

    River basin management is a key concept in contemporary water policy. Since the management of rivers is best designed and implemented at the scale of the river basin, it seems obvious that we should not confine ourselves to administrative or geographical borders. In other words, river basin

  1. Cooperation between Russia and the EU in the field of innovative development of tourism: the case of the Lithuania — Poland — Russia cross-border cooperation programme

    Directory of Open Access Journals (Sweden)

    Kropinova Elena

    2013-12-01

    Full Text Available To study the key instruments of international cooperation between Russia and the European Union aimed at stimulating innovative development of tourism co-financed by the EU and Russia. The author describes specific projects implemented in the framework of the Lithuania-Poland-Russia cross-border cooperation programme for 2009—2013 in the field of tourism. Special attention is paid to analysing tourism innovations that have emerged as a result of the projects aimed at cooperation and tourism development in the border regions of Russia and the EU countries. A number of projects have been implemented under the supervision and with the participation of the author. The article focuses on the role of innovative types of tourism in the regional development of territories in the case of the Kaliningrad region. The current approaches to defining tourism innovations in Russian and international studies are not comprehensive and do not reflect the essence of innovative processes. Innovative development is often reduced to the introduction of new information technologies, i. e. informatization replaces innovative development. However, it is important to take into account other innovative tools: for instance, interactive network museums in developing innovative tourist attraction objects, e-marketing in introducing innovations in tourist product promotion, programmes of private- public partnership in the field of public regulation and tourism stimulation, etc. These technologies contribute to the transition fr om a certain economic agent, the industry as a whole, or a tourist destination to a fundamentally new level in terms of tourist product presentation and increase of competitiveness. The sources for innovations in tourism are both the providers and consumers of tourist services. In those regions wh ere tourism is considered an economic priority, local authorities and even super-governmental organisations, such as the European Commission (through

  2. Cooperation between Russia and the EU in the field of innovative development of tourism: the case of the Lithuania — Poland — Russia cross-border cooperation programme

    Directory of Open Access Journals (Sweden)

    Kropinova Elena

    2013-01-01

    Full Text Available To study the key instruments of international cooperation between Russia and the European Union aimed at stimulating innovative development of tourism co-financed by the EU and Russia. The author describes specific projects implemented in the framework of the Lithuania-Poland-Russia cross-border cooperation programme for 2009—2013 in the field of tourism. Special attention is paid to analysing tourism innovations that have emerged as a result of the projects aimed at cooperation and tourism development in the border regions of Russia and the EU countries. A number of projects have been implemented under the supervision and with the participation of the author. The article focuses on the role of innovative types of tourism in the regional development of territories in the case of the Kaliningrad region. The current approaches to defining tourism innovations in Russian and international studies are not comprehensive and do not reflect the essence of innovative processes. Innovative development is often reduced to the introduction of new information technologies, i. e. informatization replaces innovative development. However, it is important to take into account other innovative tools: for instance, interactive network museums in developing innovative tourist attraction objects, e-marketing in introducing innovations in tourist product promotion, programmes of private- public partnership in the field of public regulation and tourism stimulation, etc. These technologies contribute to the transition fr om a certain economic agent, the industry as a whole, or a tourist destination to a fundamentally new level in terms of tourist product presentation and increase of competitiveness. The sources for innovations in tourism are both the providers and consumers of tourist services. In those regions wh ere tourism is considered an economic priority, local authorities and even super-governmental organisations, such as the European Commission (through

  3. Modern aspects of cross-border cooperation on the example of the functioning of Euroregion «Upper Prut»

    Directory of Open Access Journals (Sweden)

    O. O. Hrushko

    2015-07-01

    Full Text Available In the article the current aspects of cross­border cooperation between regions of Ukraine in the framework of the EU Eastern Partnership and in the frame of «Upper Prut» in particular are discussed. The retrospective of the establishment of cross­border ties of Chernivtsi oblast with the regions of Moldova and Romania and evolution of this cooperation (from Euroregion to implementation of the projects funded by EU programs is given. Also the efficiency of the Joint Operational Programme «Romania­Ukraine­Republic of Moldova 2007­2013» for the Ukrainian side border is analyzed. The research of public opinion on influence of the European integration process and its cross­border cooperation was. It was determined that the CBC projects implementation not only positively affects on the development of the region, but also is an effective mechanism for the formation of public opinion on the movement of Ukraine towards the EU. It is concluded that trans­regional cooperation today is looking for new models of national infrastructures, which includes power systems, transportation and communication network. The development of a common policy on technogenic and ecological safety, prevention of pollution of river basins, and the development of tourism and recreational activities also must be included in such new model. The implementation of joint strategies must be established and have to include the equalization of socio­economic and political development of border regions.

  4. Beyond Fashoda: Anglo-French security cooperation in Africa since St-Malo

    OpenAIRE

    Chafer, Tony; Cumming, G.

    2010-01-01

    This article focuses on Anglo-French security and defence collaboration. It begins by setting out the lack of UK-French security cooperation in Africa from the colonial to the early post-Cold War era. It then shows how there has been a degree of institutionalization of Anglo-French relations, alongside greater cooperation in terms of European Security and Defence Policy missions and the training of African peacekeepers. Next, this study explains the recent evolution of UK-French security rela...

  5. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI

  6. [Experience of international cooperation among Baltic countries in occupational health and security].

    Science.gov (United States)

    Miloutka, E V; Andronova, E R; Dedkova, L E

    2013-01-01

    The article covers longstanding experience of international cooperation in occupational health and security with Baltic countries. The authors describe history of information network creation, its structure, objectives, importance for occupational health services and safety in the region.

  7. Joint malaria surveys lead towards improved cross-border cooperation between Savannakhet province, Laos and Quang Tri province, Vietnam

    Directory of Open Access Journals (Sweden)

    Pongvongsa Tiengkham

    2012-08-01

    Full Text Available Abstract Background In Savannakhet province, Laos and Quang Tri province, Vietnam, malaria is still an important health problem and most cases are found in the mountainous, forested border areas where ethnic minority groups live. The objectives of this study were to obtain a better joint understanding of the malaria situation along the border and, on the basis of that, improve malaria control methods through better cooperation between the two countries. Methods Fourteen villages in Savannakhet and 22 villages in Quang Tri were randomly selected within 5 km from the border where a blood survey for microscopic diagnosis (n = 1256 and n = 1803, respectively, household interviews (n = 400, both sides and vector surveys were conducted between August and October 2010. Satellite images were used to examine the forest density around the study villages. Results Malaria prevalence was significantly higher in Laos (5.2% than in Vietnam (1.8% and many other differences were found over the short distance across the border. Bed net coverage was high (> 90% in both Laos and Vietnam but, while in Laos more than 60% of the nets were long-lasting insecticide-treated, Vietnam used indoor residual spraying in this area and the nets were untreated. Anopheles mosquitoes were more abundant in Laos than in Vietnam, especially many Anopheles dirus were captured in indoor light traps while none were collected in Vietnam. The forest cover was higher around the Lao than the Vietnamese villages. After this study routine exchange of malaria surveillance data was institutionalized and for the first time indoor residual spraying was applied in some Lao villages. Conclusions The abundance of indoor-collected An. dirus on the Laos side raises doubts about the effectiveness of a sole reliance on long-lasting insecticide-treated nets in this area. Next to strengthening the early detection, correct diagnosis and prompt, adequate treatment of malaria infections, it is

  8. The Evolution of European Security: From Confrontation to Cooperation

    Science.gov (United States)

    2013-03-01

    Vasconcelos , (Paris: The European Union Institute for Security Studies, 2009), 41. 60 Ibid. 61 European Union Home Page, “Common Security and...of ESDP,” in What Ambitions for European Defense in 2020?, 2nd ed., ed. Álvaro de Vasconcelos (Paris: The European Union Institute for Security

  9. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  10. To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation

    Science.gov (United States)

    2015-02-01

    security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce

  11. Memorandum of Understanding on cooperation and consultation on nuclear installations near borders

    International Nuclear Information System (INIS)

    1977-01-01

    This Agreement signed on 27 September 1977 lays down that the Contracting Parties will inform each other about all nuclear installations constructed along the common border. Nuclear installations within the meaning of the Agreement are installations for the production, processing, reprocessing, manufacture or fission of nuclear fuels and radioactive waste storage. The information to be communicated includes plans and decisions on siting, construction and operation of such installations and relevant documents. The Agreement provides for consultation between the Parties on safety aspects and lays down in detail all the conditions for communication of information. (NEA) [fr

  12. THE SOCIO-ECONOMIC IMPORTANCE OF PROGRAMS FOR THE FINANCING OF CROSS-BORDER COOPERATION

    Directory of Open Access Journals (Sweden)

    Mioara BORZA

    2015-12-01

    Full Text Available The topic of European funding shows a great interest for present and, especially, for the future. The common problems of areas implied in the cross-border programs are correlated to socio-economic development of communities. By this paper we propose an analysis, by inventory type, descriptive and qualitative, of implemented projects and of the perspectives for projects in 2014-2020 period. The results of paper consist in identification of solid arguments about the importance and necessity of these programmes and projects.

  13. PROSPECTS OF COOPERATION OF BORDER REGIONS OF THE SOUTH OF RUSSIA AND SOUTHEAST OF UKRAINE: MEDIUM-TERM SCENARIO

    Directory of Open Access Journals (Sweden)

    Inna Mitrofanova

    2015-10-01

    Full Text Available In article the main competitive advantages of the region «Donbass», the priority directions of long-term development of a border territorial and economic complex of the Rostov region are revealed; potential of the remaining economic relations between social-production complexes of the republics of Donetsk people’s Republic, Lugansk people’s Republic and Russia, taking into account activation of integration processes in the Russian economy in the sphere of monetary circulation is opened; formats of economic cooperation between the Ukrainian and Russian regions capable to give incentive for restoration of development of the industry of Donbass are considered, will open new sales markets of production.

  14. Border markets

    DEFF Research Database (Denmark)

    Walther, Olivier

    2014-01-01

    The objective of this issue of Articulo – Journal of Urban Research is to examine the characteristics of border markets in a comparative perspective. In this introductory paper, I first discuss what makes African border markets different from other markets, and examine several factors that explain...... their unequal economic development: the presence of a trade community, the combination of trading and productive activities, and the relative porosity of borders. In a second part, I examine how border markets on the U.S.-Mexico border must simultaneously guarantee the security of the state while favoring...... regional trade. The last part of the paper argues that more policy attention should be paid to border markets which, despite being at the margin of states, are a vital component of their economy. Fifty years after most West African states became independent and just as NAFTA turns 20, it is high time...

  15. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  16. Maritime Security Cooperation in the Strait of Malacca

    National Research Council Canada - National Science Library

    Massey, Anthony S

    2008-01-01

    .... This change can be attributed to the relaxation of historical tensions, the recognition of a common threat in piracy and maritime terrorism, an increase in extra-regional pressure to cooperate...

  17. Some aspects of cross-border cooperation in euroregions of the Czech Republic on example of the Šumava region

    Czech Academy of Sciences Publication Activity Database

    Cetkovský, Stanislav; Klusáček, Petr; Martinát, Stanislav; Zapletalová, Jana

    2007-01-01

    Roč. 15, č. 1 (2007), s. 43-55 ISSN 1210-8812 R&D Projects: GA AV ČR IAA7118301 Institutional research plan: CEZ:AV0Z30860518 Keywords : Euroregions * cross-border cooperation * Šumava * regional development * environmental protection * Czech Republic Subject RIV: DE - Earth Magnetism, Geodesy, Geography

  18. Developing Distance Learning Environments in the Context of Cross-Border Cooperation

    Directory of Open Access Journals (Sweden)

    Sebastian Fuicu

    2017-04-01

    Full Text Available By using a plethora of technologies and formats, the distance learning paradigm offers access to education through a large spectrum of subjects which are situated in different geographic areas. This paper presents the successful collaboration between Politehnica University of Timisoara, Romania, and the Technical Faculty "Mihajlo Pupin" of Zrenjanin, Serbia, which offer a low maintenance cooperation model based on a web cast system that allows subjects from both countries to have access to each other’s educational material. The aim of this project is to raise the interest of pupils, students and graduates to the latest information regarding technical content used in the IT industry. The access takes place in real time and from the distance without the necessity of being present in order to receive the information. The obtained results are very encouraging regarding the usage of such a distance learning environment and the further development of such tools and cooperation.

  19. Secure Border Gateway Protocol and the External Routing Intrusion Detection System

    National Research Council Canada - National Science Library

    Kent, Stephen

    2000-01-01

    .... The Secure BGP projects designed a secure, scalable, deployable architecture (S-BGP) for an authorization and authentication system that addresses most of the security problems associated with BGP...

  20. Mariposa port of entry bottleneck study : facilitating efficient, secure and economical cross-border transportation movements.

    Science.gov (United States)

    2008-10-01

    The Arizona-Sonora border has become increasingly important to both states economy : due to increased trade between the regions following the 1994 passage of the North American : Free Trade Agreement (NAFTA) and the establishment of maquiladora in...

  1. Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues

    National Research Council Canada - National Science Library

    Morgan, Daniel; Krouse, William

    2005-01-01

    .... This report provides an overview of biometric technologies and the major U.S. biometric border screening systems, including US-VISIT, and discusses issues such as cost, performance, and user acceptance...

  2. The Securitization of Migration: An Analysis of United States Border Security and Migration Policy Toward Mexico

    Science.gov (United States)

    2013-03-01

    constituted officer of the law , or to prevent the commission of a felony.109 On 27 February 1925, the U.S. Congress passed Public Law 502 (PL502), which...INS Immigration and Naturalization Service IRCA Immigration Reform and Control Act MOU Memorandum of Understanding NAFTA North American Free...major border communities, law enforcement officials conduct patrols behind massive fences while floodlights illuminate the border at night in an

  3. The Hammer and the Anvil: The Need for A Comprehensive Southwest Border Security Strategy

    Science.gov (United States)

    2010-06-02

    ublic figures voiced concern about the “war on drugs,” the right level and kind of immigration, problems along the southwest border, migration , crises...thesis, Naval Postgraduate School, 2006), 1. 27 K. Larry Stores, Mexico-U.S. Dialogue on Migration and Border Issues 2001-2005, (Washington, DC...13 Seven organized crime families operate the drug trade in and from Mexico. The Sinaloa Federation is a cocaine smuggling organization headed by

  4. Theoretical Aspects of Cross-border Integration-based Economic Cooperation

    Directory of Open Access Journals (Sweden)

    Bilchak V.

    2014-09-01

    Full Text Available In this article the author analyses theoretical aspects of border economy in the conditions of modern processes of integration. The author describes the existing schools and concepts of integration stressing the role of government regulation relating to the deformations in the development of the world economic mechanism. Modern studies focus on the evolution of integration processes, which has largely affected the key elements of the world economic mechanism from classical political economy, monopoly regulation. This resulted in monopolistic competition, imperfect competition, and oligopoly – largely, through all fields and poles of economic growth to certain elements of government regulation and social reproduction on the international scale. The author examines the key elements and stages of economic integration. These stages assume a number of consecutive forms: free trade zone, customs union, common market, complete economic integration, and economic union. The article shows that the transition occurs from the lowest to the highest stages — from the processes of integration involving, firstly, trade market and then capital and labour markets to the integration of social sphere. The theoretical aspects of all these transformations can be easily traced in the case of EU integration processes.

  5. Indonesian Maritime Security Cooperation In the Malacca Straits

    Science.gov (United States)

    2015-06-01

    Chokepoints,” July 2, 2005, http://www.wallstreetbear.com/board/view.php?topic=31801&post=103853. 86 Sam Bateman , Joshua Ho, and Jane Chan, Good...Cooperation as Part of the Solution to Piracy—The Importance of ReCAAP in Southeast Asia.” Master’s thesis, Lund University, 2012. Bateman , Sam, Joshua

  6. Secure Cooperative Data Access in Multi-Cloud Environment

    Science.gov (United States)

    Le, Meixing

    2013-01-01

    In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…

  7. High reliability - low noise radionuclide signature identification algorithms for border security applications

    Science.gov (United States)

    Lee, Sangkyu

    Illicit trafficking and smuggling of radioactive materials and special nuclear materials (SNM) are considered as one of the most important recent global nuclear threats. Monitoring the transport and safety of radioisotopes and SNM are challenging due to their weak signals and easy shielding. Great efforts worldwide are focused at developing and improving the detection technologies and algorithms, for accurate and reliable detection of radioisotopes of interest in thus better securing the borders against nuclear threats. In general, radiation portal monitors enable detection of gamma and neutron emitting radioisotopes. Passive or active interrogation techniques, present and/or under the development, are all aimed at increasing accuracy, reliability, and in shortening the time of interrogation as well as the cost of the equipment. Equally important efforts are aimed at advancing algorithms to process the imaging data in an efficient manner providing reliable "readings" of the interiors of the examined volumes of various sizes, ranging from cargos to suitcases. The main objective of this thesis is to develop two synergistic algorithms with the goal to provide highly reliable - low noise identification of radioisotope signatures. These algorithms combine analysis of passive radioactive detection technique with active interrogation imaging techniques such as gamma radiography or muon tomography. One algorithm consists of gamma spectroscopy and cosmic muon tomography, and the other algorithm is based on gamma spectroscopy and gamma radiography. The purpose of fusing two detection methodologies per algorithm is to find both heavy-Z radioisotopes and shielding materials, since radionuclides can be identified with gamma spectroscopy, and shielding materials can be detected using muon tomography or gamma radiography. These combined algorithms are created and analyzed based on numerically generated images of various cargo sizes and materials. In summary, the three detection

  8. The impact of security on cooperative awareness in VANET

    NARCIS (Netherlands)

    Feiri, Michael; Petit, Jonathan; Schmidt, R.; Kargl, Frank

    2013-01-01

    Vehicular networking enables new safety applications that aim at improving roads safety. Because of their direct relation to driver's safety, this goal can only be achieved if vehicular networking is based on a technology that is robust against malicious attackers. Therefore, security mechanisms

  9. Security challenges for cooperative and interconnected mobility systems

    NARCIS (Netherlands)

    Bijlsma, T.; Kievit, S. de; Sluis, H.J.D. van de; Nunen, E. van; Passchier, I.; Luiijf, H.A.M.

    2013-01-01

    Software is becoming an important part of the innovation for vehicles. In addition, the systems in vehicles become interconnected and also get external connections, to the internet and Vehicular Ad hoc NETworks (VANETs). These trends form a combined security and safety threat, because recent

  10. security co-operation in the southern african development

    African Journals Online (AJOL)

    Arianne

    security and stability) are driven by national interest rather than regional interest – as realists argue ... For a long time, institutions were at the heart of political science and ..... insecurity and political instability” (Ndlovu, 2006:7). The thrust of his ...

  11. Secure Multiparty Computation for Cooperative Cyber Risk Assessment

    Science.gov (United States)

    2016-11-01

    that the organizations can compute relevant statistics and analyses on the global infrastructure while still keeping the details of their local...mitigation. In Australasian Conference on Information Security and Privacy, pages 391–401. Springer Berlin Heidelberg, 2004. [5] Fabrizio Smeraldi and Pasquale

  12. IAEA to Cooperate with Japan on Nuclear Security at 2020 Olympic Games in Tokyo

    International Nuclear Information System (INIS)

    2018-01-01

    The International Atomic Energy Agency (IAEA) and the Government of Japan signed an agreement today aimed at enhancing nuclear security measures for the summer Olympic Games and Paralympic Games in Tokyo in 2020. The agreement follows previous IAEA support to major public events, including the 2016 Olympic Games in Rio de Janeiro and the 2012 European soccer championship in Poland and Ukraine. IAEA Director General Yukiya Amano and Japanese Foreign Minister Taro Kono presided over the signing ceremony at the Agency’s headquarters in Vienna. Practical Arrangements outlining the planned cooperation were signed by IAEA Deputy Director General Juan Carlos Lentijo, head of the Department of Nuclear Safety and Security, and H.E. Mitsuru Kitano, Japan’s Ambassador to the International Organizations in Vienna. “The IAEA has extensive experience in supporting Member States on nuclear security for major public events,” Amano said at the ceremony. “The Agency welcomes the cooperation to support the Olympic and Paralympic Games in Tokyo, and is already cooperating with Japan by sharing the experiences of Member States which previously hosted the Olympics.” The details of the cooperation will be decided in due course, but the possible areas of cooperation include the IAEA offering Japanese authorities training courses, workshops, technical visits and exercises related to nuclear security, hosting preparatory technical meetings and lending supplementary radiation detection equipment. The IAEA and Japan may also exchange information related to nuclear security events as appropriate and through the cooperation, the IAEA will also benefit from Japan’s good practices on nuclear security.

  13. Mission impossible or border security – Practical and effective infection control on air ambulances

    Directory of Open Access Journals (Sweden)

    M. Kuhn*

    2013-12-01

    These principles have been applied to our air ambulance system based from Lanseria International Airport. By combining preventative and control measures, there has been no breach in our infection control strategies, as evidenced by no growth noted on specific and random swabs even when more and more ”super bugs” are being identified in hospital. As an air ambulance service flying patients from various African countries, we have the responsibility to conduct our own ”Border Security” to keep our hospitals, patients, aircraft and crews clean and safe. In this presentation we will share our ”Border Security” principles and experiences with the audience.

  14. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  15. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  16. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2017-05-01

    Full Text Available In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  17. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  18. Remote monitoring in safeguards: Security of information and enhanced cooperation

    International Nuclear Information System (INIS)

    Galdoz, Erwin; Calzetta, Osvaldo; Fernández Moreno, Sonia; Llacer, Carlos; Díaz, Gustavo; Vigile, Sebastián; Brunhuber, Christoph

    2011-01-01

    Unattended systems with remote transmission capabilities (RM) have the potential to improve safeguards efficiency. Moreover, the evolution of technology and the steady growing of nuclear materials subject to control, lead modern safeguards increasingly utilizing unattended equipment with the capability to store relevant data for long periods of time coupled with the option of being remotely accessed and checked. Remote inspection is still a concept under development, but it may end to be a powerful more efficient verification modality in medium term future. An important part of drawing meaningful safeguards conclusions rests on authenticity and reliability of the information on nuclear material and facilities acquired through the various verification activities and measures applied by IAEA and regional safeguards organizations, like ABACC. The increasing utilization of such technology to further optimize safeguards responds to a multifaceted environment where security of information for all relevant parties is of utmost importance. From the point of view of the IAEA and ABACC, the use of any technology for safeguards application, and specially the use of RM, requires to ensure the security of data collected to guarantee the validity and veracity of such information throughout the whole process (e.g., from collecting to reviewing). This is also valid to the SSAC involved in the process. Information security is also relevant for States and Operators. Assurance should be given that the information could not be withdrawn by non-authorized entities and that facility data is also fully secured. Another important aspect related to RM that may also fall in the security aspect of safeguards relevant information that merits further consideration, is the sharing of information between organizations like ABACC and the IAEA as well as the possibility to make this data available for States authorities purposes. This paper discusses three main themes related to RM: (i) the extent

  19. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    Science.gov (United States)

    2015-12-01

    Yoong Lee, ASEAN Matters: Reflecting on the Association of Southeast Asian Nations (Singapore; Hackensack, NJ: World Scientific., 2011), i, http...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast...In the mid-2000s, the increasing number of piracy and armed robbery activities in the Malacca Straits attracted world attention and attributed to the

  20. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  1. Bordering on Failure: Mexican Instability, Drug Wars, and the Threat to U.S. Security

    Science.gov (United States)

    2012-04-19

    NAFTA was that Mexico had to demonstrate it was not a one party political system; thus, the PRI began to loosen its suppression of opposition...are recruiting Texas school age children to support Cartel operations. The border region constitutes 9.4% of the state’s population and now has

  2. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  3. Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq

    Science.gov (United States)

    2007-12-01

    was a predictable outcome and casts doubt as to whether or not airpower security cooperation can realistically dissuade states from attempting to...in the Middle East and South Asia, ed. Shelly A. Stahl and Geoffrey Kemp (New York: St. Martin’s Press, 1992) 221-227. 48 airpower security...Policy Toward Arms Transfers to the Middle East,” in Arms Control and Weapons Proliferation in the Middle East and South Asia, ed. Shelly A. Stahl and

  4. A NEW FORM OF SECURITY COOPERATION AND COLLECTIVECONFLICT MANAGEMENT IN THE POST COLD WARINTERNATIONAL SYSTEM

    Directory of Open Access Journals (Sweden)

    Sinem KOCAMAZ

    2011-01-01

    Full Text Available International security environment changed completely after the Cold War.During the Cold War years security challenges wereshaped by competitive powerrelations between Soviet Union and the United States. On the other hand after theend of the Cold War, global security was redefinedand wide range of securitychallenges and threats occurred. After fragmentation of security threats, newthreats emerged such as terrorist attacks, massacres which are made by humansown governments, chronic politic instabilities, environmental degradations etc.Under these circumstances new forms of security cooperation became more vitalin order to cope with these complex challenges. Inthis respect third partiesbecame an actor to manage conflicts, security challenges and crises. Unliketraditional nation-state intervention, regional organizations, international agenciesand non-governmental organizations became more active in conflict managementprocess. In this framework this study will evaluateperformance and theeffectiveness of the main actors in the collectiveconflict management (CCMprocess.

  5. Kazakhstan's Chairmanship of the Organization for Security and Cooperation in Europe: An Assessment

    Directory of Open Access Journals (Sweden)

    - Shirin Akiner

    2011-06-01

    Full Text Available Massive international comment and analysis was devoted to the Kazakhstan's Chairmanship in the Organization for Security and Cooperation in Europe (OSCE. No previous candidate for this office received such treatment. Kazakhstan's agenda of aims and objectives included important issues. During the year several steps were taken towards implementing Kazakhstan's agenda.

  6. 78 FR 65300 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2013-10-31

    ... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY... from the WHINSEC Commandant; Department of State; US Northern Command and US Southern Command; the...

  7. 77 FR 20369 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2012-04-04

    ... Defense (Policy); Department of State; US Northern Command and US Southern Command as well as receive... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...

  8. 76 FR 39076 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2011-07-05

    ... Defense (Policy); Department of State; US Northern Command and US Southern Command meeting on December 3rd... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...

  9. U.S.-Mexican Security Cooperation: the Merida Initiative and Beyond

    Science.gov (United States)

    2010-08-16

    2010, those funds had yet to be transferred from the State Department to USAID for implementation. 71 “Cárteles Perturban al Sistema Carcelario,” El...Quejas a Web .” Milenio. July 28, 2010. U.S.-Mexican Security Cooperation: the Mérida Initiative and Beyond Congressional Research Service 27

  10. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  11. Asia-Europe cooperation on energy security an overview of options and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, F.; Godement, F.; Yakushiji, T

    2005-07-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions.

  12. Asia-Europe cooperation on energy security an overview of options and challenges

    International Nuclear Information System (INIS)

    Nicolas, F.; Godement, F.; Yakushiji, T.

    2005-01-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions

  13. Security of Supply: A Pan-European Approach - The Opportunities and Requirements of Greater Cooperation Across European Electricity Markets

    International Nuclear Information System (INIS)

    Ulreich, S.

    2015-01-01

    In December 2014, Prognos AG (Berlin/Basel) was commissioned by the Weltenergierat - Deutschland e.V to prepare a study on the potential of greater cooperation across European electricity markets. The focus of the analysis was to address the extent to which closer cooperation on ensuring generation adequacy can lead to cost reductions. Fifteen countries were analysed: seven members of the Pentalateral Energy Forum (PLEF, DE, BE, NL, LU, FR, AT and CH) and eight additional bordering countries (PL, IT, UK, ES, DK, CZ, PT and IE). Today, ensuring generation adequacy takes place at a national level and international effects are not taken into account. However, if cross-border effects are considered adequacy considerations at a national level can be relieved, e.g.: load peaks in Europe do not occur simultaneously and the feedin from renewable energy takes place at different times. Potential savings arise, as less capacity needs to be secured by conventional power plants. An indicator for this in the present study is the so-called residual load. The study is based on analyses of all existing data relating to hourly load and feed-in from renewable energy for the period from 2009 to 2014. In addition, two scenarios (based on Visions V1 and V3 of ENTSO-E's System Outlook and Adequacy Forecast) and numerous sensitivities for 2030 were generated. As the variability of the results is highly dependent on weather conditions, 48 simulations of wind power (sensitivities) established a broad corridor of results. For this reason, ranges are used in the presentation of results. The approach makes this study the most comprehensive analysis to date of the potential of closer cooperation with respect to ensuring generation adequacy. With the assumption of no grid congestion, the study reaches the following results: 1) Reduction of residual load: In contrast to a national assessment scheme, under a collective assessment scheme the residual load will reduce by 2 to 15 gigawatts (most

  14. NATO-EU PARTNERSHIP: FOSTERING RESILIENCE FOR A COOPERATIVE SECURITY SPACE

    Directory of Open Access Journals (Sweden)

    Octavia MOISE

    2017-12-01

    Full Text Available Present events indicate an encompassing process of multi-level changes - political, military, economic, and technological that highlights the idea that we are going through a phase of transition at systemic level that is redesigning the structure of power of the 21st century. This paper will try to find out first if the cooperative security concept can be seen as a security theory according to Baldwin’s criteria and second if NATO’s partnership policy in general and the NATO EU partnership in particular can foster resilience. The objectives of this article are to envisage the role of the NATO-EU partnership in the future by: reviewing the theoretical approaches on cooperative security, analysing NATO’s partnership policy, analysing the ability of NATO-EU partnership to foster resilience.

  15. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  16. Cross-Border Cooperation (CBC in Southern Europe—An Iberian Case Study. The Eurocity Elvas-Badajoz

    Directory of Open Access Journals (Sweden)

    Rui Alexandre Castanho

    2017-03-01

    Full Text Available The experiences of cross-border cooperation (CBC, undertaken not only in Europe but throughout the world, have enabled areas to gain greater importance in recent decades at an international level, showing potential for integrative functions and joint development as exemplified by several CBC projects. The present paper assesses the impact of CBC projects by analyzing a protocol established in 2013 between the cities of Elvas and Badajoz, which induced the creation of the Eurocity Elvas-Badajoz. The paper kicks off with a critical review on territorial factors for success in CBC areas, considering the analysis of several case studies throughout Europe. The lessons learned, taken from the analyzed case studies, and the identified territorial success factors were used as assessment points for the investigation of the target study area, the Eurocity ElvasBadajoz. The investigation explores public participation perceptions towards the identification of what changes with respect to standards of life with the CBC project, providing the current state of affairs and identifying where to place efforts in order to reach sustainable development for the region. While being a transition area, it presents several opportunities for growth. These opportunities have not yet been object of analysis and debate with respect to lasting, sustainable successful growth. The present research enables the identification of several territorial factors for success in the study area, such as the connectivity/movement between cities and strong political commitment. From the identified critical factors, it was possible to highlight the importance of public transportation as a priority for achieving success in this CBC project.

  17. Conflict and cooperation in cyberspace the challenge to national security

    CERN Document Server

    Yannakogeorgos, Panayotis A

    2016-01-01

    Facilitated by the exceptional handiwork of the editors, this book significantly advances the effort to achieve common ground in the debates regarding cyberspace. National security and cyber-related professionals will find it equally useful in their work.-Lt. Gen Bob Elder, USAF (Retired)In this wide-ranging anthology that encompasses expert viewpoints from military, civilian, and private sector contributors, the editors seek to provide a broad framework of issues to be considered. Rather than provide definitive answers (all of the contributors readily admit that none exist), the contributors state that in order to attain the right answers, we must first ask the right questions. Over the course of the book, the authors put forth a common set of concerns to frame the issue at hand. ... The authors undertake a study of how to apply cyber law to cyber war, warning that allowing the Intelligence Community and the military to assist in the defense of privately owned networks may lead to legal and political consequ...

  18. United States-Gulf Cooperation Council Security Cooperation in a Multipolar World

    Science.gov (United States)

    2014-10-01

    in U.S.-forged security alliances . Finally, the events of the Arab Spring beginning in 2010, which swept away several governments and have led to...wealthiest countries on a per capita basis. Storming ahead with post-modern skylines, and rapidly growing nonoil sectors such as tourism , culture, real...estate, and finance, many GCC members are now economic political brands in their own right, ranging from Dubai’s metropolism to Qatar’s knowledge

  19. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  20. A sequential-move game for enhancing safety and security cooperation within chemical clusters

    International Nuclear Information System (INIS)

    Pavlova, Yulia; Reniers, Genserik

    2011-01-01

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided.

  1. A sequential-move game for enhancing safety and security cooperation within chemical clusters.

    Science.gov (United States)

    Pavlova, Yulia; Reniers, Genserik

    2011-02-15

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.

  2. Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues

    National Research Council Canada - National Science Library

    Morgan, Daniel; Krouse, William

    2005-01-01

    In its final report, the 9/11 Commission concluded that funding and completing a "biometric entry-exit screening system" for travelers to and from the United States is essential to U.S. national security...

  3. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  4. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  5. Future regional nuclear fuel cycle cooperation in East Asia: Energy security costs and benefits

    International Nuclear Information System (INIS)

    Hippel, David von; Hayes, Peter; Kang, Jungmin; Katsuta, Tadahiro

    2011-01-01

    Economic growth in East Asia has rapidly increased regional energy, and especially, electricity needs. Many of the countries of East Asia have sought or are seeking to diversify their energy sources and bolster their energy supply and/or environmental security by developing nuclear power. Rapid development of nuclear power in East Asia brings with it concerns regarding nuclear weapons proliferation associated with uranium enrichment and spent nuclear fuel management. This article summarizes the development and analysis of four different scenarios of nuclear fuel cycle management in East Asia, including a scenario where each major nuclear power user develops uranium enrichment and reprocessing of spent fuel individually, scenarios featuring cooperation in the full fuel cycle, and a scenario where reprocessing is avoided in favor of dry cask storage of spent fuel. The material inputs and outputs and costs of key fuel cycle elements under each scenario are summarized. - Highlights: → We evaluate four scenarios of regional nuclear fuel cycle cooperation in East Asia and the Pacific. → The scenarios cover fuel supply, enrichment, transport, reprocessing, and waste management. → We evaluate nuclear material flows, energy use, costs, and qualitative energy security impacts. → Regional cooperation on nuclear fuel cycle issues can help to enhance energy security. → A regional scenario in which reprocessing is rapidly phased out shows security and cost advantages.

  6. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  7. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    Science.gov (United States)

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  8. «Goroda-bliznecy»: novaja forma prigranichnogo sotrudnichestva v Baltijskom regione? [Twin cities: a new form of cross-border cooperation in the Baltic Sea Region?

    Directory of Open Access Journals (Sweden)

    Anishenko Anatoly

    2012-01-01

    Full Text Available The paper demonstrates the first attempt in Russian political studies to conduct a comprehensive analysis of the “twin city” movement as a form of cross-border cooperation in the Baltic region. This phenomenon emerged as a result of a global tendency towards more active involvement of municipal units in international cooperation, on the one hand, and aspirations of frontier cities and towns in the Baltic region to solve common problems together, on the other hand. This work is based on a comparative analysis method and a case study methodology. The authors consider four examples (city pairs: Tornio — Haparanda, Valga — Valka, Narva — Ivangorod and Imatra — Svetogorsk. The article specifies the terminological framework used in this field of research. The authors analyse achievements and failures of this type of international inter-municipal cooperation and emphasise that for twin cities it served not only as a means of survival in the difficult situation of the 1990s, but also as an experimental ground for new forms of crossborder cooperation. The authors arrive at the conclusion that this model proves to be promising for further development of integration processes in the Baltic region. This practice can be applied by Russian municipal, regional and federal authorities in promotion of cross-border cooperation not only in the Baltic region, but also in other regions of the country. Thus, influenced by the successful experience of Baltic frontier cities and towns, the Russian city of Nikel and the Norwegian city of Kirkenes decided to adopt this model for further development of their cooperation.

  9. The Role of Vietnam in The ASEAN Regional Security Cooperation: From Mechanism Construction to Dispute Settlement

    Directory of Open Access Journals (Sweden)

    Li Chunxia

    2016-12-01

    Full Text Available In the context of the integration of ASEAN, Vietnam recognized that the strategic role of ASEAN is in its diplomacy. At the same time, to further improve the status in the region and in the international community, Vietnam has actively been participating in ASEAN affairs. Vietnam not only promoted the integration process of ASEAN, but also promoted the political security cooperation of ASEAN, in which Vietnam has advantages and wants to play a leading role. On the one hand, Vietnam promotes the construction of political security cooperation mechanisms, such as ARF, ADMM+, and so on; on the other hand, Vietnam took the South China Sea as a common concern, actively appeals for a common ASEAN position, to maximize its own benefit. Vietnam will further enhance and consolidate its status and role in ASEAN in the future.

  10. Department of Defense and Security Cooperation: Improving Prioritization, Authorities, and Evaluations

    Science.gov (United States)

    2016-03-09

    March 9, 2016 Chairman Fischer , Ranking Member Nelson, and distinguished members of the subcommittee, thank you for the opportunity to testify...on the important subject of U.S. security cooperation. It’s a pleasure to appear before you today along with my colleagues, Jeff Eggers and Melissa...based evaluations. Chairman Fischer , Ranking Member Nelson, and members of the subcommittee, I appreciate the opportunity to offer this testimony, and I look forward to assisting the committee in its vital work.

  11. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling; Yang, Liang; Chen, Jianchao; Alouini, Mohamed-Slim

    2018-01-01

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  12. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling

    2018-02-02

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  13. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  14. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  15. Workplace and security stressors and mental health among migrant workers on the Thailand-Myanmar border.

    Science.gov (United States)

    Meyer, Sarah R; Decker, Michele R; Tol, Wietse A; Abshir, Nada; Mar, Aye Aye; Robinson, W Courtland

    2016-05-01

    Migrant workers in low-resource settings may experience multiple types of workplace and security-related stressors. This study explores the relationship between these stressors and adverse mental health outcomes, through a study of migrant workers from Myanmar, working in agriculture, factory, and sex industries in and around Mae Sot, Thailand. Respondent-driven sampling was used to recruit a total sample of 589 male and female migrants. Trained data collectors administered a survey, which included measures of workplace and security-related stressors, and depression and anxiety symptoms. Multivariate regression models were conducted separately for depression and anxiety symptoms. For male agricultural workers, security stressors (β = 1.9, p = .001) are associated with an increase in depression symptoms and coercive working conditions are associated with an increase in anxiety symptoms (β = .8, p = .000). For female agricultural workers, daily hassles and stressors were associated with both depression (β = 1.5, p = .000) and anxiety (β = .5, p = .027), and barriers to exit (β = 3.0, p = .005) and security stressors (β = .9, p = .010) were significantly associated with increased depression symptoms. In the factory subsample, sexual assault and abuse (depression: β = 2.7, p = .009; anxiety: β = 2.8, p = .002) and daily hassles and stressors (depression: β = .7, p = .007; anxiety: β = .7, p = .001) were both significantly associated with increased depression and anxiety symptoms for males. Other categories of stressors similarly showed different associations with mental health outcomes between occupational groups, and between male and female migrant workers. The differing influences of stressors on mental health between the three occupational groups, and between males and females, indicate the need for targeted and tailored approaches to reduce specific stressors and improve services to address mental health needs

  16. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  17. Effects of cross-border power trade between Laos and Thailand: Energy security and environmental implications

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    This paper analyzed the effects of hydropower development in Laos and power trade between Laos and Thailand on economy wide, energy resource mix, power generation capacity mix, energy system cost, environment, as well as, energy security. A MARKAL-based model for an integrated energy system of Laos and Thailand was developed to assess the effects of energy resource development and trade to meet the national energy demands of the two countries. Two national MARKAL-based energy system models of Laos and Thailand were formulated for the study. The results show that 80% exploitation of water resource in Laos would induce power trade between the countries. The integrated energy system cost is found to decrease marginally but it would mitigate the CO 2 emission by 2% when compared with the base case. Thailand is expected to gain benefit from the increased level of power imported from Laos in terms of the lower energy system cost, better environmental quality and, greater diversification of energy sources. As compared to the base case, Laos would become the net energy exporter, earn significant export revenue, and improve the increase in revenue of energy export per increase in total energy system cost from the maximum exploitation of hydropower resource.

  18. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  19. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    Directory of Open Access Journals (Sweden)

    Zhen Li

    2016-03-01

    Full Text Available The Internet of Things (IoT is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones. Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR at the eavesdropper subject to the Quality of Service (QoS constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI. By using Semi-Definite Programming (SDP, the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the

  20. Cooperación técnica en salud entre Colombia y sus países fronterizos Technical cooperation for health between Colombia and bordering countries

    Directory of Open Access Journals (Sweden)

    Yamileth Ortiz Gómez

    2011-08-01

    Full Text Available OBJETIVO: Caracterizar la cooperación técnica de Colombia con cuatro de sus países fronterizos y determinar las necesidades de formación de sus grupos técnicos binacionales (GTB. MÉTODOS: Investigación cualitativa basada en la revisión documental y en información suministrada por actores clave de este campo. Para explorar las necesidades de capacitación se aplicó una encuesta con los GTB de Colombia y Ecuador, la cual fue profundizada a través de grupos de discusión; se aplicaron técnicas de categorización deductiva e inductiva, y de triangulación por convergencia. RESULTADOS: Se obtuvieron 18 acuerdos/convenios y documentación de 12 proyectos de cooperación sanitaria en zona de frontera. La mayoría de los proyectos encontrados correspondían a cooperación multilateral. Los dos temas de cooperación priorizados fueron el Reglamento Sanitario Internacional y los Objetivos de Desarrollo del Milenio 6 y 7. Los GTB consideraron necesario un proceso de capacitación en gestión, diplomacia en salud y desarrollo de capacidades para la cooperación en ámbitos fronterizos. CONCLUSIONES: Las fronteras se exhibieron como escenarios complejos de intervención, donde el derecho internacional y la política exterior han delimitado las acciones de cooperación. Al definir la capacitación de los GTB, se sugiere considerar el marco normativo nacional e internacional y el contexto de las áreas fronterizas.OBJECTIVE: Characterize the technical cooperation of Colombia with four bordering countries and determine the training needs of the binational technical groups (BTGs. METHODS: Qualitative investigation based on document review and information provided by key actors in this field. To explore training needs, a survey of Colombia-Ecuador BTGs was conducted. Further information was obtained through discussion groups. Deductive and inductive categorization techniques were applied, as well as convergence using the triangulation method. RESULTS

  1. U.S. Security Cooperation with India and Pakistan: A Comparative Study

    Science.gov (United States)

    2013-06-01

    news_and_features/. /07indicipline_force.htm. 284 Richard Van Atta et al ., “Export Controls and the U.S. Defense Industrial Base,” Institute for Defense...Kargil War,” Indian Defense and Strategic Analysis, November 17, 2012. Available at defenceforumindia.com › Opinion › History. Atta, Richard Van et al ...This document was downloaded on August 22, 2013 at 10:36:47 Author(s) Bajwa, Shahid Latif Title U.S. security cooperation with India and Pakistan

  2. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming

    KAUST Repository

    Park, Kihong

    2013-09-01

    In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods. © 1983-2012 IEEE.

  3. Canada and Mexico Border Crossings

    Data.gov (United States)

    Department of Homeland SecurityBorder Crossing Ports are points of entry for land modes along the U.S. - Canadian and U.S.- Mexcian borders. The ports of entry are located in 15 states along the...

  4. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  5. The problem of Indonesia’s leadership in ASEAN political and security cooperation

    Directory of Open Access Journals (Sweden)

    A. G. Smorzhevska

    2017-07-01

    Full Text Available The study is dedicated to modern approaches and policy of the Republic of Indonesia toward the process of regional integration in Southeast Asia. Key aspects and instruments of Indonesia’s increasing contribution in strengthening of the political and security cooperation between members of ASEAN have been explained by the researcher. The aim of the article is to identify the role of Indonesia in conduction of multilateral diplomacy within the framework of ASEAN political and security sphere, forms of its implementation as well as the specifics of limiting factors for such leadership. It has been argued by the author that Indonesia’s commitments to ASEAN and its desire to promote or inhibit the process of regional integration vary depending on policy areas and level of compliance to its national interests. Consequently, Indonesia’s main interests and priorities concerning the ASEAN integration process lie in security and defense sphere. Indonesia’s key role in building of the ASEAN Political and Security Community is to provide ideas and political concepts as well as to shape the regional agenda. Therefore, the country implements the relevant agreements and puts forward a number of regional initiatives in foreign policy and defense. Moreover, assuming the fact that direct regional mechanisms of conflict resolution has not been fully implemented yet, Jakarta works on its development, acting as a mediator and a reliable regional partner. In addition, it is worth to underline that Jakarta makes substantial contribution to regional efforts in counterterrorism. The benefit of this study is that it takes into consideration the specifics of the factors that reveal the limitations for leadership in the security sphere. The core principles of ASEAN functioning determine the degree and nature of Member States’ leadership in the region. The material power resources and implementation on power through coercion gave way to soft instruments of

  6. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    Science.gov (United States)

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  7. OPNET Modeler Simulation Testing of the New Model Used to Cooperation Between QoS and Security Mechanisms

    Directory of Open Access Journals (Sweden)

    Jan Papaj

    2012-01-01

    Full Text Available In this article the performance analysis of the new model, used to integration between QoS and Security, is introduced. OPNET modeler simulation testing of the new model with comparation with the standard model is presented. This new model enables the process of cooperation between QoS and Security in MANET. The introduction how the model is implemented to the simulation OPNET modeler is also showed. Model provides possibilities to integration and cooperation of QoS and security by the cross layer design (CLD with modified security service vector (SSV. An overview of the simulation tested of the new model, comparative study in mobile ad-hoc networks, describe requirements and directions for adapted solutions are presented. Main idea of the testing is to show how QoS and Security related services could be provided simultaneously with using minimal interfering with each service.

  8. Track 7: policy and public interest U.S.-Russian nuclear security cooperation: navigating the present realities. Panel Discussion

    International Nuclear Information System (INIS)

    Hayden, N.K.; Hayden-Prindle, Nancy; McCarthy, Maureen; Rich, John; Graham, Thomas Jr.; Mizin, Victor; Cagan, Debra; Alessi, Vic

    2001-01-01

    Full text of publication follows: In the 10 yr since the beginning of cooperation between the United States and the Russian Federation on nuclear security and nonproliferation issues, the political, economic, and security environment governing the nuclear security cooperation has evolved and, in some cases, undergone dramatic changes. On one hand, the protection of nuclear weapons and materials continues as an urgent national security concern for both the United States and Russia. At the same time, defense infrastructures have been closed or converted to civilian purposes, and there has been increased activity in international cooperation for civilian nuclear technology. This special panel will explore the future of the U.S.-Russia nuclear cooperation with particular attention to the following three themes. Theme 1: Managing the Risks: U.S.-Russian Federation Cooperative Programs for Nuclear Weapons and Materials Security; Theme 2: Creating the Benefits: The Changing Nature of Russia's Domestic Nuclear Industry; Theme 3: Addressing the Impediments: United States and Russia as Nuclear Exporters: Reconciling Nonproliferation Goals, Technology Advancements, and Economic Incentives

  9. STUDY REGARDING THE POSSIBILITY TO DEVELOP TOURISM AND CROSS-BORDER COOPERATION THROUGH A BUSINESS INCUBATOR AT VADUL CRIªULUI (BIHOR COUNTY

    Directory of Open Access Journals (Sweden)

    Attila Ambrus

    2012-07-01

    Full Text Available In this article I have presented the results of a research realized at the end of the year 2011, within the framework of the cross-border project entitled n#8222;Business incubator for cross-border tourist developmentn#8221;. This incubator will be constructed in Vadu Criºului Community, Bihor County, while the realized study intended to demonstrate the fact that such initiative on one hand will attract investors, respectively companies with activities linked directly or indirectly to tourism n#8211; because the area offers them all the necessary conditions for business development-, while on the other hand this initiative can encourage and support cross-border tourist co-operation, especially with the balneary spa resort in Hajdúszoboszló, Hungary. For this reason a questionnaire was realized, which was applied not just in the micro-region of Vadu Criºului but in Hajdúszoboszló as well, especially distributed among the economical agents that have tourism linked to their activity. The study showed not just the resources and the modalities of existing advertising but also the possibilities of cross-border co-operation as a chance to develop tourism from the two regions. In this way, the study shows the fact that in the case of the macro-region of Vadu Criºului, the extension of the tourism services must be based on the natural characteristics of the region and on highly emphasized own initiatives, rather than the initiatives and the support or the administrative authorities. In the case of the Hajdúszoboszló resort, a tendency outlines among those who consider the tourism development in the resort essential, tourism services must be diversified, and more emphasis must be put on the implication of local authorities, a chance seen in cooperation with the tourist area without similar characteristics (namely, direct non-competitor, but from the cross-border region (the opening towards the Romanian side is relevant

  10. Border installations

    International Nuclear Information System (INIS)

    Lenaerts, K.

    1988-01-01

    This chapter highlights the legal problems raised by the concept of a border installation. Using the Cattenom nuclear power plant as an example, the author describes the different stages of the legal conflict raised by construction of the plant and analyses the relationship between French administrative law and some provisions of the Euratom Treaty. Based on the Treaty, the Community institutions have adopted directives to strengthen inter-State co-operation and consultation between neighbouring countries. He observes that these principles of co-operation, consultation and vigilance already exist in public international law; however, international case law has not yet made it possible to establish the strict liability of the constructing state in case of a nuclear accident (NEA) [fr

  11. Agreement between Portugal and Spain on cooperation with regard to the safety of nuclear installations in border areas

    International Nuclear Information System (INIS)

    1980-01-01

    This Agreement provides for exchange of information on nuclear safety and radiation protection in nuclear installations likely to affect mutually the territories of Portugal and Spain. The Agreement defines the type of nuclear installation concerned, the border areas and the respective competent authorities. The competent authorities of both Parties undertake to establish in their respective territories, the systems required to detect any radiation emergency and to inform each other in cases where such emergency may affect them. The Agreement was concluded for a period of the years as from its entry into force. (NEA) [fr

  12. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  13. The Treaty of Lisbon and the European Border Control Regime

    Directory of Open Access Journals (Sweden)

    Marianne Takle

    2012-08-01

    Full Text Available The question raised in the article is how the new provisions of the Lisbon Treaty and the Stockholm programme concerning the EU’s asylum and migration policy might consolidate existing trends within the European border control regime. The regime is defined by a combination of three features: (i a harmonisation of categories among the EU/Schengen member states, (ii a growing use of new technology in networked databases and (iii an increasing sorting of individuals based on security concerns. Although none of these features is new, the combination gives a new impetus to the European border control regime. The article concludes that the Lisbon Treaty and the Stockholm programme consolidate and strengthen existing trends. This implies that policies on border control, asylum, immigration, judicial cooperation and police cooperation are consolidated in a broader approach to border control, and that there is a strengthening of EU foreign policy within the European border control regime. The boundaries between previously dispersed policy areas are blurred. The combination of different aspects of security and various levels of authority requires coordination of policies with substantially different goals, and goes beyond mere border control.

  14. Cognitive communication and cooperative hetnet coexistence selected advances on spectrum sensing, learning, and security approaches

    CERN Document Server

    Bader, Faouzi

    2014-01-01

    This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.

  15. The Korean Peninsula Energy Development Organization : implications for Northeast Asian regional security co-operation?

    International Nuclear Information System (INIS)

    Snyder, S.

    2000-01-01

    This paper identifies opportunities for co-operation on regional development and security in the North Pacific region. The Korean Peninsula Energy Development Organization (KEDO) was created in 1993 during bilateral negotiations between the United States and the Democratic People's Republic of Korea (US-DPRK) over North Korea's alleged nuclear weapons program. The negotiations resulted in an agreement to freeze North Korea's known nuclear weapons program in return for the construction of two proliferation-resistant 100 MWe light water reactors (LWR) in North Korea, and the provision of 500,000 tons of heavy fuel oil per year until the completion of the LWR construction as compensation for lost energy production capacity resulting from the shutting down of North Korea's nuclear reactors. The author described the activities of KEDO and examined its internal dynamics. The unique circumstances that produced the Agreed Framework and KEDO in response to a major international crisis of the nuclear program in the DPRK were also highlighted along with the US-DPRK bilateral agreement and the multilateral institution involving the United States, South Korea, Japan and the European Union. Financial support from Australia and Canada was discussed along with the mechanism for engaging North Korea in regularized interaction and technical cooperation. It was concluded that KEDO's record of successes and failures is mixed. The energy security issue has been identified as an area that could result in conflict among Northeast Asian countries which are increasingly dependent on oil supplies from the Middle East. In response, numerous multilateral financing mechanisms have been developed to promote joint business opportunities that exploit natural gas resources in the Russian Far East to address Japanese, Korean and Chinese energy needs. 35 refs

  16. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Directory of Open Access Journals (Sweden)

    Maoqiang Yang

    2016-11-01

    Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  17. RUSSIA›S COOPERATION WITH THE COUNTRIES OF POST-SOVIET EURASIA IN THE FIELD OF SECURITY

    Directory of Open Access Journals (Sweden)

    Sergey Valerievich Bespalov

    2016-02-01

    Full Text Available The problem of collective security remains relevant for the majority of post-Soviet Eurasia since the Soviet collapse to date.. In the article on the basis of diachronic analysis of political processes (the study of the successive in real historical time steps analyzed the formation and development of the legal framework of collective security in the post-Soviet Eurasia in relation to the real political processes in the region, the creation and development of the Treaty on Collective Security Organization, and its prospects.As a result of the military-political cooperation within the CIS has not received a significant development, Russia and its allies were forced to make a bet on the development of relations within the Treaty on Collective Security Organization.There are four areas of the Eurasian security cooperation within the Treaty on Collective Security Organization:1. Creation of a common «military umbrella» protecting the Member States of the Organization of the intrusion, including as a result of support for other-strange powers of local radical opposition. The key role played by the army and the military-industrial complex of Russia as the most powerful country in the military unit.2. The fight against international terrorism within the framework of cooperation between national security services and the Ministry of Interior.3. Prevention of large-scale intrusion of extremists from the territory of the north of Afghanistan.4. The fight against drug trafficking.Work on improving the legal framework of the Treaty on Collective Security Organization should be continued. As one of the future goals of the Organization should highlight the creation of a unified arms market, the deepening of cooperation in the development and production of weapons and other military products.

  18. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  19. Coordinated Border Management Through Digital Trade Infrastructures and Trans-National Government Cooperation : The FloraHolland Case

    NARCIS (Netherlands)

    Rukanova, B.D.; Huiden, Roel; Tan, Y.

    2017-01-01

    Digital infrastructures (DI) that support information exchange related to international trade processes (here referred to as Digital Trade Infrastructures (DTI)) have been seen as an instrument to help address the trade facilitation and security challenges. Data pipelines can be seen as an example

  20. Transgranichnoe sotrudnichestvo nepravitel'stvennyh organizacij v Pomorskom i Varmin'sko-Mazurskom voevodstvah [Cross-border cooperation between nongovernmental organisations in the Pomeranian and Warmian-Masurian voivodeships

    Directory of Open Access Journals (Sweden)

    Gomulka Christina

    2013-01-01

    Full Text Available This article is devoted to the issues of cross-border cooperation carried out by agents resident in the Pomeranian and Warmian-Masurian voivodeships. Among such agents there are non-governmental organizations. This article aims to identify the role of NGOs in cross-border cooperation and the predominant fields of their cooperation, as well as to assess their activity in attracting funding from European budgets. The article widely applies the results of surveys of NGOs conducted by the author, compares the results of performance reports submitted by these organisations within international projects, and offers the data presented in relevant publications (Euroregion Baltic documents and Phare CBC reports, Interreg IIIA and, Interreg IIIB, NMF, and Polish-Swiss Cooperation reports, as well as the data of the Central Department of Statistics. The research covers the period from the late 90s to 2012. The article highlights the difficulties agents face in forging and implementing cross-border cooperation, resulting from the mismatching definitions of the tertiary sector in Poland’s neighbour states.

  1. The Free Trade Area of the Americas: Can Regional Economic Integration Lead to Greater Cooperation on Security?

    National Research Council Canada - National Science Library

    Sandoval, Thomas

    2002-01-01

    ...) and its impact on cooperative security in the Western Hemisphere. Similar to the l990s, when the U.S. government debated the pros and cons of the NAFTA, the United States now faces a debate over passage and implementation of the FTAA...

  2. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark

  3. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2004-11-04

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark.

  4. Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks

    Directory of Open Access Journals (Sweden)

    Yulong Shen

    2014-03-01

    Full Text Available This work considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous work on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact result on the number of eavesdroppers one network can tolerate to ensure desired secrecy and reliability. We first study the scenario where path-loss is equal between all pairs of nodes and consider two transmission protocols there, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis and numerical results are then provided to determine the maximum number of eavesdroppers one network can tolerate to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability. We further extend our study to the more general scenario where path-loss between each pair of nodes also depends on the distance between them, for which a new transmission protocol with both preferable relay selection and good load balance as well as the corresponding theoretical analysis and numerical results are presented.

  5. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong

    2015-12-03

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI), conventional CJD using self-interference cancelation at the destination is efficient when the untrusted relay has no capability to suppress the jamming signal. However, if the source and destination are equipped with a single antenna and the only untrusted relay is equipped with N multiple antennas, it can remove the jamming signal from the received signal by linear filters and the full multiplexing gain of relaying cannot be achievable with the conventional CJD due to the saturation of the secrecy rate at the high transmit power regime. We propose in this paper new CJD scheme where neither destination nor relay can acquire CSI of relay-destination link. Our proposed scheme utilizes zero-forcing cancelation based on known jamming signals instead of self-interference subtraction, while the untrusted relay cannot suppress the jamming signals due to the lack of CSI. We show that the secrecy rate of the proposed scheme can enjoy a half of multiplexing gain in half-duplex relaying while that of conventional CJD is saturated at high transmit power for N ???2. The impact of channel estimation error at the destination is also investigated to show the robustness of the proposed scheme against strong estimation errors.

  6. Metrics for border management systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, Ruth Ann

    2009-07-01

    There are as many unique and disparate manifestations of border systems as there are borders to protect. Border Security is a highly complex system analysis problem with global, regional, national, sector, and border element dimensions for land, water, and air domains. The complexity increases with the multiple, and sometimes conflicting, missions for regulating the flow of people and goods across borders, while securing them for national security. These systems include frontier border surveillance, immigration management and customs functions that must operate in a variety of weather, terrain, operational conditions, cultural constraints, and geopolitical contexts. As part of a Laboratory Directed Research and Development Project 08-684 (Year 1), the team developed a reference framework to decompose this complex system into international/regional, national, and border elements levels covering customs, immigration, and border policing functions. This generalized architecture is relevant to both domestic and international borders. As part of year two of this project (09-1204), the team determined relevant relative measures to better understand border management performance. This paper describes those relative metrics and how they can be used to improve border management systems.

  7. A thirsty dragon. Rising Chinese crude oil demand and prospects for multilateral energy security cooperation

    Energy Technology Data Exchange (ETDEWEB)

    Causevic, Amar

    2012-07-01

    The Chinese appetite for energy could potentially result in two scenarios. Each of these will systematically be developed and examined in the course of this paper. The pessimistic scenario foresees energy-driven foreign policy placing China in a dangerous confrontation with the U.S., Japan, the EU and India. American, Indian and Chinese navies are already competing across the Indian Ocean, with participants upgrading their naval forces, building deep-sea ports, constructing military bases and forging alliances across the Indian Ocean. They have not yet entered into conflict, but as their naval presence increases, the possibility of an armed clash grows. This scenario represents a 'nightmare option' that could have grave consequences for the entire globe, as the U.S., China, India and two EU members are all states armed with nuclear weapons. Conversely, an opposite scenario can be envisaged. A liberal integrationist perspective offers huge potential for multilateral energy security cooperation. Despite all tensions, China, the West and India are oil importers, and, as consumers, they could work together in fostering common strategies. What is more, their economies are mutually intertwined, and any conflict would bring about fatal collateral damage to the economic well-being of all parties. In short, China and America and potentially India could synchronize approaches to energy issues and address worries about growing global competition for crude oil. Being that as it may, China's further integration into multilateral energy organizations - notably the Organisation for Economic Co-operation and Development (OECD) International Energy Agency (IEA) - will not be an easy task. Introduction of the new standards and requirements could be a burden for Chinese economic development. Membership in the IEA would reduce freedom in energy policy-making as it requires intelligencesharing, market liberalization and surrendering a certain degree of national

  8. International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation : 60 Years of IAEA and EURATOM

    CERN Document Server

    Abousahl, Said; Plastino, Wolfango

    2018-01-01

    This open access book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensions. Current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that have the potential to increase the effectiveness of implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections examine scientific and technical challenges and discuss the role of international cooperation and actions of the scientific community in leading the world toward peace and security. The book – which celebrates 60 years of IAEA Atoms for Peace and Development and the EURA...

  9. Evaluation of Bulgarian needs for security of radioactive sources and training of law enforcement personnel through border exercises

    International Nuclear Information System (INIS)

    Strezov, A.S.

    2006-01-01

    The creation and implementation of an adequate legal framework is important for eastern European countries in the field of combating organized crime, especially the illicit trafficking of radioactive materials, in these countries' efforts towards joining the European Union by adopting many legislative, economic and political frameworks for the combating of terrorism. The Republic of Bulgaria, as a PECO country in the phase of pre-adhesion to the European Union, is preparing its legislation and law enforcement institutions to meet the new challenges and tasks of the process of joining the European Union. One of the best ways to combat illicit trafficking is collaboration between neighbouring countries through connections between similar law enforcement bodies. The Institute for Nuclear Research and Nuclear Energy in Bulgaria and the Cekmece Nuclear Research and Training Centre in Turkey participated in a joint border exercise at the Kapi Kule checkpoint which provided a unique opportunity for law enforcement institutions and scientific experts to respond jointly in a simulated border incident with real nuclear materials. (author)

  10. A Secure Base from which to Cooperate: Security, Child and Parent Willing Stance, and Adaptive and Maladaptive Outcomes in two Longitudinal Studies.

    Science.gov (United States)

    Goffin, Kathryn C; Boldt, Lea J; Kochanska, Grazyna

    2017-10-17

    Early secure attachment plays a key role in socialization by inaugurating a long-term mutual positive, collaborative interpersonal orientation within the parent-child dyad. We report findings from Family Study (community mothers, fathers, and children, from age 2 to 12, N = 102, 51 girls) and Play Study (exclusively low-income mothers and children, from age 3.5 to 7, N = 186, 90 girls). We examined links among observed secure attachment at toddler age, child and parent receptive, willing stance to each other, observed in parent-child contexts at early school age, and developmental outcomes. The developmental outcomes included parent-rated child antisocial behavior problems and observed positive mutuality with regard to conflict issues at age 12 in Family Study, and mother-rated child antisocial behavior problems and observed child regard for rules and moral self at age 7 in Play Study. In mother-child relationships, the child's willing stance mediated indirect effects of child security on positive mutuality in Family Study and on all outcomes in Play Study. In father-child relationships, both the child's and the parent's willing stance mediated indirect effects of child security on both outcomes. Early security initiates an adaptive developmental cascade by enlisting the child and the parent as active, willingly receptive and cooperative agents in the socialization process. Implications for children's parenting interventions are noted.

  11. The Security Implications of Water: Prospects for Instability or Cooperation in South and Central Asia

    Science.gov (United States)

    2010-03-01

    and import enough fuels for its winter needs.” And,The World Bank, “ Water Energy Nexus in Central Asia: Improving Regional Cooperation in the Syr...94 “ Water Energy Nexus in Central Asia: Improving Regional Cooperation in the Syr Darya Basin,” World Bank Report...10. 95 All statistics are attributed from Water Energy Nexus in Central Asia: Improving Regional Cooperation in the Syr Darya Basin,” World Bank

  12. Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices

    National Research Council Canada - National Science Library

    Caldwell, Stephen L; Fossett, Christine A; Conrad, Christopher; Berbsteub, Amy; Berry, Fredrick; Camarillo, Yecenia; Cook, Frances; David, Katherine; Dye, Wendy; Gibson, Nkenge

    2008-01-01

    .... For example, between March 2005 and November 2007, CBP established requirements for C-TPAT members in nine trade sectors to meet minimum security criteria for their specific trade sector, including...

  13. Smart border initiative: a Franco-German cross-border energy optimisation project

    International Nuclear Information System (INIS)

    2017-01-01

    Integrated and optimised local energy systems will play a key role in achieving the energy transition objectives set by France and Germany, in line with the Energy Union's goals, and contribute to ensuring a secure, affordable and climate-friendly energy supply in the EU. In order to capitalise on the French and German expertise and experiences in developing such systems and to continue strengthening the cross-border cooperation towards a fully integrated European energy market, both Governments have decided to launch a common initiative to identify and structure a cross-border energy optimisation project. Tilia and Dena have undertaken this mission to jointly develop the Smart Border Initiative (SBI). The SBI will, on the one hand, connect policies designed by France and Germany in order to support their cities and territories in their energy transition strategies and European market integration. It is currently a paradox that, though more balanced and resilient energy systems build up, bottom-up, at the local level, borders remain an obstacle to this local integration, in spite of the numerous complementarities observed in cross-border regions, and of their specific needs, in terms of smart mobility for example. The SBI project aims at enabling European neighbouring regions separated by a border to jointly build up optimised local energy systems, and jointly develop their local economies following an integrated, sustainable and low-carbon model. On the other hand, this showcase project will initiate a new stage in the EU electricity market integration, by completing high voltage interconnections with local, low voltage integration at DSO level, opening new optimisation possibilities in managing the electricity balance, and enabling DSOs to jointly overcome some of the current challenges, notably the increased share of renewable energy (RE) and ensuring Europe's security of supply

  14. A TALE OF TWO CULTURES: BREXIT AND THE FUTURE OF UK-EUROPEAN SECURITY COOPERATION

    Science.gov (United States)

    2017-06-01

    states were particularly sensitive to this issue given the lack of clear UN Security Council authorization and the fact that the purpose of intervention ...Finnemore, The Purpose of Intervention : Changing Beliefs About the Use of Force (Cornell Studies in Security Affairs) (Cornell University Press, 2004...position in all other international organizations, including within the UN Security Council as appropriate. Furthermore, Title V establishes a

  15. A model for international border management systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, Ruth Ann

    2008-09-01

    To effectively manage the security or control of its borders, a country must understand its border management activities as a system. Using its systems engineering and security foundations as a Department of Energy National Security Laboratory, Sandia National Laboratories has developed such an approach to modeling and analyzing border management systems. This paper describes the basic model and its elements developed under Laboratory Directed Research and Development project 08-684.

  16. Small Border Traffic and Cross-Border Tourism Between Poland and the Kaliningrad Oblast of the Russian Federation

    OpenAIRE

    Anisiewicz Renata; Palmowski Tadeusz

    2014-01-01

    Polish and Russian cross-border cooperation is governed by lawful agreements. The enlargement of the Schengen Area had a significant impact on Kaliningrad Oblast relations and cross-border cooperation with its neighbours. The introduction of visas between Poland and Russia hindered and restricted local border trade which had for years been the only measure mitigating social and economic problems of the cross-border regions. Nevertheless, border traffic between Poland and Kaliningrad grew stea...

  17. How to form on food and nutritional security for decision makers of communities and cooperative on Cuban

    Directory of Open Access Journals (Sweden)

    Inés Margarita Torres Rivero

    2013-12-01

    Full Text Available The purpose of this work is to support a training strategy for policy decision makers and managers of local projects Integrated in Alimentary and Nutritional Security (SAN in communities and cooperative, sustained on a pedagogical approach, based on the relationship between the components of the SAN, the government official's functions (FG and the administration of local projects integrated as way of performance of this subject. The objective of the strategy is to achieve that decision makers of Pinar del Rio province, can appropriate the knowledge, abilities and values for facilitating their integral preparation related with the SAN, and can negotiate the existent potentialities in communities and cooperative, develop local projects in SAN that supplement the emanated politics from state upper level, then the strategy allows a pertinent acting that impacts in the town that is an inevitable necessity for Cuba and specifically for this province, which is the most vulnerable province to environmental changes that so much influences in SAN.

  18. Organization for security and co-operation in Europe mission to Georgia / Joe McDonagh

    Index Scriptorium Estoniae

    McDonagh, Joe

    2003-01-01

    22.-23. septembrini 2003 Vilniuses toimunud seminaril "South Caucasus: making the best use of external assistance for stability building and for co-operation with NATO" esitatud ettekanne OSCE missiooni tegevusest Gruusias

  19. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming

    KAUST Repository

    Park, Kihong; Wang, Tian; Alouini, Mohamed-Slim

    2013-01-01

    is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available

  20. Children's Food Security and Intakes from School Meals. Final Report. Contractor and Cooperator Report No. 61

    Science.gov (United States)

    Potamites, Elizabeth; Gordon, Anne

    2010-01-01

    Using 2005 data from the U.S. Department of Agriculture's Third School Nutrition Dietary Assessment survey, this study examines the contribution of school meals to the food and nutrient intake of children in food-secure, marginally secure, and food-insecure households. The study finds that children from food-insecure and marginally secure…

  1. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along

  2. Reducing an Insurgency's Foothold: Using Army Sustainability Concepts as a Tool of Security Cooperation for AFRICOM

    National Research Council Canada - National Science Library

    Hill, Timothy E

    2008-01-01

    .... civilian and military efforts. It is designed to provide an integrated approach to new security challenges such as insurgency, the most likely form of warfare in which the United States will be engaged in the next several decades...

  3. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    National Research Council Canada - National Science Library

    Hubenko, Jr, Victor P

    2008-01-01

    With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration...

  4. The functional power of the CPLP in the framework ok development cooperation in food security and nutrition (FSN

    Directory of Open Access Journals (Sweden)

    Manuel Lapão

    2016-05-01

    Full Text Available The Community of Portuguese Speaking Countries (CPLP, about to celebrate its twenty year of existence, was born to preserve the language and a common cultural heritage and has been gradually strengthening other policy dimensions which have led to increased visibility. The cooperation in the areas of Health and Food and Nutrition Security (SAN is such an example. In fact, the "Food Security and Nutrition Strategy (ESAN-CPLP", adopted in 2011, is a real and operational tool to improve levels of human development in the member states of the CPLP, and is recognized in international fora as an example of good practice by partners such as the European Union, while also being perfectly aligned with the U.N.'s Goals of Sustainable Development. Despite the unique role of the CPLP and its potential functional power in the framework of international cooperation, some threats have emerged, preventing its further affirmation, namely the assertion of a clear political will by the member states. Despite the gap between the present CPLP and the Agostinho da Silva's dream of creating a true Lusophone community, its contemporary role and potential is quite clear, and outstanding are the efforts to establish in its framework the Human Right to Adequate Food.

  5. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  6. French-Polish energy cooperation in the face of climate and security challenges

    International Nuclear Information System (INIS)

    Soloch, Krzysztof

    2015-01-01

    The energy cooperation between Poland and France provides an opportunity to jointly organize the energy transition in the context of the gradual integration of the European energy market that both countries are calling for. The purpose of this note is to identify some pointers for a Franco-Polish energy partnership. (author)

  7. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  8. Potential Cost Savings and Cost Avoidances Associated With Security Cooperation Training Programs

    Science.gov (United States)

    2015-12-01

    difficult to establish a risk premium to include into the military pricing strategy that would adequately capture the risk the contractor assumed...significant difference between the contractor and government pricing strategy is in the handling of the hazardous duty risk premium . U.S. military...Cooperation Agency. Using the Department of Defense’s Financial Management Regulation, I priced the contractor provided training as if uniformed

  9. A cooperative building up of care security: patient participation to risk management in radiotherapy

    International Nuclear Information System (INIS)

    Pernet, A.; Mollo, V.; Giraud, P.

    2010-01-01

    Based on observations of radiotherapy consultations, interviews of professionals (physicians and operators), of ex-patients and patients under treatment, and on analysis of questionnaires sent to patients, this study aimed at understanding how, and to which levels, participation of patients can optimize risk management. It outlines the major role of therapeutic information and education of patients, but also of health professionals, in order to reach a shared cooperative management of cares. Short communication

  10. Guidelines for Nordic co-operation concerning nuclear installations in the border areas between Denmark, Finland, Norway and Sweden in respect of nuclear safety conditions

    International Nuclear Information System (INIS)

    1976-01-01

    These Guidelines were established by an Agreement between the Nordic countries. Their purpose is to set up a consultation mechanism between those countries regarding the projected setting up of nuclear facilities near borders which would be likely to affect their respective territories [fr

  11. Lessons from collaborative governance and sociobiology theories for reinforcing sustained cooperation: a government food security case study.

    Science.gov (United States)

    Montoya, L A; Montoya, I; Sánchez González, O D

    2015-07-01

    This research aimed to understand how cooperation and collaboration work in interagency arrangements using a case study of the public management of food security and nutrition in Bogotá, Colombia. This study explored the available scientific literature on Collaborative Governance within the Public Management body of knowledge and the literature on Cooperation from the Sociobiology field. Then, proposals were developed for testing on the ground through an action-research effort that was documented as a case study. Finally, observations were used to test the proposals and some analytical generalizations were developed. To document the case study, several personal interviews, file reviews and normative reviews were conducted to generate a case study database. Collaboration and cooperation concepts within the framework of interagency public management can be understood as a shared desirable outcome that unites different agencies in committing efforts and resources to the accomplishment of a common goal for society, as seen in obtaining food and nutrition security for a specific territory. Collaboration emerges when the following conditions exist and decreases when they are absent: (1) a strong sponsorship that may come from a central government policy or from a distributed interagency consensus; (2) a clear definition of the participating agencies; (3) stability of the staff assigned to the coordination system; and (4) a fitness function for the staff, some mechanism to reward or punish the collaboration level of each individual in the interagency effort. As this research investigated only one case study, the findings must be taken with care and any generalization made from this study needs to be analytical in nature. Additionally, research must be done to accept these results universally. Food security and nutrition efforts are interagency in nature. For collaboration between agencies to emerge, a minimum set of characteristics that were established during the

  12. International Border Management Systems (IBMS) Program : visions and strategies.

    Energy Technology Data Exchange (ETDEWEB)

    McDaniel, Michael; Mohagheghi, Amir Hossein

    2011-02-01

    Sandia National Laboratories (SNL), International Border Management Systems (IBMS) Program is working to establish a long-term border security strategy with United States Central Command (CENTCOM). Efforts are being made to synthesize border security capabilities and technologies maintained at the Laboratories, and coordinate with subject matter expertise from both the New Mexico and California offices. The vision for SNL is to provide science and technology support for international projects and engagements on border security.

  13. Border installations

    International Nuclear Information System (INIS)

    Lenaerts, Koen

    1988-01-01

    Border installations cover all nuclear plants located near the border with a neighbouring state. However, the actual distance depends on the context. The distance can vary considerably. Also the prohibition on siting near a heavily populated area also defines the actual distance variably. The distance criteria may be modified by other factors of topography, prevailing climate and so on. Various examples which illustrate the problems are given. For example, the Creys-Melville nuclear power plant is 80km from Geneva and the Cattonam installation is 12km from the French border with Luxembourg and Germany. The Cattenom case is explained and the legal position within the European Institutions is discussed. The French licensing procedures for nuclear power stations are described with special reference to the Cattenom power plant. Border installations are discussed in the context of European Community Law and Public International Law. (U.K.)

  14. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  15. International cooperation and security in the field of nuclear energy in Armenia

    International Nuclear Information System (INIS)

    Khachatryan, D.A.; Avagyan, A.A.; Stepanyan, V.E.

    2010-01-01

    In the report presented/discussed are the ecological-humanitarian disasters and the related policy of the international organizations, especially IAEA, NATO and others on ensuring security of vital activity of people in the sphere of energy and particularly nuclear energy. Possessing the only nuclear power station in Trans Caucasus and the store of toxic wastes of reactive fuel the Government of Armenia and the Ministry of Emergency Situations of the Republic of Armenia always take into consideration the many-sided aspects of prevention, warning about accident in energy buildings including nuclear accidents and modern response in case of occurring the latter ensuring security for ANPP personnel and the inhabitants of the settlements of the possible contingency zone. In their daily activity the workers of the Emergency Situations of the Republic of Armenia, especially those of the Armenian Rescue Service base on the experience and logistic support of international community some aspects of which are presented below

  16. Russian-American Security Cooperation After St. Petersburg: Challenges and Opportunities

    Science.gov (United States)

    2007-04-01

    each shipment. The third GTRI element, the Reduced Enrichment for Research and Test Reactors ( RERTR ) program, funds efforts to convert the cores of...IAEA in the Russian Research Reactor Return Pro- gram, the RERTR Program, and the Tripartite Initia- tive to secure high-risk radioactive sources...Russia’s involvement in the RERTR , see Charles D. Ferguson, Preventing Catastrophic Nuclear Terrorism, New York: Council on Foreign Relations, March 2006

  17. International cooperation for food and nutrition security: Systematization of the participatory, contextualized, and intersectoral educational practices

    Directory of Open Access Journals (Sweden)

    Luciene BURLANDY

    Full Text Available ABSTRACT The present study systematized the experience gained with the project Construindo capacidades em segurança alimentar e nutricional no Brasil, Canadá e Angola (2004-2010, Building food and nutrition security skills in Brazil, Canada, and Angola, whose objective was to qualify actions that promote food and nutrition security in the three countries using different educational practices. The activities were organized in the following subprojects: (a online distance learning courses; (b workshops to train managers, government technicians, representatives of civil society organizations, and social subjects who offered to act as a link between communities; and (c local pilot projects. The present study reports this experience. The educational practices implemented in the municipalities of Araçuaí (MG, Juazeiro (BA, and Fortaleza (CE were analyzed based on systematized information in the project reports and activity records (texts and photographs. The analytical reference was based on the concept of food and nutrition education, guided by the fundamentals of Popular Education and Paulo Freire; on the concept of food and nutrition security; and on the following analytical dimensions: participation, contextualization of educational practices, and intersectoriality. The results evidenced how educational practices contributed to the construction of shared concepts of food and nutrition security from an intersectoral and participatory perspective that values the peculiarities of diet in different socioeconomic and cultural contexts, and highlights daily situations and local traditions. They also expose the limits and potentialities of an experience of this magnitude, conducted from an interdisciplinarity perspective and using participatory methods.

  18. U.S.-Egypt Security Cooperation after Egypt’s January 2011 Revolution

    Science.gov (United States)

    2011-12-01

    SECURITY CLASSIFICATION OF: (U) 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 70 19a. NAME OF RESPONSIBLE PERSON Thomas C. Graves COL, U.S...Monograph Director Scott Gorman, Ph.D. ___________________________________ Director, Thomas C. Graves, COL, IN School of Advanced Military...a broad network of dairy farms, milk processing facilities, cattle feed lots, poultry farms, and fish farms. The military produced eighteen percent

  19. Cooperación transfronteriza en investigación sobre diabetes mellitus tipo 2: México-Estados Unidos U.S.-Mexico cross-border cooperation in research on diabetes mellitus type 2

    Directory of Open Access Journals (Sweden)

    Jaume Canela-Soler

    2010-09-01

    Full Text Available OBJETIVO: Describir y analizar con un enfoque de estudio de caso el Proyecto de Prevención y Control de la Diabetes en la Frontera México-Estados Unidos (PDF-México/Estados Unidos, un esfuerzo de cooperación en investigación en salud en el que participaron instituciones federales, estatales y locales de ambos países. MÉTODOS: El proyecto utilizó un modelo de igual representación, participación, consenso y liderazgo compartido, con la participación de más de 130 instituciones coordinadas por organismos de ambos países. Se estudió una muestra aleatoria, multietápica, estratificada y por conglomerados de 4 020 personas mayores de 18 años que respondieron un cuestionario de preguntas relacionadas con la diabetes mellitus tipo 2 (DM2 y la salud. El análisis estadístico de la información muestral obtenida tuvo en cuenta el efecto del diseño. RESULTADOS: La prevalencia de DM2 diagnosticada fue de 14,9% (intervalo de confianza de 95% [IC95%]: 12,5-17,6 y la prevalencia de DM2 diagnosticada ajustada por edad fue de 19,5% (IC95%: 16,8-22,6 en la parte mexicana y de 16,1% (IC95%: 13,5-19,2 en la estadounidense. La prevalencia de la DM2 y los factores de riesgo no fueron exactamente iguales a lo largo de la frontera. CONCLUSIONES: La ejecución del PDF-México/Estados Unidos ha permitido por primera vez considerar la franja fronteriza entre ambos países como una unidad para la investigación epidemiológica. En iniciativas fronterizas futuras, se sugiere fortalecer el entendimiento mutuo de la estructura sociopolítica y de las formas de actuación por parte de las instituciones y otras entidades participantes en ambos lados de la frontera.OBJECTIVE: To describe and analyze, utilizing a case study approach, the U.S.- Mexico Border Diabetes Prevention and Control Project, a health research cooperation initiative incorporating the participation of federal, state, and local institutions of both countries. METHODS: A model of equal

  20. Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-01-01

    Full Text Available Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations.

  1. Counterproliferation, Border Security and Counterterrorism Subject-Related Laws and Regulations, Including Export Control Regimes in South-Eastern European Countries

    International Nuclear Information System (INIS)

    Bokan, S.

    2007-01-01

    gaps exist, much less fill them. All this suggests that, to fulfil obligations under UNSC Resolutions 1540 and 1373, States must enact harmonized criminal prohibitions and authorization for law enforcement cooperation in order to establish a seamless web of security among all nations. Failure to do so implicitly poses a threat to international peace and security. One of the main issues which deserve to be further addressed and which prompts the continuation of the Southeast Europe Counterproliferation, Borger Security and Counterterrorism (CBSC) Working Group is to harmonize national laws and regulations that deal with deterring, detecting and interdicting WMD. Inventory of relevant CBSC subject-related laws of the Southeast Europe countries, including Export Control Laws was created and prepared for further consideration and harmonization by judiciary experts, with the aim to develop m odel laws . Let me very briefly present you the main features of the SEDM CBSC subject-related laws and regulations. This paper will present that inventory which includes the membership in the international Conventions, Treaties and Arrangements and also the membership in Multilateral Export Control Regimes of Southeast Europe countries. Also, it will be presented the membership in the international legal instruments that play an integral part in the global fight against terrorism. (author)

  2. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  3. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  4. Opportunities for Cross-Border Entrepreneurship Development in a Cluster Model Exemplified by the Polish–Czech Border Region

    Directory of Open Access Journals (Sweden)

    Joanna Kurowska-Pysz

    2016-03-01

    Full Text Available The subject of the paper is the analysis and evaluation of cross-border entrepreneurship development opportunities on the basis of cross-border cooperation, which has gradually evolved from consisting of bilateral partnerships to a networking model or even a cluster. The study conducted at the Polish–Czech border area indicates that, in terms of the development of cross-border cooperation, the economic sphere is lagging far behind social activities such as culture, education and tourism. At the same time, Polish and Czech enterprises are not sufficiently mobilized to develop cross-border entrepreneurship, although a number of support instruments in this regard have been proposed. Sustainable development of the border should take into account both social and economic aspects. An important research problem therefore becomes determining the possibility of boosting the development of cross-border entrepreneurship on the basis of the existing forms of cross-border cooperation, including cooperation in the social sphere. The aim of this paper is to define the conditions and opportunities for the development of cluster cooperation in the area of cross-border entrepreneurship. The author has attempted to resolve whether the intensity of cross-border cooperation can be a factor which mobilizes companies to develop their cross-border entrepreneurship and whether cross-border entrepreneurship can be further developed within the cluster model.

  5. 76 FR 65207 - U.S. Customs and Border Protection

    Science.gov (United States)

    2011-10-20

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Cancellation of Customs Broker Licenses AGENCY: U.S. Customs and Border Protection, U.S. Department of Homeland Security.... 1641) and the U.S. Customs and Border Protection regulations (19 CFR 111.51), the following Customs...

  6. 76 FR 50883 - U.S. Customs and Border Protection

    Science.gov (United States)

    2011-08-17

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection DEPARTMENT OF THE TREASURY 19... of Liquidation AGENCY: Customs and Border Protection, Department of Homeland Security; Department of... Regulations (``CFR'') pertaining to the method by which U.S. Customs and Border Protection (``CBP'') issues...

  7. Report on Symposium on Pacific Energy Cooperation 2001. Energy Security in Asian Region; Taiheiyo energy kyoryoku kaigi 2001 hokokusho. Asia chiiki no energy anzen hosho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-02-20

    The Symposium on Pacific Energy Cooperation (SPEC), which started in 1986 to discuss energy problems and international cooperation on energy in the Pacific region, met for 2001 in Tokyo on February 20 and 21, 2001, to discuss Energy Security in Asian Region. The conference comprised two keynote addresses, four sessions, and a panel discussion. Twenty-four countries and an international organization were represented by a total of 785 participants who actively exchanged views and opinions. With Director Tsutomu Toichi, The Institute of Energy Economics, Japan, acting as chairman, two keynote addresses were delivered. Minister of Oil Bijan Namdar Zanganeh of Iran reported on The Role of I. R. Iran in Meeting the Growing Oil and Gas Demand in the Asia-Pacific Region and Potential Cooperation with the Region's Consumers. Managing Director Phil Watts of the Royal Dutch/Shell Group reported on Security in Trust - Meeting Asian Energy Needs in the 21st Century. (NEDO)

  8. The impact of Border policy effect on cross-border ethnic areas

    Science.gov (United States)

    Bie, Q. L.; Zhou, S. Y.; Li, C. S.

    2013-11-01

    Boundary effect analysis is related to border policy making in the cross-border ethnic area. The border effect literatures show that geographic boundaries have obvious impacts on economic, social and cultural relations in both sides of a nation border. Particularly in cross-border ethnic areas, each ethnic group has strong internal spatial structure relevance, and the boundary effect is more obvious. However, most of China's border areas are cross-border ethnic areas, each of border issues is unique. Under this perspective, we analyze the border effects of various boundaries can provide basis for formulating border management policies. For small scale of cross-border ethnic minority areas, how to formulate the boundary management policy is a good question to explore. This paper is demonstrated by a study of the impact of border management policies in Dehong Dai and Jingpo Autonomous Prefecture in Yunnan Province at the border area to Burma. The comparative method is used to analysis the border management policies in past 50 decades for the border area of Yunnan Province .This research aims to define trends within border policy and its influences to national security. This paper also examines Wendy Brown's liberal theory of border management policy. We found that it is not suitable for Sino-Burma border area. The conclusion is that the changes or instability of international economic and political situation has more influence to this cross-border ethnic area, and only innovative policy will be effective in cross-border ethnic area. So the border management policies should reflect the change of international context.

  9. OPPORTUNITIES AND RISKS OF CROSS-BORDER COOPERATION OF REGIONS OF THE SOUTHERN MACROREGION OF RUSSIA AND REGIONS OF THE SOUTH-EAST OF UKRAINE IN THE CONDITIONS OF UNCERTAINTY

    Directory of Open Access Journals (Sweden)

    Inna Mitrofanova

    2015-09-01

    Full Text Available In article the political and economic innovations connected with the transformation of the region «Donbass» in the context of decrease of the risks caused by a military-political and economic conflict in Ukraine are investigated. On the basis of creative synthesis of theoretical and practical approaches of studying the evolution of nonlinear economic systems and the formation of megaregions, and also the analysis of the geopolitical situation developing on the world scene between Russia, the USA and China provisions are developed according to which the region «Donbass» can be considered as «a critical point» of the European regionalization. Authors believe that the important strategic prospect of border cooperation of Russia and Ukraine is connected with the formation of a cross-border agglomeration «Nizhnedonbassky» and «Verkhnedonbassky» the creation of which consists in realization of the linking function between Nizhnedonbassky, Volga region, Moscow and Petersburg transport corridors. One of the condition of social and economic stabilization in the subjects of the foreign Caspian and the Black Sea zones is the realization of geotransit capacity of the region «Donbass» with the formation of a geotransit architecture of its economy. Strategically realization of the processes of an international city formation is possible either on the basis of federal principles or by a geopolitical split of the territory of the region “Donbass” on the line Kharkov – Donetsk – Lugansk with a bent to Russia.

  10. Sovereign Challenge Conference (6th). Borders & Security: Similarities, Differences and Shared Affinities. Held in El Paso, Texas on November 7-10, 2010

    Science.gov (United States)

    2010-11-01

    Report of such contraband. Extortion and racketeering practices surround such activities to include forced taxation of local citizens and businesses...that is, the value of drugs doubles once they cross the Afghan border. Expansion into other organized crime activities such as kidnapping...UPS/FEDEX plane bomb plot, the Time Square bomb attempt, and Umar Abdul Mutallab — the underwear bomber) crossed both a border and a juridical line

  11. Business, brokers and borders

    DEFF Research Database (Denmark)

    Walther, Olivier

    2015-01-01

    The objective of this paper is to show how a formal approach to networks can make a significant contribution to the study of cross-border trade in West Africa. Building on the formal tools and theories developed by Social Network Analysis, we examine the network organization of 136 large traders...... in two border regions between Niger, Nigeria, and Benin. In a business environment where transaction costs are extremely high, we find that decentralized networks are well adapted to the various uncertainties induced by long-distance trade. We also find that long-distance trade relies both on the trust...... and cooperation shared among local traders, and on the distant ties developed with foreign partners from a different origin, religion or culture. Studying the spatial structure of trade networks, we find that in those markets where trade is recent and where most of the traders are not native of the region...

  12. Regional Joint Border Commands: A Pathway to Improving Collaboration and Effectiveness for Border Control

    Science.gov (United States)

    2009-12-01

    Police xii SBI Secure Border Initiative SES Senior Executive Service SSP Secretaria de Seguridad Publica TSA Transportation Security...also been involvement from the Mexican law enforcement agency, Secretaria de Seguridad Publica (SSP) on the southwest border (CBP, 2009; ICE, 2009, p. 5

  13. U.S. Border Patrol Fiscal Year Statistics Southwest border sector deaths - FY 1998 through FY 2013

    Data.gov (United States)

    Department of Homeland Security — Southwest Border Sectors include: Del Rio, El Centro, El Paso, Laredo, Rio Grande Valley, San Diego, Tucson, Yuma Southwest Border Deaths By Fiscal Year (Oct. 1st...

  14. Efforts to promote regional security dialogue and cooperation in the North Pacific

    International Nuclear Information System (INIS)

    Mason, P.

    1994-01-01

    Indifference to the new realities of the post-cold war era does nothing to preserve the traditional priorities laid down in the Final Document of the first special session on disarmament. On the contrary, such attitudes directly contribute to the trend towards marginalization which began when publics no longer feared the threat of a nuclear holocaust. It is believed that the expertise of forty years of multilateral arms control and disarmament efforts is directly relevant to the broader efforts of the international community to restore, maintain and promote international peace and security. Who can deny that confidence-building is central to preventive diplomacy? Or that the arms control component-from disarming to demobilization-is not equally central to peace operations whether they be traditional peace-keeping or post-conflict peace-building? Indeed the success or failure of the disarmament aspect of a peace operation is often critical to its overall success-Somalia surely being one recent sad example. The multilateral disarmament community must apply itself more directly and systematically to these broader problems - just as the United Nations Secretariat has increasingly begun to do - or risk indifference from Governments forced to make tough choices against a range of competing priorities. It is undeniably true that the post-cold war has significantly increased the potential for the international community to negotiate historic new multilateral disarmament treaties. And this window of opportunity must be utilized to the fullest. At the same time, due account must be taken of the hard fact that, for an increasing number of countries, expensive obligations in relation to advanced unconventional weapons which neither they nor their neighbours seek to possess may count for less than practical assistance in finding solutions to more parochial, but no less urgent, problems

  15. Cross-Border Tourism and its Significance for Tourism Destinations

    Directory of Open Access Journals (Sweden)

    Roman LIVANDOVSCHI

    2017-06-01

    Full Text Available This article is concerned with cross-border tourism. It enhances the importance of cross-border cooperation in tourism. Cross-border cooperation is a form of international cooperation, along with interregional, transitional and trans-frontier cooperation. Cross-border regions often share the same historical and cultural traditions and attractive natural landscapes, such is the case of the Republic of Moldova and Romania. In both cases, cross-border regions can benefit from cooperationcooperation can help create greater diversity and differentiation of the range of tourism and environmental products; create economies of scale and make promotion more effective, and can help better address specific problems or issues for tourism development.

  16. UNESCO Without Borders

    DEFF Research Database (Denmark)

    The United Nations Educational, Scientific, and Cultural Organization (UNESCO) was established in 1945 with twin aims: to rebuild various institutions of the world destroyed by war, and to promote international understanding and peaceful cooperation among nations. Based on empirical and historical...... research and with a particular focus on history teaching, international understanding and peace, UNESCO Without Borders offers a new research trajectory for understanding the roles played by UNESCO and other international organizations, as well as the effects of globalization on education. With fifteen...

  17. Reflection on the Judicial Activism or Constructivism: In Perspective of Being an Instrument of Cooperation in Judicial Facing Issues of Social Security and Labor

    Directory of Open Access Journals (Sweden)

    Antonio Gomes de Vasconcelos

    2016-10-01

    Full Text Available The article proposes a present thinking as the possibility of reaching solutions to some social security and labor issues in democratic rule of law using judicial cooperation in the search for effective social law of social security. The current legal constructivism, also called judicial activism in its manifestation of legal instrument to weigh yourself to get and verify the approach of social dialogue for more proactive attitude of the court, in which the actors involved in the conflict are called to have a more active participation on problem situations, requiring them more than mere legal interpretation in philosophical hermeneutics.

  18. Changing European borders: from separation to interface? An introduction

    Directory of Open Access Journals (Sweden)

    Jen Nelles

    2011-03-01

    Full Text Available The aim of this special issue is to address the evolution of European borders from a comparative perspective. This collection of papers spans a wide variety of topics in the realm of borderland studies. Although each engages with a single empirical or theoretical case collectively they identify nuances relevant to the theoretical elaboration of borders, and particularly contribute to the field of sub-national cross-border cooperation. In the course of its analysis each paper contributes to a broader understanding of the definition of cross-border regions; identifies a set of barriers to cooperation in these contexts; explores the role of identities on cooperation and of the role of borders in constructing those identities; and reflects on the socio-political meanings and uses of these international boundaries. This introduction discusses theoretical significance of these contributions to major debates in the study of borders and border regions.

  19. Infectious Disease Border Issues Conference: Meeting Synopsis

    Science.gov (United States)

    2012-04-03

    methicillin - resistant Staphylococcus aureus (MRSA). Operation MECACAR 1998 was highlighted as a successful example of cross-border coordination...training courses, no joint public health investigation teams) and illegal animal transportation across borders were identified as some of the existing...Work (2007), including fostering global partnerships; strengthening public health security in travel and transport ; improving the WHO global alert

  20. Small Border Traffic and Cross-Border Tourism Between Poland and the Kaliningrad Oblast of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Anisiewicz Renata

    2014-06-01

    Full Text Available Polish and Russian cross-border cooperation is governed by lawful agreements. The enlargement of the Schengen Area had a significant impact on Kaliningrad Oblast relations and cross-border cooperation with its neighbours. The introduction of visas between Poland and Russia hindered and restricted local border trade which had for years been the only measure mitigating social and economic problems of the cross-border regions. Nevertheless, border traffic between Poland and Kaliningrad grew steadily, to exceed four million in 2012.

  1. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016

  2. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016.

  3. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    Science.gov (United States)

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  4. "Recruitment to the organsization for security and co-operation in Europe`s mission to Bosnia- Herzegovina" : applying organizational theory to effective peacebuilding

    OpenAIRE

    Nørgaard, Benedicte

    2005-01-01

    Research on international peacebuilding has paid very little attention to the possible influence of internal organizational structures within the organizations carrying out the work. This thesis seeks to add to this knowledge, by providing insights into the recruitment and selection process of the Organization for Security and Co-operation in Europe (OSCE) in Bosnia-Herzegovina (BiH). The purpose of this study is to build knowledge about how the OSCE recruit, and use that knowledge to better ...

  5. Border poetics

    Directory of Open Access Journals (Sweden)

    Liv Lundberg

    2014-07-01

    Full Text Available The language of poetry is a language of inquiry, not the language of a genre. Poetry has the capacity of entering those zones known as borderlands, where you meet strange things and foreign people. In this poetic world view, the border is not an edge along the fringe of lands, societies and experiences, but rather their very middle – and their in-between. The structures of language are social structures in which meanings and intentions are already in place, always fighting for power and dominance, with rhetorical figures and more violent weapons.

  6. A Line in the Sand a Historical Study of Border Security During Insurgencies and Lessons for the Contemporary Afghan-Pakistan Frontier

    Science.gov (United States)

    2009-04-03

    day, the border force ploughed a ten-metre strip inside the barricade to allow trackers to assess the size of any groups that successfully crossed the...managed to breach the line, but once alerted, the French forces rapidly encircled the insurgents. After a week of fighting, the French killed or...camels in the Western Dhofar. During the next two days, Strikemasters accounted for over two-hundred camels killed .44 From 1974, the SAF enhanced their

  7. 78 FR 35044 - U.S. Customs and Border Protection

    Science.gov (United States)

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Visa Waiver Program Carrier Agreement (CBP Form I-775) AGENCY: U.S. Customs and Border Protection... information collection: 1651-0110. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of...

  8. 77 FR 59206 - U.S. Customs and Border Protection

    Science.gov (United States)

    2012-09-26

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Foreign Assembler's Declaration AGENCY: U.S. Customs and Border Protection (CBP), Department of... written comments to U.S. Customs and Border Protection, Attn: Tracey Denning, Regulations and Rulings...

  9. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  10. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  11. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  12. Red Crescent and its effect on the geography security on eastern borders (comparative study of social abnormalities during 1383-89

    Directory of Open Access Journals (Sweden)

    Farokh allah Shahbahrami

    2011-02-01

    Full Text Available Objective: drugs have some multidimensional effects on people and their lives. People who live in eastern provinces are at the risk of getting addicted and abnormal. Afghanistan is and has been the main problem for Iran. Method: this research has been done by library method and for this many books and articles have been read. The determined time was about 6 years. Findings: drugs have direct effects on life of people. Border cities are under the unkind effects of drugs and its relevant things. Conclusion: authorities must pay too much attention to drugs and eastern provinces

  13. Measuring cross-border travel times for freight : Otay Mesa international border crossing.

    Science.gov (United States)

    2010-09-01

    Cross border movement of people and goods is a vital part of the North American economy. Accurate real-time data on travel times along the US-Mexico border can help generate a range of tangible benefits covering improved operations and security, lowe...

  14. Security Policy at Road’s End? The Roles of Sweden and Finland in the Nordic-Baltic Defence Cooperation Process

    Directory of Open Access Journals (Sweden)

    Winnerstig Mike

    2014-12-01

    Full Text Available The article addresses a number of questions related to Nordic and to an extent also Nordic-Baltic defence cooperation. First of all, how far has Nordic and Nordic-Baltic defence cooperation come today? Secondly, what are the differences in the approaches of Sweden and Finland when it comes to defence cooperation, especially regarding NATO, in the Nordic-Baltic area? As a first analytical result, it is apparent that the rhetorical standing of the Nordic and Nordic-Baltic defence cooperation process is greater than its real achievements, especially in terms of defence integration. Secondly, it seems also to be clear that the defence and security policy debates of Sweden and Finland are quite different. Some problems identified in the debates within the two countries, respectively, are very similar although the suggested solutions vary very remarkably. Regarding the key issue of NATO membership, the developments of the last few years suggest that the Swedish political establishment, as well as the general public, might be closer to a substantial discussion of NATO membership than their Finnish equivalents.

  15. 75 FR 70937 - U.S. Customs and Border Protection

    Science.gov (United States)

    2010-11-19

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of... Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Robinson... Border Protection to conduct the specific test or gauger service requested. Alternatively, inquires...

  16. 77 FR 38076 - U.S. Customs and Border Protection

    Science.gov (United States)

    2012-06-26

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of... Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of SGS North... and Border Protection to conduct the specific test or gauger service requested. Alternatively...

  17. 'The Fear of Insignificance': New Perspectives on Harmonising Police Cooperation in Europe and Australia

    Directory of Open Access Journals (Sweden)

    Saskia Hufnagel

    2010-06-01

    Full Text Available Despite the fact that Australia and the European Union (EU have different structures of governance, histories, and cultures, both entities face remarkably similar problems in relation to police cooperation across borders. Australia is divided in nine different criminal jurisdictions, each of them policed by its own police force. Problems of border crossing, information exchange and joint investigations therefore arise similar to those in the EU. These problems have intensified in the 20th century with globalisation and the increased mobility of offenders. Several strategies, both legal and administrative, have necessarily developed to secure inter-state borders. Many of these strategies, like joint investigation teams, common databases and mutual recognition can be compared to solutions developed in the EU. This article will analyse some of the strategies that have been developed in Australia and in the EU to out-balance the lack of borders within them. It will be discussed what the major common impediments to police cooperation are in both entities. As many problems of cross-border policing result from the fact that law enforcement strategies are purely regional, it will be explored how more advanced cooperation strategies could be harmonised at the EU and Australian Federal levels. The major inhibiting factor in relation to harmonisation of legal frameworks in both entities will be defined as ‘the fear of insignificance’ or the fear of state actors to lose their individual identities in the process of harmonisation.

  18. 78 FR 35103 - Extension of Border Zone in the State of New Mexico

    Science.gov (United States)

    2013-06-12

    ..., established in 1953, was intended to promote the economic stability of the border region by allowing for freer... having to obtain a Form I-94. Although the border zone was intended to promote the economic stability of... maintain security of the border while increasing economic activity in New Mexico's border region and...

  19. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    ... Fax; Business Web site address; Business history; Physical Address(es); Mailing Address(es); Owner... Protection's Customs-Trade Partnership Against Terrorism program. Businesses accepted into the program... on higher risk businesses and thereby assists the agency in achieving its mission to secure the...

  20. Cause for Concern: A Mixed-Methods Study of Campus Safety and Security Practices in United States-Mexico Border Institutions of Higher Education

    Science.gov (United States)

    Holmes, Ryan Clevis

    2014-01-01

    Campus safety has been a source of concern since the 1990s. However, in 2007, the tragedy at the Virginia Polytechnic and State University sent a sense of alarm through many institutions of higher education. Immediately following this tragedy, institutions across the country began to evaluate and question their safety and security practices. While…

  1. Regional Cooperation Efforts in the Mekong River Basin: Mitigating river-related security threats and promoting regional development

    Directory of Open Access Journals (Sweden)

    Susanne Schmeier

    2009-01-01

    Full Text Available The development of international rivers is often perceived as leading to conflicts or even water wars. However, as the development of the Mekong River shows, cooperation has not only prevailed in the last decades, but River Basin Organizations (RBOs, established to mitigate river-related conflicts and/or develop the river basin, have also contributed to the emergence of more general cooperation structures, mainly by creating spill-over effects in other issue-areas, bringing cooperation to policy fields beyond the river itself. This article assesses the contribution of the Mekong River Commission (MRC and the Greater Mekong Sub-Region (GMS to the sustainable development of the Mekong Region as well as to the promotion of regional cooperation in mainland South-East Asia in general. --- Die Entwicklung grenzüberschreitender Flüsse wird oft mit Konflikten oder gar Kriegen um Wasser assoziiert. Wie jedoch die Entwicklung im Mekong-Becken zeigt, waren die vergangenen Jahrzehnte nicht nur von Kooperation gezeichnet, sondern Flussbeckenorganisationen konnten außerdem dazu beitragen, weitreichendere Kooperationsstrukturen zu entwickeln, die sich auf andere Politikfelder ausdehnen. Dieser Artikel beschäftigt sich mit dem Beitrag der Mekong River Commission (MRC und der Greater Mekong Sub-Region (GMS zur nachhaltigen Entwicklung in der Mekong Region sowie zur Förderung allgemeiner regionaler Kooperation im Festländischen Südostasien.

  2. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2003-08-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  3. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2002-09-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  4. Detection of radioactive materials at borders

    International Nuclear Information System (INIS)

    2004-05-01

    By international agreements, the movement of all radioactive materials within and between States should be subject to high standards of regulatory, administrative, safety and engineering controls to ensure that such movements are conducted in a safe and secure manner. In the case of nuclear materials, there are additional requirements for physical protection and accountability to ensure against threats of nuclear proliferation and to safeguard against any attempts at diversion. The results of the terrorist attacks of September 2001 emphasized the requirement for enhanced control and security of nuclear and radioactive materials. In this regard, measures are being taken to increase the global levels of physical protection and security for nuclear materials. Experience in many parts of the world continues to prove that movements of radioactive materials outside of the regulatory and legal frameworks continue to occur. Such movements may be either deliberate or inadvertent. Deliberate, illegal movements of radioactive materials, including nuclear material, for terrorist, political or illegal profit is generally understood to be illicit trafficking. The more common movements outside of regulatory control are inadvertent in nature. An example of an inadvertent movement might be the transport of steel contaminated by a melted radioactive source that was lost from proper controls. Such a shipment may present health and safety threats to the personnel involved as well as to the general public. States have the responsibility for combating illicit trafficking and inadvertent movements of radioactive materials. The IAEA co-operates with Member States and other international organizations in joint efforts to prevent incidents of illicit trafficking and inadvertent movements and to harmonize policies and measures by the provision of relevant advice through technical assistance and documents. As an example, the IAEA and the World Customs Organization (WCO) maintain a Memorandum

  5. Transboundary cooperation

    International Nuclear Information System (INIS)

    Rauber, D.

    2006-01-01

    The operation of nuclear power plants near national borders requires a close bilateral co-operation to cope with accidents having off-site radiological impacts. For example in 1978 such an agreement was signed by the German and Swiss government. The accident at the Chernobyl NPP changed the international co-operation in the framework of international consequence management. International conventions were agreed to insure a timely notification and international assistance in case of an accident with transboundary effects. In order to fulfill these conventions several procedures were introduced. In addition, bilateral agreements were signed also with countries which are not operating nuclear power plants near national borders. Since then no accident took place that would have required any notification. However, following the experience the expectations to these networks have changed considerably and hence sustainable development is required to cope with new challenges such as long term consequences management, new radiological threats, faster international assistance, media and public concerns, and technical evolution of communications systems. (author)

  6. From APEC 2011 to APEC 2012: American and Russian Perspectives on Asia-Pacific Security and Cooperation

    Science.gov (United States)

    2012-01-01

    ways associated with hegemonic intentions, as ascendant powers have done in the past? Is the difference between a cute and cuddly panda and a fire...risks of resisting or containing China will be too great to bear . The region could be overwhelmed by Chinese economic blandishments to support...according to Russian Foreign Minis- ter Sergei Lavrov, today not only serves “as the main load- bearing struc- ture of cooperation,”6 but, following the

  7. The Future of Swiss Foreign and Security Policy: Increasing International Cooperation is the Key to National Autonomy

    Science.gov (United States)

    2011-12-01

    the particular states them selves. Therefore, this study is not based on a specific data set, like for example, the statistics provided by the...reduction of the armed forces. The gigantic military apparatus of the Cold War was just too expensive. Nonetheless, no major strategic realignments...processed agricultural products, cooperation in statistics , fighting fraud, retirement pensions of EU officials, and Swiss participation in the EU media

  8. Permeability of Czech-Polish Border Using by Selected Criteria

    Czech Academy of Sciences Publication Activity Database

    Kolejka, Jaromír; Zyszkowska, K.; Batelková, Kateřina; Ciok, S.; Dolzblasz, K.; Kirchner, Karel; Krejčí, Tomáš; Raczyk, A.; Spaller, W.; Zapletalová, Jana

    2015-01-01

    Roč. 10, č. 1 (2015), s. 51-65 ISSN 1842-5135 Institutional support: RVO:68145535 Keywords : natural barrier * cross border co-operation * population pressure * border segments * Poland and Czech Republic Subject RIV: DE - Earth Magnetism, Geodesy, Geography http://technicalgeography.org/pdf/1_2015/06_kolejka.pdf

  9. Children's very low food security is associated with increased dietary intakes in energy, fat, and added sugar among Mexican-origin children (6-11 y in Texas border Colonias

    Directory of Open Access Journals (Sweden)

    Sharkey Joseph R

    2012-02-01

    Full Text Available Abstract Background Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y who resided in Texas border colonias. Methods Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Results Thirty-two children (64% reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. Conclusions This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the

  10. Children's very low food security is associated with increased dietary intakes in energy, fat, and added sugar among Mexican-origin children (6-11 y) in Texas border Colonias.

    Science.gov (United States)

    Sharkey, Joseph R; Nalty, Courtney; Johnson, Cassandra M; Dean, Wesley R

    2012-02-20

    Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y) who resided in Texas border colonias. Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure) and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Thirty-two children (64%) reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the associations for food insecurity and diet among this sample of Mexican

  11. Cross-border regional innovation system integration

    DEFF Research Database (Denmark)

    Makkonen, Teemu; Weidenfeld, Adi; Williams, Allan

    2017-01-01

    The importance of inter-regional cooperation and innovation are widely accepted in the development rhetoric of the European Union. The highlighted importance of both themes in the context of borderlands has recently led to the coining of a new concept, cross-border regional innovation system...... of cross-border cooperation in a regional innovation system setting. The framework was further tested with illustrative empirical cases that demonstrate its feasibility........ However, little attention has been given to the empirical analysis of the concept. This paper suggests a framework for empirically validating the concept by examining the levels of integration between cross-border regions. The outcome is a proposed framework can be operationalized by measurable indicators...

  12. Border information flow architecture

    Science.gov (United States)

    2006-04-01

    This brochure describes the Border Information Flow Architecture (BIFA). The Transportation Border Working Group, a bi-national group that works to enhance coordination and planning between the United States and Canada, identified collaboration on th...

  13. Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2015-05-01

    Full Text Available Future communication networks would be required to deliver data on a far greater scale than is known to us today, thus mandating the maximal utilization of the available radio spectrum using cognitive radios. In this paper, we have proposed a novel cooperative spectrum sensing approach for cognitive radios. In cooperative spectrum sensing, the fusion center relies on reports of the cognitive users to make a global decision. The global decision is obtained by assigning weights to the reports received from cognitive users. Computation of such weights requires prior information of the probability of detection and the probability of false alarms, which are not readily available in real scenarios. Further, the cognitive users are divided into reliable and unreliable categories based on their weighted energy by using some empirical threshold. In this paper, we propose a method to classify the cognitive users into reliable, neutral and unreliable categories without using any pre-defined or empirically-obtained threshold. Moreover, the computation of weights does not require the detection, or false alarm probabilities, or an estimate of these probabilities. Reliable cognitive users are assigned the highest weights; neutral cognitive users are assigned medium weights (less than the reliable and higher than the unreliable cognitive users’ weights; and unreliable users are assigned the least weights. We show the performance improvement of our proposed method through simulations by comparing it with the conventional cooperative spectrum sensing scheme through different metrics, like receiver operating characteristic (ROC curve and mean square error. For clarity, we also show the effect of malicious users on detection probability and false alarm probability individually through simulations.

  14. The Border Multiple

    DEFF Research Database (Denmark)

    of European borders by looking at border practices in the light of the mobility turn, and thus as dynamic, multiple, diverse and best expressed in everyday experiences of people living at and with borders, rather than focusing on static territorial divisions between states and regions at geopolitical level...

  15. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  16. The Border Multiple

    DEFF Research Database (Denmark)

    Addressing and conceptualizing the changing character of borders in contemporary Europe, this book examines developments occurring in the light of European integration processes and an on-going tightening of Europe's external borders. Moreover, the book suggests new ways of investigating the nature...... of European borders by looking at border practices in the light of the mobility turn, and thus as dynamic, multiple, diverse and best expressed in everyday experiences of people living at and with borders, rather than focusing on static territorial divisions between states and regions at geopolitical level...

  17. CONSIDERATIONS REGARDING EUROJUST'S CONTRIBUTION IN FIGHTING CROSS-BORDER CRIME IN EUROPE

    Directory of Open Access Journals (Sweden)

    Ion, MIHALCEA

    2014-11-01

    Full Text Available One of the objectives of the European Union enshrined in 67 alin.(1 (ex-art. 61 TCE and ex-art. 29 TUE of the consolidated version of the Treaty on European Union is to create a common European space of security and justice without internal frontiers, in which to ensure the free movement of people, corralated with appropriate measures on external border controls , asylum , immigration, and crime prevention and combating. This is a long term goal that requires active cooperation of Member States and multiple efforts by EU institutions. The institutional functioning practice has shown that the clasic forms of judicial cooperation do not have the ability to complete this objective and that is necessary to create specialized structures. In this context the First European institutional structure was established in 2002, a specialized agency of the European Union, named Eurojust, with the main objective to promote and improve coordination and cooperation between the judicial authorities of the Member States in the fight against serious cross-border crime affecting the European Union. Tasks of Eurojust and relations with other European bodies, particularly the Council and Commission are established by Decision 2002/187 / JHA amended by Decision 2009/426 / JHA Council of 16 December 2008 It is exercised by College Eurojust or through its national members.

  18. International cooperation for operating safety

    International Nuclear Information System (INIS)

    Dupuis, M.C.

    1989-03-01

    The international-cooperation organization in nuclear safety domain is discussed. The nuclear energy Direction Committee is helped by the Security Committee for Nuclear Power Plants in the cooperation between security organizations of member countries and in the safety and nuclear activity regulations. The importance of the cooperation between experts in human being and engine problems is underlined. The applied methods, exchange activities and activity analysis, and the cooperation of the Nuclear Energy Agency and international organizations is analysed [fr

  19. Communication received from the Resident Representatives of Germany, the Netherlands and the United Kingdom to the Agency concerning multilateral cooperation on energy security in support of Article IV of the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The Director General has received a letter dated 13 September 2007 from the Resident Representatives of Germany, the Netherlands and the United Kingdom, attaching a declaration concerning multilateral cooperation on energy security in support of Article IV of the Treaty on the Non-Proliferation of Nuclear Weapons. The letter and, as requested therein, the declaration, are herewith circulated for information

  20. Borders and Borderlands in the Americas

    Science.gov (United States)

    2012-08-01

    both licit and illicit networks. Traditional territorial security concerns declined in the Americas following the end of the Cold War, and NAFTA in...deepen economic ties and liberalize regimes, privileging development over security.12 Similarly, trade, fostered through NAFTA , has shaped and affected...FOR FURTHER RESEARCH States determine what a “problem” at the border is through their constitutions , legal regimes, and policies. This means that

  1. Hungary-Ukraine energy cooperation and its contribution to the security of supply in the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Kiss, P.

    2007-07-01

    The European Union (EU) will be increasingly dependant upon non-EU primary energy resources as domestic resources are depleted. Ukraine can play a pivotal role in future supply to the EU through its neighbor Hungary. Ukraine is the largest country in the world by volume of gas transit. Through its pipeline, the transit gas deliveries amount annually to 140 billion m{sup 3}, including 120 billion m{sup 3} to countries of Central and Western Europe. The country also has an under-utilized 750 kV electricity transmission line that reaches into Hungary. These assets make Eastern Hungary a key location for a Combined Cycle Gas Turbine (CCGT). A plant of this type would be able to provide electricity generation for the Central Eastern Europe (CEE) region. The heat generated by the plant could also be used in local industrial and agricultural production, thereby providing an additional impetus for regional development initiatives. Hungary is open for foreign investment from the West, but also from investors in the Ukraine and Russia. The construction of the CCGT plant and the related regional development is a great opportunity to strengthen the cooperation of Ukraine, the EU and Hungary for the common benefit of the entire region. (auth)

  2. Cooperation or Localization in European Capacity Markets? A Coalitional Game over Graph Approach

    Directory of Open Access Journals (Sweden)

    Giorgos Stamtsis

    2018-06-01

    Full Text Available Capacity markets, as a means to address the capacity adequacy issue, are constantly becoming an important part of the European internal electricity market. The debate focuses on how the capacity markets will be smoothly integrated in one Pan-European power market, without resulting in multiple national fragmentations and consequently in economic efficiency losses. Cross-border participation and regional cooperation are considered as two sine qua non conditions in this respect. The present paper provides a coalitional game theoretical approach aiming to facilitate the cooperation of neighboring countries, when it comes to the security of electricity supply and the necessity of establishing a capacity market. Such an approach can support respective decisions about capacity markets cooperation as well as stress-test the benefits considering all cooperation possibilities.

  3. The Nature and Functions of European Political Borders

    Directory of Open Access Journals (Sweden)

    Jernej Zupančič

    2008-07-01

    Full Text Available The political border limits a state’s territory and symbolizes the extent of a state’s power and ownership. Borders give integrity to the inner state territory which they enclose (the role of establishing national integrity and at the same time form an outer boundary segregating the state territory from the surrounding politicial entities (the segregation role. European borders are old and reflect the political history of an old continent. The last major border changes happened after World War II. Over the centuries borders were merely lines separating one territory from another. Such borders were understood as »frontiers«. Forming an effective barrier against enemies was the overriding function of borders. Many borders were fortified and further enhanced by means of various defensive systems. In the second half of the 20th century the character of political borders changed. They became a contact area between countries, nations and cultures. Contemporary European borders reflect the colourful history of an old continent. They are predominantely functional markers: they represent the political and juridical delimitation of territories, they mark economic barriers and show their defensive nature and reveal the extent of cultural contact. As a result of European integration processes, the nature of political borders has changed: instead of division, their integration role is brought to the fore. A united Europe is nevertheless still not a borderless Europe! The borders within the »Schengen-area« have retained their political and administrative functions, it is just that the customs and security checks at the borders have been removed. During the period of European integration, borderlines were stabilized in accordance with the 1974 Helsinki Agreement. But despite this we can still observe ongoing changes to state borders, particularly in areas of conflict such as the Balkan peninsula. It seems after all that the process of demarcation

  4. Divided we fall... or rise? Tajikistan–Kyrgyzstan border dilemma

    Directory of Open Access Journals (Sweden)

    Anna Matveeva

    2017-02-01

    Full Text Available The Kyrgyzstan–Tajikistan border remains one of the last undefined frontiers in the Commonwealth of Independent States, where the governments are reluctant to act against the wishes of their border communities and force delimitation solutions that may cause social protests. Uncertainty of territorial arrangements persists; however, the era of commonality and interdependence may be at its end due to the establishment of a border as a means of spatial control. Border drawing reflects the divergent development trajectories of the new states, seeking to break out of an interdependence pattern. Borderlands’ interactions become more conflictual. Generation change and a loss of common language work to widen the inter-communal gap. Ethnicity and identity factors grew in significance as association with the nation-states increased, and a border expresses a symbol of nationhood in this paradigm. Crucially, a border justifies a security regime, reinforced by international assistance policies, to project power over the territory. Actions of security structures cause grievances but also signify a protective arm of the state, a role that the border communities appreciate, themselves acting as a collective border guard and projecting their fears of encroachment onto the borders. The expansion of the Eurasian Economic Union became a new factor that could have served to alleviate the pressure to divide territory and assets, but this could work only if two countries joined it at the same period. With this option unavailable, a territorial impasse has been reached.

  5. Border Crossings, US-Mexico Border, 2010, NAVTEQ

    Data.gov (United States)

    U.S. Environmental Protection Agency — NAVTEQ Border Crossings for Region 9. The Border Crossing layer contains all international border crossings for all motorway crossings, as well as other important...

  6. Border Crossing Points, US-Mexico Border, 2015, NAVTEQ

    Data.gov (United States)

    U.S. Environmental Protection Agency — NAVTEQ Border Crossings for the United States. The Border Crossing layer contains all international border crossings for all motorway crossings, as well as other...

  7. Straddling the border

    DEFF Research Database (Denmark)

    Eilenberg, Michael

    2011-01-01

    border between the Indonesian province of West Kalimantan and the Malaysian state of Sarawak on the island of Borneo. Based on local narratives, the aim of this paper is to unravel the little known history of how the Iban segment of the border population in West Kalimantan became entangled in the highly...

  8. The Border Pedagogy Revisited

    Science.gov (United States)

    Kazanjian, Christopher John

    2011-01-01

    Border pedagogy is a multicultural educational approach utilized in multicultural settings to help students understand their histories and experiences and how it affects their identities and cultures. The approach seeks to produce intellectuals that transcend physical and metaphysical boundaries. The goal of border pedagogy is to remove cultural…

  9. Security Governance on Ecuador's Northern Border | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Two new initiatives to support STEM careers for women. Women in the developing world continue to face obstacles that limit their ability to establish careers and become leaders in the fields of science, technology, engineering, and mathematics (STEM). View moreTwo new initiatives to support STEM careers for women ...

  10. Business, brokers and borders

    DEFF Research Database (Denmark)

    Walther, Olivier

    Using social network analysis, this paper studies the structure of trade networks that developed across West African borders. The first part aims to understand the centralization of cross-border trade networks. In a business environment where transaction costs are extremely high, we find...... developed with foreign partners from a different origin, religion or culture. In the second part, we study the spatial structure of trade networks and the influence of national borders on the development of social ties. The paper shows that the spatial form of trade networks is constrained by the historical...... origin of the traders engaged in cross-border activities. In those markets where trade is recent and where most of the traders are not native of the region, national borders are likely to exert a greater influence than in those regions where trade has pre-colonial roots....

  11. Why Border Enforcement Backfired.

    Science.gov (United States)

    Massey, Douglas S; Durand, Jorge; Pren, Karen A

    2016-03-01

    In this article we undertake a systematic analysis of why border enforcement backfired as a strategy of immigration control in the United States. We argue theoretically that border enforcement emerged as a policy response to a moral panic about the perceived threat of Latino immigration to the United States propounded by self-interested bureaucrats, politicians, and pundits who sought to mobilize political and material resources for their own benefit. The end result was a self-perpetuating cycle of rising enforcement and increased apprehensions that resulted in the militarization of the border in a way that was disconnected from the actual size of the undocumented flow. Using an instrumental variable approach, we show how border militarization affected the behavior of unauthorized migrants and border outcomes to transform undocumented Mexican migration from a circular flow of male workers going to three states into an eleven-million person population of settled families living in 50 states.

  12. Identifying and characterizing transboundary aquifers along the Mexico-US border: An initial assessment

    Science.gov (United States)

    Sanchez, Rosario; Lopez, Victoria; Eckstein, Gabriel

    2016-04-01

    The transboundary nature of water dividing Mexico and the United States (U.S.) transforms the entire border region into an instrument of cooperation, a source of conflict, a national security issue, and an environmental concern. Reasonable data collection and research analysis have been conducted for surface waters by joint governmental institutions and non-governmental bodies. However, with the exception of the U.S. Transboundary Assessment Act Program (TAAP) (focusing on the Hueco Bolson, Mesilla Bolson, San Pedro and Santa Cruz aquifers), there is no comparable research, institutional development, or assessment of transboundary groundwater issues on the frontier. Moreover, data collection and methodologies vary between the two countries, there is no broadly accepted definition of the transboundary nature of an aquifer, and available legal and policy frameworks are constrained by non-hydrological considerations. Hence, there is a conceptual and institutional void regarding transboundary groundwater resources between Mexico and the U.S. The purpose of this paper is to bridge this void and characterize transboundary aquifers on the Mexico-US border. It reviews existing international frameworks for identifying hydrological and social criteria that characterize an aquifer as transboundary. It then assesses data from both countries to propose where and which aquifers could be considered transboundary. Finally, the paper proposes an agenda for assessing Mexico-US transboundary aquifers as a means for improving groundwater management in the border region.

  13. ITRAP results: detection of radioactive material at the borders to combat Illicit trafficking

    International Nuclear Information System (INIS)

    Beck, P.; Schmitzer, C.; Mueck, K.; Duftschmid, K.E.; Arlt, R.

    2001-01-01

    The paper describes the results of the extended pilot study ITRAP (Illicit trafficking radiation assessment program) of commercially available monitoring systems for the detection of nuclear and other radioactive materials at border crossings. ITRAP was carried out from the Austrian research center Seibersdorf (ARCS) for the Austrian Government, coordinated by the Ministry of Economic Affairs and Labour. In co-operation with the international atomic energy agency (IAEA) the program was also supported by the word customs organisation (WCO), the international criminal police organization (INTERPOL) and the Hungarian Government. The ITRAP study consists of a laboratory test phase and field tests at the Austrian/Hungarian border Nickelsdorf and the Vienna airport, each for a duration of one year. The results will be used to derive realistic performance requirements for border control systems in view of optimised technical and economic conditions. First results of the ITRAP study were given at the IAEA Conference On the Safety of Radiation Sources and the Security of Radioactive Materials, Dijon, France, in September 1998 [1]. (orig.)

  14. ASEAN energy cooperation an increasingly daunting challenge

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, F.

    2009-07-01

    energy appears to be an ideal area for cooperation: given the characteristics of these economies, and in particular their shared concerns with energy security, it seems logical for them to push for resource sharing and interconnecting so as to enhance security. Energy cooperation has indeed been on ASEAN's agenda for a long time and the recent rise in oil prices has no doubt rekindled interest in cooperative initiatives in the energy sector. However, an oft-heard criticism about ASEAN is that it tends to be often long on good intentions and relatively short on actions. The objective of the present paper is two-fold, first to survey and assess critically ASEAN's achievements in the area of energy cooperation, and secondly to examine the future prospects, as well as the limitations of further cooperation. In this context, the appropriate scope for further cooperation, in particular its extension beyond the borders of ASEAN, needs to be examined. The paper is organized in two parts. The first part provides a brief overview of the energy situation in ASEAN. The second part assesses the various cooperative initiatives undertaken by ASEAN and examines the opportunities and challenges associated with the extension of energy cooperation beyond the borders of ASEAN. (author)

  15. ASEAN energy cooperation an increasingly daunting challenge

    International Nuclear Information System (INIS)

    Nicolas, F.

    2009-01-01

    to be an ideal area for cooperation: given the characteristics of these economies, and in particular their shared concerns with energy security, it seems logical for them to push for resource sharing and interconnecting so as to enhance security. Energy cooperation has indeed been on ASEAN's agenda for a long time and the recent rise in oil prices has no doubt rekindled interest in cooperative initiatives in the energy sector. However, an oft-heard criticism about ASEAN is that it tends to be often long on good intentions and relatively short on actions. The objective of the present paper is two-fold, first to survey and assess critically ASEAN's achievements in the area of energy cooperation, and secondly to examine the future prospects, as well as the limitations of further cooperation. In this context, the appropriate scope for further cooperation, in particular its extension beyond the borders of ASEAN, needs to be examined. The paper is organized in two parts. The first part provides a brief overview of the energy situation in ASEAN. The second part assesses the various cooperative initiatives undertaken by ASEAN and examines the opportunities and challenges associated with the extension of energy cooperation beyond the borders of ASEAN. (author)

  16. International workshop on transparency technology for nonproliferation cooperation in the Asia Pacific. Applications of remote monitoring and secure communications for regional confidence building

    International Nuclear Information System (INIS)

    Betsill, J. David; Hashimoto, Yu

    2009-08-01

    The Japan Atomic Energy Agency (JAEA) sponsored an international workshop 20-22 February 2008 on 'Transparency Technology for Nonproliferation Cooperation in the Asia Pacific - Applications of Remote Monitoring and Secure Communications for Regional Confidence Building.' The Workshop focused on identifying appropriate roles and functions for Transparency in addressing nonproliferation concerns associated with the use of nuclear energy, particularly in the East Asia region. Participants from several East Asia countries included representatives from nuclear energy research institutions, Ministries, facility operators, and non-governmental organizations. Regional participation from countries currently developing their nuclear energy infrastructure was also encouraged. Several promising students from the University of Tokyo and the Tokyo Institute of Technology, representing the next generation of nuclear energy experts, also participated in the meeting and added significant value and fresh viewpoints. The participants agreed that transparency has many roles and definitions, and that its usefulness ranges for verification and compliance with the Nonproliferation Treaty (NPT) to building trust and confidence in the activities of the state and other regional nuclear energy stakeholders. In addition, they identified a need for further education among the professional community, public, operators, and regulators as a key factor in transparency effectiveness. Also, the education and cultivation of the next generation of nuclear energy experts was identified as crucial to the long-term success and acceptance of nuclear energy development. And finally, that the development, selection, and implementation of technology that is appropriate to the goals and participants of a transparency effort are unique to each situation and are key to the successful acceptance of cooperative transparency and regional confidence building. At the conclusion of the Workshop it was importantly

  17. From cooperation to globalization

    Directory of Open Access Journals (Sweden)

    Gabriela UNGUREANU

    2010-09-01

    Full Text Available Globalization is seen as a consequence of cross-border business. This complex and irreversible process can be seen as an extension of capitalist relations of production or increased interdependence in the economic system. Globalization has given rise to more and more fields of activity worldwide. To meet the challenges of business globalization, many companies form strategic alliances, cooperate or merge with other companies. Cooperation is seen by many companies as an alternative path to success. In recent years joint international associations, licensing, co-production agreements, joint research programs, exploration of consortia and other cooperative relationships between two or more corporations with potential have increased. We notice a cooperation tendency among small-sized companies, especially among those from the developing countries.

  18. BTFS: The Border Trade Facilitation System

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, L.R.

    1999-03-18

    The author demonstrates the Border Trade Facilitation System (BTFS), an agent-based bilingual e-commerce system built to expedite the regulation, control, and execution of commercial trans-border shipments during the delivery phase. The system was built to serve maquila industries at the US/Mexican border. The BTFS uses foundation technology developed here at Sandia Laboratories' Advanced Information Systems Lab (AISL), including a distributed object substrate, a general-purpose agent development framework, dynamically generated agent-human interaction via the World-Wide Web, and a collaborative agent architecture. This technology is also the substrate for the Multi-Agent Simulation Management System (MASMAS) proposed for demonstration at this conference. The BTFS executes authenticated transactions among agents performing open trading over the Internet. With the BTFS in place, one could conduct secure international transactions from any site with an Internet connection and a web browser. The BTFS is currently being evaluated for commercialization.

  19. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  20. Border blocking effects in collaborative firm innovation: exploring the factors related with scientist' willingness to incorporating external knowledge

    NARCIS (Netherlands)

    Broek, Jos; Benneworth, Paul Stephen; Rutten, Roel

    2016-01-01

    Border regions are not often associated with innovation and economic prosperity. Nevertheless, the opening up of borders in Europe has presented new opportunities for firms located in these border regions to co-operate and find necessary resources for their innovation process. Despite the reduction

  1. Border Crossing Entry Data

    Data.gov (United States)

    Department of Transportation — The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics for inbound crossings at the U.S.-Canadian and the U.S.-Mexican...

  2. Border of spacetime

    International Nuclear Information System (INIS)

    Harada, Tomohiro; Nakao, Ken-ichi

    2004-01-01

    It is still uncertain whether the cosmic censorship conjecture is true or not. To get a new insight into this issue, we propose the concept of the border of spacetime as a generalization of the spacetime singularity and discuss its visibility. The visible border, corresponding to the naked singularity, is not only relevant to mathematical completeness of general relativity but also a window into new physics in strongly curved spacetimes, which is in principle observable

  3. Border effects without borders: What divides Japan's internal trade?

    OpenAIRE

    Wrona, Jens

    2015-01-01

    Over the last 20 years the trade literature repeatedly documented the trade-reducing effects of inter- and intra-national borders. Thereby, the puzzling size and persistence of observed border effects from the beginning raised doubts on the role of underlying political borders. However, when observed border effects are not caused by political trade barriers, why should their spatial dimension then inevitably coincide with the geography of present or past political borders? This paper identifi...

  4. 77 FR 52753 - U.S. Customs and Border Protection 2012 East Coast Trade Symposium: “Expanding 21st Century...

    Science.gov (United States)

    2012-08-30

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection U.S. Customs and Border.... Customs and Border Protection, Department of Homeland Security (DHS). ACTION: Notice of trade symposium... Coast Trade Symposium will be held at the Renaissance DC Hotel, at 999 9th Street, NW., Washington, DC...

  5. The Gulf Security Dialogue and Related Arms Sale Proposals

    National Research Council Canada - National Science Library

    Blanchard, Christopher M; Grimmett, Richard F

    2008-01-01

    ...) security cooperation under the auspices of a new Gulf Security Dialogue (GSD). The Dialogue now serves as the principal security coordination mechanism between the United States and the six countries of the Gulf Cooperation Council (GCC...

  6. SOME ASPECTS OF THE REGIONAL COOPERATION IN THE BALKANS

    Directory of Open Access Journals (Sweden)

    Mariya Gospodinova Grozeva

    2017-04-01

    Full Text Available Since the beginning of the 21st century, the political role of the state borders in the Balkans has changed. Gradually they began to transform from barriers into zones of bilateral and multilateral cooperation. The common European integration includes the creation and development of Euro-regions. Within the context of reorganization of the new European space, geopolitical importance of South-East Europe has significantly upgraded. This fact reflects on the interests of the international community in security and development of this region. Despite that the Balkans constitute an indispensable part of the European continent, their incorporation into the new European architecture has been particularly difficult and problematic. They emerge as the most volatile and least integrated European region. There are significant variations among the countries concerning their territory, number of population, as well as the rate of the economic changes. The main forms of regional cooperation should be concentrated on the domains of transport, energy and communication infrastructure, trade and economic cooperation, environment and security. From this point of view, the economic growth and increase of living standard are the most important problems for all Balkan countries.

  7. EUROPEAN UNION INITIATIVES IN TACKLING MIGRATION AND ORGANIZED CRIME AT ITS NEW EASTERN BORDER

    Directory of Open Access Journals (Sweden)

    Adrian Pop

    2008-04-01

    Full Text Available The EU migration strategy in relation to its new eastern neighbours has started to take shape. Among other things, it includes: applying the Global Approach to Migration to the eastern regions neighbouring the EU; securing the necessary funding for migration management through the European Neighbourhood and Partnership Instrument (ENPI and the Thematic Programme for the cooperation with third countries in the areas of migration and asylum; promoting mobility partnerships and circular migration; concluding short-term visa facilitation and readmission agreements; and opening the first Common Visa Application Centre in the capital city of the Republic of Moldova. In addition, the EU has improved its regional focus by the help of the Black Sea Synergy European Commission Communication and extended for 2008-2009 the mandate of its Border Assistance Mission to Moldova and Ukraine (EUBAM, which is set to tackling irregular migration, drugs and cigarettes smuggling, and stolen cars and guns trafficking.

  8. Border region studies

    DEFF Research Database (Denmark)

    Makkonen, Teemu; Williams, Allan

    2016-01-01

    The contemporary conditions of academic capitalism exert pressures on researchers to avoid ‘peripheral’ journals and ‘unfashionable’ topics. Here an attempt is made to shed light onto the structure of one such ‘offbeat’ field, namely ‘border region studies’, by discussing its geographical...... distribution, key themes, significance and impact. The review suggests that border region studies can be considered a significant and important ‘branch’ of regional studies, which accounts for a small but increasing proportion of regional studies research particularly in Europe and North America. Four main...

  9. From Borders to Margins

    DEFF Research Database (Denmark)

    Parker, Noel

    2009-01-01

    of entities that are ever open to identity shifts.  The concept of the margin possesses a much wider reach than borders, and focuses continual attention on the meetings and interactions between a range of indeterminate entities whose interactions may determine both themselves and the types of entity...... upon Deleuze's philosophy to set out an ontology in which the continual reformulation of entities in play in ‘post-international' society can be grasped.  This entails a strategic shift from speaking about the ‘borders' between sovereign states to referring instead to the ‘margins' between a plethora...

  10. In What Ways Has US Security Cooperation Programs Been Effective in Helping Kenya to Build Partnership Capacity to Counter Transnational Terrorism?

    National Research Council Canada - National Science Library

    Henneke, Jason C

    2007-01-01

    .... In addition to host-nation capacity building, the cooperation of all agencies within the U.S. Government (USG) is required for a coordinated and effective approach to the Global War on Terrorism...

  11. Illela border market: origin and contributions to trans-border ...

    African Journals Online (AJOL)

    Illela border market: origin and contributions to trans-border relations between Nigeria and Niger republic. ... cordial relations between her and her immediate neighbours and thus stem the scourge of smuggling and other trans-border crimes which have negatively affected the Nigerian economy and her international image.

  12. Border Crossing/Entry Data

    Data.gov (United States)

    Department of Transportation — The dataset is known as “Border Crossing/Entry Data.” The Bureau of Transportation Statistics (BTS) Border Crossing/Entry Data provides summary statistics to the...

  13. Securities and banking: bridges and walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-09-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securitiesbusinesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  14. 75 FR 36663 - Notice of Meeting of the Advisory Committee on Commercial Operations of Customs and Border...

    Science.gov (United States)

    2010-06-28

    ... may close early if all business is finished. Members of the public may register online to attend this... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection [Docket No. USCBP-2010-0021... (COAC) AGENCY: U.S. Customs and Border Protection, Department of Homeland Security (DHS). ACTION: Notice...

  15. International cooperation

    International Nuclear Information System (INIS)

    2008-01-01

    In this chapter international cooperation of the Division for Radiation Safety, NPP Decommissioning and Radwaste Management of the VUJE, a. s. is presented. Very important is cooperation with the International Atomic Energy Agency. This cooperation has various forms - national and regional projects of technical cooperation, coordinated research activities, participation of our experts in preparation of the IAEA documentation etc.

  16. The financing of cooperative businesses

    Directory of Open Access Journals (Sweden)

    Alfredo Ispizua

    2005-12-01

    Full Text Available Concern for adequate funding, both at birth and consolidation of the cooperative enterprise, has been, is and will be a constant concern in the cooperative world. So, have emerged in the legal field, a number of financial instruments of various kinds: as equity securities or special interests that seek to cover traditional financing gaps.

  17. Border cell release

    DEFF Research Database (Denmark)

    Mravec, Jozef

    2017-01-01

    Plant border cells are specialised cells derived from the root cap with roles in the biomechanics of root growth and in forming a barrier against pathogens. The mechanism of highly localised cell separation which is essential for their release to the environment is little understood. Here I present...... in situ analysis of Brachypodium distachyon, a model organism for grasses which possess type II primary cell walls poor in pectin content. Results suggest similarity in spatial dynamics of pectic homogalacturonan during dicot and monocot border cell release. Integration of observations from different...... species leads to the hypothesis that this process most likely does not involve degradation of cell wall material but rather employs unique cell wall structural and compositional means enabling both the rigidity of the root cap as well as detachability of given cells on its surface....

  18. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  19. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    International Nuclear Information System (INIS)

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  20. ITDB Cooperation With International Organizations

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA illicit trafficking database cooperates with many international organizations. Among these organizations are Interpol, Universal Postal Union,and World Customs Organization. Other organizations are Organization for Security and Cooperation in Europe, UN Economic Commission for Europe, UN-Department of Disarmament Affairs and UN office for Drug and Crime. The cooperation with Interpol involves consultations on issues of training and technical assistance and other matters of common interest.

  1. Stretching the Border

    DEFF Research Database (Denmark)

    Horstmann, Alexander

    2014-01-01

    In this paper, I hope to add a complementary perspective to James Scott’s recent work on avoidance strategies of subaltern mountain people by focusing on what I call the refugee public. The educated Karen elite uses the space of exile in the Thai borderland to reconstitute resources and to re-ent......-based organizations succeed to stretch the border by establishing a firm presence that is supported by the international humanitarian economy in the refugee camps in Northwestern Thailand....

  2. The Enemy at the Gates: International Borders, Migration and Human Rights

    Directory of Open Access Journals (Sweden)

    Pia Oberoi

    2013-07-01

    Full Text Available This article considers contemporary border management regimes from a human rights perspective. It demonstrates how a preoccupation with border controls and enforcement has led to serious concerns for the safety and protection of migrants. As border zones have expanded, border crossing has become a more stigmatized and dangerous activity, and even as globalization has given rise to easier and faster international travel, for some, such movement has been outlawed and stigmatized. Measures to strengthen and “secure” borders have paradoxically made migrants, particularly irregular and vulnerable migrants, more at risk of violence and exploitation by non-State and State actors. Migration governance regimes at international borders are thus increasingly located within security and enforcement frameworks that pay little attention to the principles and standards of international human rights law. The paper argues that a human rights-based approach to such regimes is urgently needed, in order to address a growing human rights crisis at international borders.

  3. South Asia energy security: Challenges and opportunities

    International Nuclear Information System (INIS)

    Kumar Singh, Bhupendra

    2013-01-01

    South Asia has witnessed a growing imbalance between energy demand and its supply from indigenous sources resulting in increased import dependence. Energy endowments differ among the South Asian countries. However, access to the significant energy resources in the neighboring countries is denied, which increases the cost of energy supply and reduces energy security of the individual countries and of the region as a whole. The countries in the region could benefit significantly only by strengthening the mechanism of energy trade through improved connectivity. Therefore, greater cooperation within South Asia could be one of the most effective ways to deal with this Regional Energy deficit and ensure Energy Security of the Region. - Highlights: • No South Asian country is going to be able to meet its energy needs domestically. • Fostering cross border energy trade and promotion of investments opportunities are key solutions. • India’s neighbors have huge potential in hydroelectricity. • Co-operation among nations to tap the energy resource can be a win–win situation for all. • However it faces certain challenges

  4. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  5. Development of Indonesia-Papua New Guinea border, Muara Tami District, Jayapura City through agropolitan concept

    Science.gov (United States)

    Subagiyo, A.; Dwiproborini, F.; Sari, N.

    2017-06-01

    The border of RI-PNG Muara Tami district is located on the eastern part of Jayapura city, which has agricultural potential. The past paradigm put the border as the backyard caused underdevelopment in border RI-PNG Muara Tami district, so that needed acceleration development through agropolitan concept. The purpose of the research is to define the aspect of physical, social, economic and border security to support agropolitan concept in border RI-PNG Muara Tami district. The analytical research method are border interactionan analysis, border security analysis, land capability analysis, land availability analysis, schallogram analysis, institutional analysis, leading comodity analysis (LQ and Growth Share), agribusiness linkage system analysis, accessibility analysis and A’WOT analysis. The result shown that mobilization from PNG to Muara Tami district could increase the economic opportunities with agricultural based. Border security of RI-PNG Muara Tami district is vulnerable, yet still condusive to mobilization. There is 12.977,94 Ha potensial land for agricultural (20,93%). There are six leading commodities to developed are rice, watermelon, banana, coconut, areca nut and cocoa. The border of RI-PNG Muara Tami district is ready enough to support agropolitan concept, but still have problems in social and economy aspect.

  6. Over the border - the problems of uncontrolled radioactive materials crossing national borders

    Energy Technology Data Exchange (ETDEWEB)

    Duftschmid, K.E. E-mail: k.duftschmid@aon.at

    2002-03-01

    Cross-border movement of radioactive materials and contaminated items, in particular metallurgical scrap, has become a problem of increasing importance. Radioactive sources out of regulatory control, now often called 'orphan sources', have frequently caused serious, even deadly, radiation exposures and widespread contamination. The United States Nuclear Regulatory Commission reported over 2300 incidents of radioactive materials found in recycled metal scrap and more than 50 accidental smeltings of radioactive sources. A further potentially serious problem is illicit trafficking in nuclear and other radioactive materials. In 1995 the International Atomic Energy Agency (IAEA) started a programme to combat illicit trafficking in nuclear and other radioactive materials, which includes an international database on incidents of illicit trafficking, receiving reports from some 80 member states. For the period 1993-2000 the IAEA database includes 345 confirmed incidents. While from 1994-1996 the frequency declined significantly, this trend has been reversed since 1997, largely due to radioactive sources rather than nuclear material. This paper compares monitoring techniques for radioactive materials in scrap applied at steel plants and scrap yards with monitoring at borders, a completely different situation. It discusses the results of the 'Illicit Trafficking Radiation Detection Assessment Program', a large international pilot study, conducted in cooperation between the IAEA, the Austrian Government and the Austrian Research Centre Seibersdorf. The aim of this exercise was to derive realistic and internationally agreed requirements for border monitoring instrumentation. Finally the present extent of border monitoring installations is discussed. (author)

  7. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  8. Cross-border knowledge transfer and innovation in the European neighbourhood

    DEFF Research Database (Denmark)

    Makkonen, Teemu; Williams, Allan; Weidenfeld, Adi

    2018-01-01

    . This research gap is addressed here via interview data collected from participants in tourism related EU-funded projects in the Finnish-Russian cross-border region. These underline the importance of EU-funding in facilitating knowledge transfer and innovation between Finland and Russia. While language issues......Knowledge transfer and innovation cooperation between the EU and its neighbours has remained weakly developed. To promote this cooperation, the EU has set up initiatives for the European neighbourhood. The issue has, however, received very limited scholarly attention in the field of tourism......, and differences in business culture and administrative/legislative systems between the two countries, constitute barriers for practical cross-border cooperation, it is cross-border differences in culture and technological capabilities that drive cross-border knowledge transfer and innovation in the cross...

  9. Deaths in the Desert: The Human Rights Crisis on the U.S.--Mexico Border

    Science.gov (United States)

    Androff, David K.; Tavassoli, Kyoko Y.

    2012-01-01

    Many would acknowledge that immigration is a major issue in the United States and that immigration reform should be a priority. However, there is little attention to the human rights crisis on the U.S.-Mexican border. As a result of tightened border security since 1994, it is estimated that over 5,000 migrants have died in the Sonoran desert. The…

  10. Russia and the Shanghai Cooperation Organization: Some Elements of Strategy

    Directory of Open Access Journals (Sweden)

    Mikhail Konarovsky

    2016-12-01

    Full Text Available The new geopolitical reality that resulted from the dissolution of the USSR created the conditions for the establishment of the Shanghai Cooperation Organisation (SCO in 2001. The successful settlement of border issues between Russia and Kazakhstan, Kirgizstan and Tajikistan as well as with China also facilitated the process. With Uzbekistan joining the “Shanghai Five,” a new regional organization emerged. The SCO’s priorities were in the security sphere and the fight against the proliferation of drugs, illegal migration and organized crime, given the requirements of the times and the specific regional situation (including that in Afghanistan. As one of the active founders, Russia has always taken a leading role in the SCO’s organizational, political and legal formation, including setting specific trends and forms of cooperation, taking common measures, and holding events. During its presidency in 2008–2009 and 2014–2015, Moscow made additional efforts to strengthen cooperation among the SCO members in meeting new regional security challenges and to agree on coordinated positions on the key issues on the international and regional agenda. To increase the SCO’s credibility and political significance, Moscow emphasized its expansion, particularly with regard to the Eurasian Economic Union and the Silk Road Economic Belt. With global political and economic development growing more complicated, in order to revitalize Russia’s role in the SCO it is necessary to strengthen cooperation with China. The strategic character of bilateral relations reaffirmed at the Russian-Chinese summit in the summer of 2016 set a solid foundation.

  11. Languaging the Borders of Europe

    Directory of Open Access Journals (Sweden)

    Olivier Kramsch

    2015-11-01

    Full Text Available Emerging from a discomfort with the blind spots encountered within and across theorizations of language and space in the field of human geography, in this article, we argue for “making space” for conceptualizations that speak from and through the everyday territories of migrants in Europe today. Inspired by a range of writers thinking postcolonially and multi/trans-lingually, the authors draw on their own embodied migrant experience to argue for re-envisioning Europe’s borders through multiple languaging practices. “Languaging”, in this view, takes linguistic practices in a migrant context as an inherently prosthetic activity, whereby any dominant, national host language is inevitably subject to the subterranean rumblings of all the languages a migrant brings with her on her global journeys. Conceived as being saturated with prosthetic “absence(s”, migrant languaging practices rework cultural geography’s bounded, inward-looking, and security-fixated understanding of the language/territory nexus, the better to open a vital space for re-envisioning language’s everyday territories as sites for translational solidarity and becoming.

  12. 8 CFR 212.6 - Border crossing identification cards.

    Science.gov (United States)

    2010-01-01

    ... Section 212.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DOCUMENTARY... valid on or after October 1, 2002, the non-biometric border crossing card portion of the document is not... contain a machine-readable biometric identifier, may be admitted on the basis of the nonimmigrant visa...

  13. Cross-border contraband trade across the main route from Moyale to ...

    African Journals Online (AJOL)

    Journal of Business and Administrative Studies ... and the countries' peace and security, are challenged by the increasing nature of illegal cross border trade. ... of the business through various interventions, the success so far is limited.

  14. U.S. Customs and Border Protection Import Trade Trends - FY 2011, Year-End Report

    Data.gov (United States)

    Department of Homeland Security — U.S. Customs and Border Protection is pleased to present the Import Trade Trends Report. This report is produced semiannually and features graphical analysis and...

  15. U.S. Customs and Border Protection Import Trade Trends - FY 2010, Year-End Report

    Data.gov (United States)

    Department of Homeland Security — U.S. Customs and Border Protection is pleased to present the Import Trade Trends Report. This report is produced semiannually and features graphical analysis and...

  16. U.S. Customs and Border Protection Import Trade Trends -FY2012, Year-End Report

    Data.gov (United States)

    Department of Homeland Security — U.S. Customs and Border Protection is pleased to present the Import Trade Trends Report. This report is produced semiannually and features graphical analysis and...

  17. 78 FR 11671 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2013-02-19

    ... Term. 5. Discuss the Statement of Work and Next Steps regarding the Global Supply Chain Subcommittee... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...

  18. Bilateral Cooperation Between Indonesia and Malaysia in Combating Transnational Crime

    OpenAIRE

    Mustofa, Prof. Muhammad

    2008-01-01

    This paper us discuss that bilateral cooperation between Indonesia and Malaysia in combating transnational crime or trans-border crime. First of all, it should be based on understanding the root of the problem in trans-border crime problems. Furthermore, the effective bilateral cooperation can occur when notice the same aspects in the definition of the crime, the existence of law, the recognition of the evidence, extradition agreement, and the network information between the states.

  19. Atmospheric Science Without Borders

    Science.gov (United States)

    Panday, Arnico; Praveen, Ps; Adhikary, Bhupesh; Bhave, Prakash; Surapipith, Vanisa; Pradhan, Bidya; Karki, Anita; Ghimire, Shreta; Thapa, Alpha; Shrestha, Sujan

    2016-04-01

    The Indo-Gangetic Plains (IGP) in northern South Asia are among the most polluted and most densely populated places in the world, and they are upwind of vulnerable ecosystems in the Himalaya mountains. They are also fragmented across 5 countries between which movement of people, data, instruments and scientific understanding have been very limited. ICIMOD's Atmosphere Initiative has for the past three years been working on filling data gaps in the region, while facilitating collaborations across borders. It has established several atmospheric observatories at low and mid elevations in Bhutan and Nepal that provide new data on the inflow of pollutants from the IGP towards the mountains, as well as quantify the effects of local emissions on air quality in mountain cities. EGU will be the first international conference where these data will be presented. ICIMOD is in the process of setting up data servers through which data from the region will be shared with scientists and the general public across borders. Meanwhile, to promote cross-border collaboration among scientists in the region, while addressing an atmospheric phenomenon that affects the lives of the several hundred million people, ICIMOD' Atmosphere Initiative has been coordinating an interdisciplinary multi-year study of persistent winter fog over the Indo-Gangetic Plains, with participation by researchers from Pakistan, India, China, Nepal, Bhutan and Bangladesh. Using a combination of in-situ measurements and sample collection, remote sensing, modeling and community based research, the researchers are studying how changing moisture availability and air pollution have led to increases in fog frequency and duration, as well as the fog's impacts on local communities and energy demand that may affect air pollution emissions. Preliminary results of the Winter 2015-2016 field campaign will be shown.

  20. Illicit economies and social order: the border area of Peru, Brazil and Colombia

    OpenAIRE

    Noam López; Diego Tuesta

    2015-01-01

    In recent years, the border shared by Peru, Colombia and Brazil has become an enclave of drug production and trafficking for the international markets. It is a territory whose control is disputed by non-state actors and where state security forces suffer from severe material and transport limitations. This paper takes an ethnographic approach to explain the limitations of border security and the institutional challenges of controlling drug and wood trafficking in this context. It places the i...

  1. Conflictual cooperation

    DEFF Research Database (Denmark)

    Axel, Erik

    2011-01-01

    , cooperation appeared as the continuous reworking of contradictions in the local arrangement of societal con- ditions. Subjects were distributed and distributed themselves according to social privileges, resources, and dilemmas in cooperation. Here, the subjects’ activities and understandings took form from...

  2. Carbon tariffs and cooperative outcomes

    International Nuclear Information System (INIS)

    Eyland, Terry; Zaccour, Georges

    2014-01-01

    In the absence of an international environmental agreement (IEA) on climate change, a country may be reluctant to unilaterally implement environmental actions, as this may lead to the relocation of firms to other, lax-on-pollution countries. To avoid this problem, while still taking care of the environment, a country may impose a carbon tariff that adjusts for the differences between its own carbon tax and the other country's tax. We consider two countries with a representative firm in each one, and characterize and contrast the equilibrium strategies and outcomes in three scenarios. In the first (benchmark) scenario, in a first stage the regulators in the two countries determine the carbon taxes noncooperatively, and in a second stage, the firms compete à la Cournot. In the second scenario, the regulators cooperate in determining the carbon taxes, while the firms still play a noncooperative Cournot game. In the third scenario, we add another player, e.g., the World Trade Organization, which announced a border tax in a prior stage; the game is then played as in the first scenario. Our two major results are (i) a border-tax adjustment (BTA) mimics quite well the cooperative solution in setting the carbon taxes as in scenario two. This means that a BTA may be a way around the lack of enthusiasm for an IEA. (ii) All of our simulations show that a partial correction of the difference in taxes is sufficient to maximize total welfare. In short, the conclusion is that a BTA may be used as a credible threat to achieve an outcome that is very close to the cooperative outcome. - Highlights: • One of the first studies to consider border-tax adjustment in a strategic context. • Border-tax adjustment can lead to an optimal outcome, in cooperative sense. • Optimal outcome is achieved with partial tax adjustment

  3. A Voice of the US Southwestern Border: The 2012 “We the Border: Envisioning a Narrative for Our Future” Conference

    Directory of Open Access Journals (Sweden)

    Josiah McC. Heyman

    2013-08-01

    Full Text Available In July 2012, a diverse group of US residents living near the US-Mexico border met in El Paso, Texas for a conference entitled, We the Border: Envisioning a Narrative for Our Future.  This paper describes a vision for the US-Mexico border by diverse border residents that is at odds with the widespread view of the border as a threat to the United States. These border residents viewed their region as a set of human communities with rights, capacities, and valuable insights and knowledge. They embraced an alternative vision of border enforcement that would focus on “quality” (dangerous entrants and contraband over “quantity” (mass migration enforcement.  They called for investments in the functionality and security of ports of entry, rather than in between ports of entry.  They noted the low crime rate in US border cities, and examined how policies of not mixing local law enforcement with federal immigration enforcement contributed to this achievement. They saw the border region as the key transportation and brokerage zone of the emerging, integrated North American economy. In their view, the bilingual, bicultural, and binational skills that characterize border residents form part of a wider border culture that embraces diversity and engenders creativity. Under this vision the border region is not an empty enforcement zone, but is part of the national community and its residents should enjoy the same constitutional and human rights as other US residents. The conference participants emphasized the necessity and value of accountability and oversight of central government enforcement operations, and the need for border communities to participate in federal decision-making that affects their lives. 

  4. The Fight against Terrorism and Cross-Border Crime in the European Union

    Directory of Open Access Journals (Sweden)

    Minodora-Ioana BĂLAN-RUSU

    2012-03-01

    Full Text Available Providing an area of freedom, security and justice, an objective assumed by the European Union can only be achieved under conditions that ensure an improvement of judicial cooperation activity in criminal matters. The Council Framework Decision 2008/615/JHA of 23 June 2008 is the framework normative act that rules the Member States' cooperation in the fight against terrorism and cross-border crime. This paper is a review of the European legislative act, with critical remarks and it represents the sequel of these types of examinations, previously published. The research results consist of the presentation of some critical observations regarding the skills of the agents operating in the territory of another Member State rather than in the country from where they come, terms of keeping the data that regards people, the need to take in the records the judicial persons and the need for establishing separate accounts that would regard the natural and legal persons from other countries that are not members of the European Union. The relevant conclusions highlight the usefulness of European legislative act as a whole and the need to complete it with new provisions. The work is useful both for theorists and practitioners in the field, the essential contribution consisting of the formulation of critical remarks and sustained proposals de lege ferenda.

  5. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  6. 19 CFR 19.47 - Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  7. State borders in ETRS89 coordinates – reality or fiction ?

    Directory of Open Access Journals (Sweden)

    Jiří Poláček

    2015-12-01

    Full Text Available Common unique ETRS89 coordinates of the state boundaries are crucial for cross-border data harmonization for international projects. In the frame of European Location Framework (ELF project Czech Office for Surveying, Mapping and Cadastre (ČÚZK cooperates with Poland on egde-matching on the state border. During the preliminary phase of the project was some difficulty identified. If the state boundary is measured and administered in the national coordinate system, the accuracy of the transformation into the ETRS89 is influenced by discrepancies of the local trigonometric network, which results in two slightly different state boundaries. Final solution for Europe – international treaties on the state borders based on the ETRS89 coordinates – is necessary, but it will take years.

  8. Does knowledge have borders?

    DEFF Research Database (Denmark)

    Tange, Hanne

    International education is often promoted through discourses of openness, cross-cultural relationship-building and global understanding. But how inclusive is the kind of knowledge offered in the so-called “global” learning environments? The paper explores possible limits to knowledge production a...... and represented within their course and academic discipline. We will present in the paper the preliminary findings of our research, pointing to some of the visible and invisible borders that one finds within the field of global education....... system embedded in a specific national and institutional environment, and from this research follows that certain frames of reference, or contexts, are taken for granted by local staff and students. With internationalization, however, comes a change in the make-up of the student cohort, including...

  9. Cross border relationships

    DEFF Research Database (Denmark)

    Singla, Rashmi; Sriram, Sujata

    2010-01-01

    in which they were born. These movements also imply human relationships across the borders in different contexts with various cultural, psychological consequences. Relationships of members of migrant groups with each other, and also with the host community have important implications on the health and well......-being of not just the migrant population, but also the host communities. These relationships represent the microcosm of societal and cultural integration and cohesion at the broader levels. Studies of how and how well migrants, especially youth handle migration indicate transformations in paradigms as both...... acculturative stress and developmental possibilities are realities experienced in the search of new worlds and new opportunities. The symposia will include such changes from Denmark, India, UK and the USA, covering theoretical, methodological issues including the ethical aspects. Themes involved in crossing...

  10. Border mythology: Turner and modernity

    Directory of Open Access Journals (Sweden)

    Jorge E. Brenna B.

    2011-07-01

    Full Text Available Modernity has been creating spaces, new boundaries and borders, as metaphysical, mythological and symbolic marks of physical and imaginary territories. Modern space and its borders are metaphors, boundaries that are created, walls that rise to identify with some and categorize others. In this short paper we want to approach the problem of the transformation of the idea of border (geographical, cultural, symbolic, etc., for a reflection on the transformations of that civilized obsession called border. The border has always been a reference in facing the identities, names, symbols, different imaginary: it is more confrontational line between two otherness. From the previous framework, we reflect on Turnerian mythology, as we believe that behind the creation of the imagination of the northern border is the mythical vision of the American frontier as ideological canon that explains and confirms the presence of the white race in a border re–made in the image and likeness of the “American Dream”. Frederick Turner’s reflection on the role of the frontier in American history is not only the study of the importance of progress towards the West but –even more so, is the analysis of meaning that had the American frontier as a historical process that ended in 1893, as Turner said, but rather extended into the twentieth century and continues to constantly shaping the process of territorialization of the border.

  11. Border trees of complex networks

    International Nuclear Information System (INIS)

    Villas Boas, Paulino R; Rodrigues, Francisco A; Travieso, Gonzalo; Fontoura Costa, Luciano da

    2008-01-01

    The comprehensive characterization of the structure of complex networks is essential to understand the dynamical processes which guide their evolution. The discovery of the scale-free distribution and the small-world properties of real networks were fundamental to stimulate more realistic models and to understand important dynamical processes related to network growth. However, the properties of the network borders (nodes with degree equal to 1), one of its most fragile parts, remained little investigated and understood. The border nodes may be involved in the evolution of structures such as geographical networks. Here we analyze the border trees of complex networks, which are defined as the subgraphs without cycles connected to the remainder of the network (containing cycles) and terminating into border nodes. In addition to describing an algorithm for identification of such tree subgraphs, we also consider how their topological properties can be quantified in terms of their depth and number of leaves. We investigate the properties of border trees for several theoretical models as well as real-world networks. Among the obtained results, we found that more than half of the nodes of some real-world networks belong to the border trees. A power-law with cut-off was observed for the distribution of the depth and number of leaves of the border trees. An analysis of the local role of the nodes in the border trees was also performed

  12. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  13. Cooperation in energy acquisition; Kooperation in der Energiebeschaffung

    Energy Technology Data Exchange (ETDEWEB)

    Ahnis, Erik; Holzinger, Sebastian [Becker Buettner Held, Berlin (Germany)

    2011-09-15

    Increasing competition in the power industry has brought many utilities to reconsider their competitive standing. Long-term cooperations in electricity and gas acquisition are getting more important against this background as they will reduce the administrative expenditure, help develop new sources, and give more weight in business negotiations. Increasingly, cooperations are entered across national borders.

  14. International cooperation

    International Nuclear Information System (INIS)

    Prieto, F.E.

    1984-01-01

    It looks doubtless that the need for an international cooperation to solve the worldwide energy problems is already a concern of individuals, institutions, and governments. This is an improvement. But there is something lacking. The author refers to the Atoms for Peace speech, the origin of the IAEA and of the subsequent spreading of the nuclear option. He also refers back to the call made by the Mexican government for a worldwide energy cooperation. He stresses the need for governments to cooperate, so that this international cooperation on energy can be put into operation for the benefit of mankind

  15. Structure of the human vitreoretinal border region

    DEFF Research Database (Denmark)

    Heegaard, Steffen

    1994-01-01

    Øjenpatologi, vitreoretinal border region, inner limiting membrane, retina, topographical variation, human......Øjenpatologi, vitreoretinal border region, inner limiting membrane, retina, topographical variation, human...

  16. Berlin: Emergency shelters and contemporary border struggles

    Directory of Open Access Journals (Sweden)

    Žiga Podgornik-Jakil

    2016-06-01

    Full Text Available Researching the developments of present political economy must necessarily include investigating the tools of contemporary border regime. These are used for surveillance and control of populations in order to create new divisions of labour and enable extraction of rent by using peoples’ bodies. The article focuses on emergency shelters in Berlin, that is, on their function and ways in which the asylum seekers accommodated there spontaneously struggle against them. The research was done as a militant and cooperative work of the network Lager Mobilisation Network in Berlin’s district Wedding, which builds connections with people housed in the sports halls in the mentioned district. The author underlines that exhausting the aslyum seekers psychically is one of the strategies for filtering the ‘unwanted’ from the ‘wanted’, that is the ones that are interesting for the labour market. At the same time, the restriction of movement and limited access to civil rights confine asylum seekers in emergency shelters run by private companies, which seek profits on their account. Far from claiming that non-profit companies have a ‘better’ shelter administration, since the boundaries between them and profit-oriented companies are often blurred, the author rather speaks of new forms of anticolonial struggles by the people living inside. He understands these struggles as the struggles against the contemporary border regime in Germany and the EU and as a potential for building an inclusive society.

  17. three intelligence methodologies for border defence and border

    African Journals Online (AJOL)

    Administrator

    Of these there are three intelligence methodologies applicable to this article – trends ..... globalisation associated with open and artificial borders and ever increasing costs of weapon ..... the technological development of mass tourist transport.

  18. Firemen without borders

    CERN Multimedia

    2005-01-01

    Fire knows no borders and neither should the tools for fighting it. It was with this aim in mind that delegates from 14 different countries came to CERN at the beginning of April to take part in the twentieth of a series of twice-yearly international conferences organised by the Federation of European Union Fire Officer Associations (FEU). This latest conference allowed participants to keep abreast of new developments with a view to improving the safety techniques used in their own countries. The first in the series was held in Tampere, Finland, in 1994. The FEU network's objective is to harmonise safety policies and modernise the fire-fighting programme. In particular, it aims to develop an international system for testing hotels' fire alarm systems and to improve language learning in all countries' fire-fighting services. "We want authorities throughout Europe to be aware of the importance of a good joint fire-prevention policy in order to avoid catastrophes such as the fire that destroyed Madrid's Winds...

  19. International cooperation

    International Nuclear Information System (INIS)

    1996-01-01

    In 1995, Nuclear Regulatory Authority of the Slovak Republic (NRA SR) ensured foreign cooperation particularly in the frame of the Slovak Republic is membership in the IAEA, as well as cooperation with the Nuclear Energy Agency of the Organization for Economic Cooperation and Development (OECD NEA), cooperation with European Union in the frame of PHARE programmes, and intergovernmental cooperation and cooperation among nuclear regulatory authorities. With respect to an international importance, prestige and a wide-scope possibilities of a technical assistance , either a direct one (expert assessments, technology supplies, work placement, scientific trips, training courses) or indirect one (participation at various conferences, seminars, technical committees, etc), the most important cooperation with the IAEA in Vienna. In 1994, the Slovak Republic, was elected to the Board Governors, the represent the group of Eastern European countries. The Slovak Government entrusted the NRA SR's Chairman with representing the Slovak Republic in the Board of Governors. Owing to a good name of Slovakia was elected to the one of two Vice-Chairmen of the Board of Governors at the 882-nd session on the Board. IAEA approved and developed 8 national projects for Slovakia in 1995. Generally, IAEA is contracting scientific contracts with research institutes, nuclear power plants and other organizations. Slovak organizations used these contracts as complementary funding of their tasks. In 1995, there were 12 scientific contracts in progress, or approved respectively. Other international activities of the NRA SR, international co-operations as well as foreign affairs are reported

  20. 76 FR 71994 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2011-11-21

    ... recommendations on how to proceed on those topics: Subcommittee: The Global Supply Chain Security Land Border... document for public release.--Report by the Global Supply Chain Security Air Cargo Subcommittee. Status... surveys (IPR Partnership Program Survey and IPR Distribution Chain Management survey). Subcommittee...

  1. 77 FR 68802 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2012-11-16

    ... Strategy for Global Supply Chain Security as it relates to an effort to solicit, consolidate, and provide... of entry to help identify counterfeit products, the distribution chain management and serialization... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...

  2. Feasibility Analysis of Developing Cross-border Network Education in China

    Science.gov (United States)

    Lan, Jun

    In the era of economic globalization, strengthen of international cooperation on network education is a general trend. Although China has not made commitments about the market access and national treatment of cross-border supply in Schedule of Specific Commitments on Services, the basic conditions of network education development in China have been met. The Chinese government should formulate strategies for the development of cross-border network education and take relevant measures to implement them. In the near future, the carrying out of cross-border network education in China will become an irreversible trend, and will possess broad prospect with the advance of globalization of Chinese education.

  3. Local Border Traffic as a Form of Visa Liberalisation and Territorial Development

    Directory of Open Access Journals (Sweden)

    Kretinin G.

    2014-12-01

    Full Text Available This article addresses the issue of visa liberalisation between Russia and the European Union, which constitutes a key aspect of the parties’ diplomatic cooperation. This work sets out to identify the main results of Russia/EU cooperation. The authors have conducted a brief historical analysis of this area of relations. The visa “regionalisation” is considered in the context of identifying the key actors of the EU — Russia negotiations: the Kaliningrad region, Germany, Poland, and Lithuania. In their analysis, the authors rely mostly on primary sources: intergovernmental agreements on simplified border traffic, border-crossing statistics for the Kaliningrad region in the framework of the local border traffic, expert interviews, and related analytic reports. Specifically, local border traffic is viewed as the most effective form of interaction in the field of visa regime simplification and border territory development. An assessment of the positions of key negotiators shows that local border traffic between the Kaliningrad region of Russia and the Polish border voivodeships is a success, which stresses the need for a prompt transition to a visa-free regime with the EU.

  4. Crossing borders via mental bridges

    DEFF Research Database (Denmark)

    Keil, Dirk

    The project studies cross-border regional integration in Europe drawing on the example of the emerging Danish-German Femern Belt Region. It focuses on cross-border networking within public administration as part of regional integra- tion. My central question is how national-cultural differences...... influence coopera- tion, coordination and collaboration in administrative cross-border networks. In this connection the project asks after the perception of regional integration seen from the different national backgrounds. The research concentrates on the group of decision makers within the field of public...... administration, and in specific on the attempt to initiate and promote cross-border regional integration via the building of mental bridges between Danish and German parts of the Femern Belt Region. Here one of the first projects aiming primarily at building mental bridges in the Femern Belt Region...

  5. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on nuclear sciences and applications collaborating centres: Establishing a culture of cooperation

    International Nuclear Information System (INIS)

    2012-01-01

    As a large international organization with a variety of programmes, initiatives and laboratories, one of the mandates of the IAEA is to promote the peaceful use of nuclear techniques worldwide while also collaborating with other institutions in its Member States in order to implement part of its approved activities. In this regard, the IAEA designates selected institutions as official IAEA collaborating centres (IAEA-CCs). Recognizing the need to preserve and transfer nuclear knowledge, the IAEA-CCs are dedicated to furthering the research, development and training in peaceful applications of nuclear science and technology. By working alongside various nuclear related institutions from around the world, the IAEA contributes to reaching important targets laid out by the United Nations Millennium Development Goals. The IAEA-CCs are, in general, scientific institutions such as laboratories, universities, research facilities, etc., that receive public recognition by the IAEA and have been designated to collaborate with the IAEA in a variety of fields, such as food safety, environmental protection, water resources and human health. In line with the objectives of the IAEA, IAEA-CCs are expected to further the research, development and training in the peaceful applications of nuclear science and technology. Through these research and academic institutions, Member States can assist the IAEA with their own original research, development and training in nuclear technologies. As a cooperative mechanism, the IAEA-CC is also efficient, as it encourages centres to share resources, knowledge and expertise. One of the goals of the IAEA-CC is also to help developing Member States expand their capabilities in these areas and thus improve the quality of life of their citizens. So far, the IAEA-CC has led to socioeconomic benefits in many parts of the world, from Asia to Latin America.

  6. Secure and interoperable communication infrastructures for PPDR organisations

    Science.gov (United States)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  7. Liouville gravity on bordered surfaces

    International Nuclear Information System (INIS)

    Jaskolski, Z.

    1991-11-01

    The functional quantization of the Liouville gravity on bordered surfaces in the conformal gauge is developed. It was shown that the geometrical interpretation of the Polyakov path integral as a sum over bordered surfaces uniquely determines the boundary conditions for the fields involved. The gravitational scaling dimensions of boundary and bulk operators and the critical exponents are derived. In particular, the boundary Hausdorff dimension is calculated. (author). 21 refs

  8. Public health and terrorism preparedness: cross-border issues.

    Science.gov (United States)

    Olson, Debra; Leitheiser, Aggie; Atchison, Christopher; Larson, Susan; Homzik, Cassandra

    2005-01-01

    On December 15, 2003, the Centers for Public Health Preparedness at the University of Minnesota and the University of Iowa convened the "Public Health and Terrorism Preparedness: Cross-Border Issues Roundtable." The purpose of the roundtable was to gather public health professionals and government agency representatives at the state, provincial, and local levels to identify unmet cross-border emergency preparedness and response needs and develop strategies for addressing these needs. Representatives from six state and local public health departments and three provincial governments were invited to identify cross-border needs and issues using a nominal group process. The result of the roundtable was identification of the needs considered most important and most doable across all the focus groups. The need to collaborate on and exchange plans and protocols among agencies was identified as most important and most doable across all groups. Development of contact protocols and creation and maintenance of a contact database was also considered important and doable for a majority of groups. Other needs ranked important across the majority of groups included specific isolation and quarantine protocols for multi-state responses; a system for rapid and secure exchange of information; specific protocols for sharing human resources across borders, including emergency credentials for physicians and health care workers; and a specific protocol to coordinate Strategic National Stockpile mechanisms across border communities.

  9. Physicists without borders

    Science.gov (United States)

    Jeandron, Michelle

    2008-06-01

    The International Atomic Energy Agency (IAEA), which has its headquarters in Vienna, Austria, is a specialized agency of the United Nations (UN) that seeks to promote the safe, secure and peaceful use of nuclear technology. It has three main areas of expertise. It is the world's nuclear inspectorate, sending inspectors to more than 140 UN member states, from Brazil to Japan, to verify that nuclear technology is not being used for military purposes. The IAEA also helps countries to improve their nuclear safety procedures and to prepare for emergencies. Finally, it serves as a focal point for the world's development of nuclear science and technology across all fields.

  10. The Malian Crisis and the Challenge of Regional Cooperation

    Directory of Open Access Journals (Sweden)

    Wolfram Lacher

    2013-06-01

    Full Text Available The weakness of regional security cooperation has been a key factor in the gradual destabilization of the Sahel-Sahara region over the past decade. While organized crime, extremist activity, and cross-border movements of arms and fighters have strengthened linkages among non-state actors in the region, state policies have failed to keep up. With the escalation of the crisis in Mali, West African states have adopted an approach diverging strongly from that of Mali’s North African neighbours. Western governments’ tendency to understand insecurity in the region through the notion of the Sahel has compounded the problem. Insecurity in the region, including criminal and extremist networks, is more Saharan than Sahelian in scope. North African states are part of the problem, and need to be part of the solution. A new framework for regional cooperation is needed – and while this can only be established on the initiative of regional states themselves, external actors need to adapt their policies to help such a framework emerge.

  11. Dream vs. reality: seven case-studies on the desirability and feasibility of cross-border hospital collaboration in Europe.

    Science.gov (United States)

    Glinos, Irene A; Baeten, Rita

    2014-09-01

    Despite being a niche phenomenon, cross-border health care collaboration receives a lot of attention in the EU and figures visibly on the policy agenda, in particular since the policy process which eventually led to the adoption of Directive 2011/24/EU. One of the underlying assumptions is that cross-border collaboration is desirable, providing justification to both the European Commission and to border-region stakeholders for promoting it. The purpose of this paper is to question this assumption and to examine the role of actors in pushing (or not) for cross-border collaboration. The analysis takes place in two parts. First, the EU policies to promote cross-border collaboration and the tools employed are examined, namely (a) use of European funds to sponsor concrete border-region collaboration projects, (b) use of European funds to sponsor research which gives visibility to cross-border collaboration, and (c) use of the European Commission's newly acquired legal mandate to encourage "Member States to cooperate in cross-border health care provision in border-regions" (Art. 10) and support "Member States in the development of European reference networks between health care providers and centres of expertise" (Art. 12). Second, evidence gathered in 2011-2013 from seven European border-regions on hospital cross-border collaboration is systematically reviewed to assess the reality of cross-border collaboration - can it work and when, and why do actors engage in cross-border collaboration? The preliminary findings suggest that while the EU plays a prominent role in some border-region initiatives, cross-border collaboration needs such a specific set of circumstances to work that it is questionable whether it can effectively be promoted. Moreover, local actors make use of the EU (as a source of funding, legislation or legitimisation) to serve their needs. Copyright © 2014. Published by Elsevier Ltd.

  12. The impacts of the opening of the border bettveen Czechia and Germany

    Directory of Open Access Journals (Sweden)

    Joerg Maier

    1993-12-01

    Full Text Available The article discussed changes in the structure und quantity of transborder flows belween Czechia and Bavaria since the lifiing of the “Iron Curtain “ in 1989. In 1989 2.3 million passangers crossed the border, in 1992 over 35 million people have crossed it. In addition to tourist visits (shoping andsightseeing business travel has a steep incline. Cooperations among factories close to the border take place. An even more intensified cooperation is hiudered by the fact that theneighbouring countries are unawere of the language and culture of each other.

  13. United Nations - African Union Cooperation In Conflict Prevention, Peacekeeping and Peacebuildin

    Directory of Open Access Journals (Sweden)

    Liliya Igorevna Romadan

    2015-01-01

    Full Text Available The article addresses the cooperation between the United Nations and regional organizations, in particular the African Union in the sphere of security and settlement of conflicts. Over the last decade the role of the AU and sub regional organizations has dramatically increased. Through its agencies of ensuring peace and security the African Union is making significant contribution to strengthening stability and promotion of democracy and human rights in Africa. In the beginning of the article authors make a review of the level of security on the African continent and stress the sharpest conflict zones. According to researches one of the most turbulent regions on continent in terms of security is the North-East Africa. Continuing quarter-century war in Somalia, conflict relations between Somalia and Ethiopia, the border crises between Ethiopia and Eritrea, which in the late 20th century turned into the war between the two countries, finally, the number of armed clashes in Sudan attracted the special attention to the region of the entire world community. Authors pay the main attention to the cooperation between the United Nations and the African Union in the sphere of settling regional conflicts and holding peacekeeping operations. In the article the main mechanisms and methods that are used by the United Nations and the African Union to hold peacekeeping operations are analyzed in details. The situation in Somalia and efforts of the United Nations and the African Union that are making towards stabilization in this country are also studied. Authors reveal the basic elements and make a review of the mixed multicomponent peacekeeping operation of the United Nations and the African Union in Sudan. In the conclusion authors stress the measures that could strengthen the strategic cooperation between the United Nations and the African union. According to the authors the most important task is to solve problems of financing joint peacekeeping operations

  14. Multi-TSO cross border balancing mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Llorens, Maria Luisa; Moreno, Laura; Fuente, Jose Ignacio de la; Junco, Paula; Arenillas, Jorge [Red Electrica de Espana (REE) S.A.U., Madrid (Spain). Operation Markets Dept.; Pereira, Pedro [REN - Servicos, S.A., Lisbon (Portugal). Gabinete Mercado e Liquidacoes; Chabanne, Colas [RTE Reseau de Transport d' Electricite, Paris (France). Markets Dept.; Apoyan, Lalake; Barbieri, Galileo [RTE Reseau de Transport d' Electricite, Paris (France). Cross-Border Market Design

    2012-07-01

    The balancing market integration has been highlighted as a necessary step to reach the European Union goal for the development of an effective, competitive single market for electricity across Europe. In this paper it is described the work done by RTE, REE and REN regarding the design of a non-discriminatory, efficient and reliable multi-TSO Cross Border Balancing Mechanism at regional level, extendible to other control areas. The implementation of this multi-TSO Cross Border Balancing Mechanism will aim at increasing the operational security, enhancing the Liquidity and Competition of balancing markets, facilitating the integration of energy produced by Renewable Energy Sources while optimizing the use of Interconnection capacities. With this mechanism, the three TSOs will be able to exchange to each other balancing energy through the available interconnection capacities after the last intraday market sessions. This mechanism will be based on a common IT platform where TSOs will share their available surplus of reserves and communicate their balancing needs. The available interconnection capacities will be taken into account in an automatic and centralized way. Two main options are investigated regarding the allocation method: on the one hand, the first come first served approach (FCFS), on the other hand, the ''social welfare'' optimization approach. (orig.)

  15. Successful international cooperation : The influence of cultural similarity, strategic differences, and international experience

    NARCIS (Netherlands)

    van Oudenhoven, JP; van der Zee, KI

    2002-01-01

    Cooperation between companies increasingly exceeds national borders. In the present study 78 international cooperation cases were examined. It was shown that similarity in national and corporate culture is associated with successful cooperation. On the other hand, with respect to corporate strategy,

  16. Radiation safety without borders initiative

    International Nuclear Information System (INIS)

    Dibblee, Martha; Dickson, Howard; Krieger, Ken; Lopez, Jose; Waite, David; Weaver, Ken

    2008-01-01

    The Radiation Safety Without Borders (RSWB) initiative provides peer support to radiation safety professionals in developing countries, which bolsters the country's infrastructure and may lead the way for IRPA Associate membership. The Health Physics Society (HPS) recognizes that many nations do not possess the infrastructure to adequately control and beneficially use ionizing radiation. In a substantial number of countries, organized radiation protection programs are minimal. The RSWB initiative relies on HPS volunteers to assist their counterparts in developing countries with emerging health physics and radiation safety programs, but whose resources are limited, to provide tools that promote and support infrastructure and help these professionals help themselves. RSWB experience to date has shown that by providing refurbished instruments, promoting visits to a HPS venue, or visiting a country just to look provide valuable technical and social infrastructure experiences often missing in the developing nation's cadre of radiation safety professionals. HPS/RSWB with the assistance of the International Atomic Energy Agency (IAEA) pairs chapters with a country, with the expectation that the country's professional radiation safety personnel will form a foreign HPS chapter, and the country eventually will become an IRPA Associate. Although still in its formative stage, RSWB nonetheless has gotten valuable information in spite of the small number of missions. The RSWB initiative continues to have significant beneficial impacts, including: Improving the radiation safety infrastructure of the countries that participate; Assisting those countries without professional radiation safety societies to form one; Strengthening the humanitarian efforts of the United States; Enhancing Homeland Security efforts through improved control of radioactive material internationally. Developing countries, including those in Latin America, underwritten by IAEA, may take advantage of resources

  17. The Uzbekistan Kyrgyzstan Border: Institutional Legitimacy and Regional Stability

    Science.gov (United States)

    2017-06-01

    and Lenzi Sherfedinov, “Land, Water, and Ecology ,” in Ferghana Valley, edited by Starr, 255. 18 challenges face this region, including terrorism...see Robert Nisbet, The Quest for Community: A Study in the Ethics of Order and Freedom (Wilmington, DE: ISI Books, 2010), originally published by... ecological problems.”377 These security challenges are not only interrelated but also dependent on the condition of state borders. As Karimov

  18. Cross-border temporary agency work : Social sustainability of a business model (too often) based on regulatory arbitrage

    NARCIS (Netherlands)

    Houwerzijl, Mijke; Rombouts, Bas

    Presentation held at the European Regional Congress of the International Society for Labour and Social Security Law (ISLSSL) on Temporary Agency Work in the context of cross-border movement & service provision within the EU.

  19. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    Science.gov (United States)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  20. Type and extent of trans-disciplinary co-operation to improve food security, health and household environment in low and middle income countries: systematic review

    Directory of Open Access Journals (Sweden)

    Santosh Gaihre

    2016-10-01

    Full Text Available Abstract Background Although linkages have been found between agricultural interventions and nutritional health, and the development of clean fuels and improved solid fuel stoves in reducing household air pollution and adverse health effects, the extent of the potential of combined household interventions to improve health, nutrition and the environment has not been investigated. A systematic review was conducted to identify the extent and type of community-based agricultural and household interventions aimed at improving food security, health and the household environment in low and middle income countries. Methods A systematic search of Ovid MEDLINE, PUBMED, EMBASE and SCOPUS databases was performed. Key search words were generated reflecting the “participants, interventions, comparators, outcomes and study design” approach and a comprehensive search strategy was developed following “Preferred Reporting Items for Systematic Reviews and Meta-Analyses” recommendations. Any community-based agricultural and/or household interventions were eligible for inclusion if the focus was to improve at least one of the outcome measures of interest. All relevant study designs employing any of these interventions (alone/in combination were included if conducted in Low and middle income countries. Review articles, and clinical and occupational studies were excluded. Results A total of 123 studies were included and grouped into four intervention domains; agricultural (n = 27, air quality (n = 34, water quality (n = 32, and nutritional (n = 30. Most studies were conducted in Asia (39.2 % or Africa (34.6 % with the remaining 26.1 % in Latin America. Very few studies (n = 11 combined interventions across more than one domain. The majority of agricultural and nutritional studies were conducted in Africa and Asia, whereas the majority of interventions to improve household air quality were conducted in Latin America. Conclusions It is

  1. Avocados Crossing Borders

    DEFF Research Database (Denmark)

    Jensen, Thomas; Vatrapu, Ravi; Bjørn-Andersen, Niels

    2018-01-01

    This paper investigates the case of shipments of containers with avocados from farmers in Africa to grocery store shelves in the European Union. We find 3 predominant challenges to containerized shipping that effectively become trade barriers: international trade cost, lead time uncertainty......, and security risks. We use activity theory to describe, understand, and analyze the shipping activity in the international trade ecosystem with focus on physical objects and their related information. We find that the shipment becomes problematic and can be characterized as a runaway object...... in the heterogeneous and multiple organizational setting of international trade. Our analysis of shipping reveals (1) inefficient collaboration across loosely coupled activity systems and (2) fragmented information infrastructures. We propose the solution of Shipping Information Pipeline, a shared information...

  2. [Open Borders for Alpine Pastures: The History of the Pacage Franco- Suisse].

    Science.gov (United States)

    Schluep, J

    2017-01-01

    Alpine transhumance and summer grazing of animals on both sides of the French-Swiss border has a long tradition. The Bernese authorities first regulated the movement of animals across the French border in the 18th century due to outbreaks of epidemics. At that time the importation of cattle from the "Franche-Comté" was forbidden, but grazing on the French side of the border remained allowed. The 1912 agreement, relating to grazing on both sides of the border, was used for decades as a guideline to ensure the open communication and close cooperation of the veterinary and customs authorities of both countries with regard to border traffic. During World War I the movement across the border was temporarily stopped, whereas it remained open during World War II. During the last two decades of the 20th century problems have arisen due to IBR/ IPV from the Swiss, and BSE from the French point of view. In 1996, France annulled the 1912 agreement without any negative impact on the movement of animals across the border. As of 1999, the EU communitarian veterinary regulations apply, and veterinary border inspections have been abolished.

  3. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2012-04-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.  JEL Codes: G21, G28, G10Keywords: Bank, Banking, Financial Institution, Financial Market, Securities

  4. Conference on the security of electricity supply: France-Germany crossed views

    International Nuclear Information System (INIS)

    Caron, Antoine; Kaelble, Laure; Maurer, Christoph; Veyrenc, Thomas; Roques, Fabien; Jacquemart, Yannick; John, Oliver

    2015-01-01

    The French-German office for Renewable energies (OFAEnR), in cooperation with the French transmission system operator - RTE, organised a conference on security of electricity supply in France and in Germany. In the framework of this French-German exchange of experience, about 160 participants exchanged their views on the following topics: the regulatory framework and the legal instruments for ensuring the security of supply, the role of energy transmission system operators, the role of renewable energies in the electricity market and their impact on the security of supplies. This document brings together the available presentations (slides) made during this event: 1 - Security of supply and electricity markets (Antoine Caron); 2 - White Paper on electricity Market Design (Laure Kaelble); 3 - Security of Supply - Concept and Definition: On the Way to a Common Understanding? (Christoph Maurer); 4 - The French capacity market: lessons learnt and way forward (Thomas Veyrenc); 5 - electricity market evolutions: divergencies and compatibilities between French and German models? (Fabien Roques); 6 - Infrastructures and European coordination: action of the French transmission system operator - RTE (Yannick Jacquemart); 7 - Interconnection and Security of Supply - experiences of the German TSO Amprion at the French-German Border (Oliver John)

  5. Improving customs’ border control by creating a reference database of cargo inspection X-ray images

    OpenAIRE

    Selina Kolokytha; Alexander Flisch; Thomas Lüthi; Mathieu Plamondon; Adrian Schwaninger; Wicher Vasser; Diana Hardmeier; Marius Costin; Caroline Vienne; Frank Sukowski; Ulf Hassler; Irène Dorion; Najib Gadi; Serge Maitrejean; Abraham Marciano

    2017-01-01

    Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and the trend towards 100% screening. It is therefore a goal to advance inspection methods to enable successf...

  6. In Defense of the Southern Borders of Russia and Allied Countries (the Russian Foreign Military Bases on the Black Sea-Caspian Arc of Tension

    Directory of Open Access Journals (Sweden)

    Vladimir I. Afanasenko

    2016-12-01

    Full Text Available December 25, 2014, President Vladimir Putin approved a new version of the military doctrine of the Russian Federation, which reflects manifested threat to Russia and its allies because the situation in Ukraine, especially in its south-east, in the Donets Basin; the events in Syria, Iraq, and Afghanistan; issues of interaction and cooperation with Abkhazia, South Ossetia, with the CSTO member countries, the BRICS. An important role in the strengthening of the southern borders of the security operate military bases and facilities of the Ministry of Defense of the Russian Federation, located in Transnistria, the Caucasus, Syria and Central Asia. Characteristics of these bases and their value in the Black Sea-Caspian arc of tension given in this article.

  7. Managing State Border in the Context of Migration Crisis in Europe: Lithuanian Case

    Directory of Open Access Journals (Sweden)

    Aurelija Pūraitė

    2017-09-01

    Full Text Available The aim of this paper has been the achievement of the level of scientific knowledge on the subject of research in terms of establishment and analysis of economic effectiveness of state border governance in Lithuania in the context of increasing migration in European Union. The objective also has been to suggest the possible measures for improvement of state border management bearing in mind the migration perspectives. There is an unexpressed demand on migration (especially immigration as an economic and social phenomenon to have some positive impact on the economy of target country. It’s nevertheless true, that from political point of view the migration trends are usually being associated with the economic, social, security challenges in target countries. European Union countries which are the external borders of EU face with even more specific obstacles – the effective management of borders and necessity to bare costs of controlling migration flows. Therefore the effective use of economic and financial measures managing state borders is of the utmost importance reaching common goals of public security, stability, respect for European values and rule of law. The paper contains results of the analysis of international, regional and national legal acts and the secondary analysis of statistical data of European Union agencies and international organizations. The financial data of operational activities of Lithuanian State Border Guard Service is analysed, aiming to reveal the correlation between the effective management of state border control and financial support of the state and EU institutions.

  8. International Military Cooperation: From Concepts to Constructs

    Science.gov (United States)

    D'Orazio, Vito

    2013-01-01

    International cooperation on issues of security is a central concept in many theoretical debates in international relations. This dissertation is an attempt to lay the foundation for measuring military cooperation and understanding the forces brought forth through its expansion. The central notion is that the set of policies related to military…

  9. 33 CFR 117.925 - Cooper River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Cooper River. 117.925 Section 117.925 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements South Carolina § 117.925 Cooper River. The draw of the Seaboard...

  10. 33 CFR 117.713 - Cooper River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Cooper River. 117.713 Section 117.713 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements New Jersey § 117.713 Cooper River. (a) The drawspans for the...

  11. Cross-border teleradiology-Experience from two international teleradiology projects

    International Nuclear Information System (INIS)

    Ross, Peeter; Sepper, Ruth; Pohjonen, Hanna

    2010-01-01

    Teleradiology aims to even radiologists' workload, ensure on-call services, reduce waiting lists, consult other specialists and cut costs. Cross-border teleradiology widens this scope beyond the country borders. However, the new service should not reduce the quality of radiology. Quality and trust are key factors in establishment of teleradiology. Additionally there are organizational, technical, legal, security and linguistic issues influencing the service. Herein, we have used experiences from two partially European Union funded telemedicine projects to evaluate factors affecting cross-border teleradiology. Clinical partners from Czech Republic, Denmark, Estonia, Finland, Lithuania and the Netherlands went through 649 radiology test cases in two different teleradiology projects to build trust and agree about the report structure. Technical set-up was established using secure Internet data transfer, streaming technology, integration of workflows and creating structured reporting tool to overcome language barriers. The biggest barrier to overcome in cross-border teleradiology was the language issue. Establishment of the service was technically and semantically successful but limited to knee and hip X-ray examinations only because the structured reporting tool did not cover any other anatomical regions yet. Special attention has to be paid to clinical quality and trust between partners in cross-border teleradiology. Our experience shows that it is achievable. Legal, security and financial aspects are not covered in this paper because today they differ country by country. There is however an European Union level harmonization process started to enable cross-border eHealth in general.

  12. Cross-border teleradiology-Experience from two international teleradiology projects

    Energy Technology Data Exchange (ETDEWEB)

    Ross, Peeter [Institute of Clinical Medicine, Tallinn University of Technology, East Tallinn Central Hospital, Paernu mnt 104, 11312 Tallinn (Estonia)], E-mail: Peeter.Ross@itk.ee; Sepper, Ruth [Institute of Clinical Medicine, Tallinn University of Technology, Akadeemia tee 15, 12618 Tallinn (Estonia)], E-mail: Ruth.Sepper@gmail.com; Pohjonen, Hanna [Institute of Clinical Medicine, Tallinn University of Technology, Akadeemia tee 15, 12618 Tallinn (Estonia)], E-mail: Hanna.Pohjonen@rosalieco.fi

    2010-01-15

    Teleradiology aims to even radiologists' workload, ensure on-call services, reduce waiting lists, consult other specialists and cut costs. Cross-border teleradiology widens this scope beyond the country borders. However, the new service should not reduce the quality of radiology. Quality and trust are key factors in establishment of teleradiology. Additionally there are organizational, technical, legal, security and linguistic issues influencing the service. Herein, we have used experiences from two partially European Union funded telemedicine projects to evaluate factors affecting cross-border teleradiology. Clinical partners from Czech Republic, Denmark, Estonia, Finland, Lithuania and the Netherlands went through 649 radiology test cases in two different teleradiology projects to build trust and agree about the report structure. Technical set-up was established using secure Internet data transfer, streaming technology, integration of workflows and creating structured reporting tool to overcome language barriers. The biggest barrier to overcome in cross-border teleradiology was the language issue. Establishment of the service was technically and semantically successful but limited to knee and hip X-ray examinations only because the structured reporting tool did not cover any other anatomical regions yet. Special attention has to be paid to clinical quality and trust between partners in cross-border teleradiology. Our experience shows that it is achievable. Legal, security and financial aspects are not covered in this paper because today they differ country by country. There is however an European Union level harmonization process started to enable cross-border eHealth in general.

  13. Azerbaijan-Russia Borderline Security

    Directory of Open Access Journals (Sweden)

    Ekaterina V. Arkhipova

    2017-03-01

    Full Text Available The Azerbaijan-Russia borderline mainly goes by the Caucasian mountain range and close to the Samur riverbed. Main border posts are situated close to the Caspian seashore while the locals living in the Upper Dagestan area have difficulties with crossing borderline. The locals are represented by the so called “divided peoples” whose living area was divided with the state border after 1991. The former inner borders ignored ethnic areas but now they became the lines crossing the ethnic groups of Legins, Avars, Tzakhurs and Rutuls. Certainly, those peoples are interested in specific rules for crossing the border. At the same time, their areas have not got the equipped border offices and they have to spend a lot of time and money for travelling to the neighboring districts via Baku or Vladikavkaz. Such problems arouse the radical demands among locals. The Lezgin movement for an independent Lezgistan is the most famous among them. Its supporters were involved in a terrorist attack in Baku in 1990-s and now they collect files about any problems connected with border issues, including the results of a demarcation process. They attract attention to the facts of all assignments made by Russian representatives. The activity of other ethnic groups was comparatively lower and they could make an agreement with local authorities about division of powers. Obviously, any solution about development of the border infrastructure may stabilize the separatism activity in the area. The author determines the key challenges and threats to cross-border security at Azerbaijan-Russia borderline on the basis of analysis of Federal and regional media, declarations made by representatives of the local and borderline authorities, as well as online activities of national movements. The author reveals the infrastructure factors of ensuring cross-border activity, social and economic conditions of borderline districts development. The suggestion is made on the need to develop

  14. Border detection in complex networks

    International Nuclear Information System (INIS)

    Travencolo, Bruno A N; Viana, Matheus Palhares; Costa, Luciano da Fontoura

    2009-01-01

    One important issue implied by the finite nature of real-world networks regards the identification of their more external (border) and internal nodes. The present work proposes a formal and objective definition of these properties, founded on the recently introduced concept of node diversity. It is shown that this feature does not exhibit any relevant correlation with several well-established complex networks measurements. A methodology for the identification of the borders of complex networks is described and illustrated with respect to theoretical (geographical and knitted networks) as well as real-world networks (urban and word association networks), yielding interesting results and insights in both cases.

  15. The 'border within': inhabiting the border in Trieste

    NARCIS (Netherlands)

    Bialasiewicz, L.; Minca, C.

    2010-01-01

    In this paper we look to the Italian border city of Trieste-at various points in its past, a cosmopolitan port, Austria's urbs europeissima, but also a battleground for competing understandings of territoriality, identity, and belonging and a paragon of the violent application of an ethnoterritorial

  16. Economic integration and cross-border economic organizations: The case of San Diego-Tijuana

    Directory of Open Access Journals (Sweden)

    Jorge Eduardo Mendoza Cota

    2017-01-01

    Full Text Available The economic integration between the United States and Mexico has affected the economic, political and social relations in the border region. The paper seeks to relate the increasing economic integration and business cycles of the economies of San Diego and Tijuana to the development of both national and binational economic organizations in the border region. The methodology of analysis uses both statistical estimations of the economic integration of San Diego and Tijuana and semi-structured interviews of economic organizations to analyze the increasing economic integration and the role and achievements of the cross-border economic organizations. The results showed that cross-border cooperation is predominately controlled by federal and state governments on both sides of the border. However, the main achievements of cross-border economic cooperation have been accomplished by local private organizations. The perspective of further local economic development greatly depends on both the possibility of increased involvement of federal governments and the growing encouragement of regional organizations.

  17. CROSS-BORDER COLLABORATION IN ENTREPRENEURIAL EDUCATION IN UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Mihaela DIACONU

    2016-06-01

    Full Text Available The entrepreneurship, as an integral part of education, is now widely accepted worldwide. Entrepreneurial education is considered today as a holistic and inclusive process and not just a component of education in business. The activity of developing the entrepreneurial spirit organized on new principles must be seen by the universities as the foundation of successful fulfillment of university’s mission in contributing to social and economic development. This paper's main purpose is to identify a number of solutions on how they can ensure through cross-border cooperation the development of entrepreneurial skills within the universities through learning experiences contexts. In this regard, the paper proposes a model of entrepreneurial project which takes the form of simulated enterprise developed by the University of Pitesti, and a number of solutions for this project to be developed and implemented through cross-border cooperation, in accordance with the strategies and principles promoted by European Commission and European Parliament, which stresses the importance of developing through international cooperation of innovative methods that go beyond the traditional frame in which, currently, are formed the competencies and the educational process is performed. Thus, the proposed model can be expanded and implemented "in the mirror" and internationally by building partnerships between countries, universities and economic agents from those countries with real benefits for all parties involved through valuing the national specificities.

  18. When the border talks: Singularities of the Argentine-Chilean relationship in recent decades

    Directory of Open Access Journals (Sweden)

    Miryam Colacrai

    2016-07-01

    Full Text Available The paper deals with bilateral relations between Argentina and Chile in recent decades, highlighting the potential of their new border relations. It assumes that the wide range of governmental actors, subnational and local entities linking each other have given this a unique dynamic border and are considered spaces of cooperation. The article is descriptive-reflective and is organized around a series of questions about the continued search for Argentine-Chilean border integration since the nineties and the construction of top-down and bottom-up institutional agreements. Within the variety of links, some remarkable examples are selected for the article like the "Integration Committees", the settlement of the Central West of South America Integration Zone (Zicosur and the Argentine-Chilean cooperation in Antarctica. It stresses the integrationist Maipú Treaty (2009 and institutions that charge different instances of bilateral dialogue.

  19. National wildlife refuge management on the United States/Mexico border

    Science.gov (United States)

    William R. Radke

    2013-01-01

    Many conservation strategies have been developed by the U.S. Fish and Wildlife Service in cooperation with others to protect habitat and enhance the recovery of fish and wildlife populations in the San Bernardino Valley, which straddles Arizona, United States, and Sonora, Mexico. Habitats along this international border have been impacted by illegal activities,...

  20. Fronteras 1976. San Diego/Tijuana--The International Border in Community Relations: Gateway or Barrier?

    Science.gov (United States)

    Skagen, Kiki, Ed.

    Nine papers comprise the proceedings from the conference on cultural interdependence between the border regions of San Diego, California, and Tijuana, Mexico. The papers discuss the following: (1) insurgence of the Southwest's Spanish-speaking minority since 1960; (2) opportunities for cooperation between the United States and Mexican governments;…

  1. Breaking the deadlock: lessons from cross-border spatial projects in Flanders and the Netherlands

    NARCIS (Netherlands)

    de Vries, J.

    2008-01-01

    This paper explores the specific characteristics of decision-making in cross-border spatial projects and draws some lessons for European territorial cooperation. This is done by examining three major infrastructure projects between the Netherlands and Flanders: the construction of a high-speed rail

  2. Trans-American Security: What's Missing? Strategic Forum, Number 228, September 2007

    National Research Council Canada - National Science Library

    Einaudi, Luigi R

    2007-01-01

    .... While traditional national security concerns have diminished, new issues are coming to the fore. Criminal gangs operating in urban areas throughout the hemisphere threaten security and engage in transnational criminal activities across borders...

  3. Beyond Kargil: The technology of peace in India-Pakistan border relations

    International Nuclear Information System (INIS)

    Tahir-Kheli, S.; Biringer, K.L.

    2000-01-01

    The potential for cooperation between India and Pakistan is substantial. Topics as widely varying as national security, the environment and trade hold the potential for improved bilateral relations. This paper looks at a few areas in which monitoring technology could contribute to enhancing cooperative border agreements between the two nations. The goal of the paper is not to provide prescriptive solutions to regional problems, but to expand the number of options being considered for improving Indian-Pakistan relations. Many of the impediments to bilateral progress are a result of a history of conflict and mistrust. By utilizing technical monitoring and inspections, each side can begin to replace suspicion and doubt with knowledge and information useful in making informed political, economic and military decisions. At the same time, technical monitoring and inspections can build confidence through common interactions. India and Pakistan have pledged to resolve their disputes, including Kashmir, through dialogue. Implementation of that pledge is influenced by a number of factors, including changes in the political systems and the fortunes of the leadership. Events of the past year and a half have severely tested these two governments' ability to move forward along a constructive and positive path. Testing of new missile systems both preceded and followed testing of nuclear weapons in May 1998. Both countries disregarded subsequent international displeasure as they proceeded to openly declare their respective nuclear capability. Their brief engagement with each other in February 1999 and movement toward a rapprochement diluted international condemnation of their nuclear activity. Within a recent period of nine months however, progress in the dialogue has been stalled first by the Pakistani move in Kashmir in May 1999, then by the Indian election in the summer of 1999 and most recently by the military coup in Pakistan

  4. Beyond Kargil: The technology of peace in India-Pakistan border relations

    Energy Technology Data Exchange (ETDEWEB)

    Tahir-Kheli, S.; Biringer, K.L.

    2000-01-12

    The potential for cooperation between India and Pakistan is substantial. Topics as widely varying as national security, the environment and trade hold the potential for improved bilateral relations. This paper looks at a few areas in which monitoring technology could contribute to enhancing cooperative border agreements between the two nations. The goal of the paper is not to provide prescriptive solutions to regional problems, but to expand the number of options being considered for improving Indian-Pakistan relations. Many of the impediments to bilateral progress are a result of a history of conflict and mistrust. By utilizing technical monitoring and inspections, each side can begin to replace suspicion and doubt with knowledge and information useful in making informed political, economic and military decisions. At the same time, technical monitoring and inspections can build confidence through common interactions. India and Pakistan have pledged to resolve their disputes, including Kashmir, through dialogue. Implementation of that pledge is influenced by a number of factors, including changes in the political systems and the fortunes of the leadership. Events of the past year and a half have severely tested these two governments' ability to move forward along a constructive and positive path. Testing of new missile systems both preceded and followed testing of nuclear weapons in May 1998. Both countries disregarded subsequent international displeasure as they proceeded to openly declare their respective nuclear capability. Their brief engagement with each other in February 1999 and movement toward a rapprochement diluted international condemnation of their nuclear activity. Within a recent period of nine months however, progress in the dialogue has been stalled first by the Pakistani move in Kashmir in May 1999, then by the Indian election in the summer of 1999 and most recently by the military coup in Pakistan.

  5. [Malaria in the triple border region between Brazil, Colombia and Peru].

    Science.gov (United States)

    Peiter, Paulo César; Franco, Vivian da Cruz; Gracie, Renata; Xavier, Diego Ricardo; Suárez-Mutis, Martha Cecilia

    2013-12-01

    This article aims to analyze the malaria surveillance situation on the triple border between Brazil, Colombia, and Peru. This was a qualitative study using questionnaires in the border towns in 2011. The results were analyzed with the SWOT matrix methodology, pointing to significant differences between the malaria surveillance systems along the border. Weaknesses included lack of linkage between actors, lack of trained personnel, high turnover in teams, and lack of malaria specialists in the local hospitals. The study also showed lack of knowledge on malaria and its prevention in the local population. The strengths are the inclusion of new institutional actors, improvement of professional training, distribution of insecticide-treated bed nets, and possibilities for complementary action between surveillance systems through cooperation between health teams on the border. Malaria control can only be successful if the region is dealt with as a whole.

  6. Interorganizational Cooperation

    Science.gov (United States)

    2016-10-12

    Administrative Services Officer , Office of Congressional and Intergovernmental Affairs, Office of the Chief Financial Officer , Office of the Chief ...Nations. • Clarifies the role of the United States Agency for International Development (USAID) Office of Transition Initiatives and its relationship...Centralize interorganizational cooperation within the command group. Under this model, the chief of staff or a special staff officer within the command

  7. Border Crossing/Entry Data - Boarder Crossing

    Data.gov (United States)

    Department of Transportation — Border Crossing/Entry Data provides summary statistics for incoming crossings at the U.S.-Canadian and the U.S.-Mexican border at the port level. Data are available...

  8. Structure of the animal vitreoretinal border region

    DEFF Research Database (Denmark)

    Heegaard, Steffen

    1994-01-01

    Øjenpatologi, vitreoretinal border region, inner limiting membrane of the retina, animals, ultrastructure, comparative anatomy......Øjenpatologi, vitreoretinal border region, inner limiting membrane of the retina, animals, ultrastructure, comparative anatomy...

  9. Developing a simulation for border safeguarding

    CSIR Research Space (South Africa)

    Van Rooyen, S

    2011-09-01

    Full Text Available Border safeguarding is the defence of territorial integrity and sovereignty, and this is a joint responsibility of the military and the police. Military doctrine for conventional warfare is not sufficient for Border Safeguarding operations due...

  10. 19 CFR 122.181 - Definition of Customs security area.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  11. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  12. Trans-European transport network and cross-border governance

    DEFF Research Database (Denmark)

    Guasco, Clement Nicolas

    2014-01-01

    for coordinating knowledge, efforts and solutions across several national systems. In order to understand this governance setting, one needs to understand the specific quality of transnational governance in the EU, which is neither purely international nor federally integrated. The transport corridor between Malmö......This article looks at the implementation of trans-European transport corridors in the EU and the influence it has on governance within EU member-states. It considers the implementation of such a scheme in the context of cross-border cooperation and discusses the system of governance necessary...

  13. Introduction: Borders in Translation and Intercultural Communication

    Directory of Open Access Journals (Sweden)

    Jonathan Evans

    2017-09-01

    Full Text Available The introduction to this special issue discusses the notion of border and its position in current scholarship in translation studies and intercultural communication. It then analyses ways in which borders can be useful for thinking, focusing particularly on Walter Mignolo’s notion of “border thinking”. It reviews how borders are viewed in both translation studies and intercultural communication and offers some possible directions for future research before introducing the papers in this special issue.

  14. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  15. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-12-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  16. North American Security Cooperation: Prospects for Growth

    National Research Council Canada - National Science Library

    Heredia, Mark L

    2006-01-01

    ...? Bureaucratic inertia and bureaucratic politics are known to hinder change specifically in an organization's standard operating procedures and fear of other organizations infringing upon another's jurisdiction...

  17. Regional Military Security Cooperation in North America

    Science.gov (United States)

    2009-12-11

    North America, Europe, Russia, Japan, South Korea, China, India , Australia, New Zealand, South Africa, Argentina, Brazil, and Chile.24 The Non...Sea.47 Additionally, he sees competition and conflict over water arising in the river basins of the Nile, Jordon, Tigris, and Euphrates rivers . This... interlinks with oil competition, as it is the same geographic region.48 Finally, he views Africa as an additional hot spot as there are many

  18. North American Security Cooperation: Prospects for Growth

    Science.gov (United States)

    2006-11-01

    to profane your ground with his step, think, oh beloved country, that heaven has given you a soldier in every son.” The remaining lyrics call for...Alistair Shepherd. Toward a European Army: A Military Power in The Making? Lynne Reinner Publishers, 2003. Singer, P.W.. Review Essay : “The War on

  19. Governance: The Mission Ingredient in Security Cooperation

    Science.gov (United States)

    2017-06-09

    change the norms, behaviors, and beliefs within the Colombian political elites resulting in support for counter violence and anti-terrorism efforts... legislation . In all of the scholarly writing found on the matter, they relied—and many of them heavily—on reforming SC/SA through more legislative ...ADRP 5-0. “An operational environmental frame consists of two parts—the current state of the operational environment and the desired end state of the

  20. Briefing : the Eritrean-Ethiopian border dispute

    NARCIS (Netherlands)

    Abbink, G.J.

    1998-01-01

    On 6 May 1998, a violent conflict erupted in the Ethiopian-Eritrean border area. This article contends that this border crisis is neither unexpected nor the result of a real border dispute. Rather, it is due to three factors: the particular history and relationship of the two insurgent movements

  1. European Banks Straddling Borders: Risky or Rewarding?

    NARCIS (Netherlands)

    P. Duijm (Patty); D. Schoenmaker (Dirk)

    2017-01-01

    textabstractTheory suggests that cross-border banking is beneficial as long as there is a non-perfect correlation across country-specific risks. Using a unique hand-collected dataset with cross-border loans for the 61 largest European banks, we find that cross-border banking in general decreases

  2. Cross-Border Exposures and Financial Contagion

    NARCIS (Netherlands)

    Degryse, H.A.; Elahi, M.A.; Penas, M.F.

    2009-01-01

    Integrated financial markets provide opportunities for expansion and improved risk sharing, but also pose threats of contagion risk through cross-border exposures. This paper examines cross-border contagion risk over the period 1999-2006. To that purpose we use aggregate cross-border exposures of

  3. Recent trends in cross-border banking

    NARCIS (Netherlands)

    De Haas, Ralph; van Horen, Neeltje; Beck, Thorsten; Casu, Barbara

    2017-01-01

    This chapter identifies a number of recent trends in European cross-border banking. The authors first distinguish between two main modes of international banking: cross-border versus multinational banking. Cross-border banking occurs when a bank in country A lends directly to a borrower in country

  4. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  5. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  6. Nonstate Actors and the Open Border Policy: The Border Security Case Study of Nepal and India

    Science.gov (United States)

    2014-12-01

    Washington headquarters Services, Directorate for Information Operations and Reports. 1215 Jefferson Davis Highway, Suite 1204. Arlington, VA 22202-4302... remuneration .”276 This massive migration of young and eager workers allowed Germany to take advantage of booming industries and markets. The impact on

  7. Ten years in disarmament and security: a mixed legacy; Dix annees de desarmement et de securite: un heritage nuance

    Energy Technology Data Exchange (ETDEWEB)

    Nolan, J E

    1998-10-01

    A retrospective of the developments in arms control and international security over last decade is necessarily a dialectic, a chronicle of points and counterpoints. The transformations in the international system that have results from the demise of bipolarity and the rise of trans nationalism have opened new opportunities for positive global engagement through international finance, production, trade, communications and by implication, conflict prevention and non-proliferation. The vastly increased pace and commercialisation of technological innovation also portend growing economic interdependence and higher transparency in the international system. Trans nationalism also implies shared risks posed by cross-border conflicts, sudden migrations, organized crime, ecological destruction and more rapid diffusion of technologies to build weapons of mass destruction. How these developments will translate into more cooperative security policies remains hard to predict and widely disputed

  8. Old Borders and New Bordering Capabilities: Cities as Frontier Zones

    Directory of Open Access Journals (Sweden)

    Saskia Sassen

    2015-12-01

    Full Text Available The global city is a new frontier zone. Deregulation, privatization, and new fiscal and monetary policies create the formal instruments to construct their equivalent of the old military “fort”. The city is also a strategic frontier zone for those who lack power, and allows the making of informal politics. At the same time the border is a mix of regimes, marked by protections and opportunities for corporations and high-level professionals, and implies confinement, capture and detention for migrants. The essay discusses the transformation of the city in a frontier zone and analyses the separation between the capabilities entailed by territoriality and the geographic territory tout court. The analysis focuses on the effects of neoliberal policies that, far from making this a borderless world, have actually multiplied the bordered spaces that allow firms and markets to move across conventional borders. Cities are therefore one of the key sites where new neoliberal norms are made and where new identities emerge.

  9. The Impact of Illegal and Legal Migration on the Defense Security of South Africa

    Science.gov (United States)

    2012-03-19

    migrants among the most hostile anywhere in the world. This is despite the fact that the South African constitution explicitly extends basic human...principles as stipulated in the constitution . Border Security Priority Border security has become an important national priority – so much so...Three countries signed the North American Free Trade Association ( NAFTA ), however, as a result, the US is strengthening its border controls with

  10. Radiation Control on Uzbekistan Borders - Results and Perspectives

    International Nuclear Information System (INIS)

    Petrenko, Vitaliy; Yuldashev, Bekhzod; Ismailov, Ulughbek; Shipilov, Nikolay; Chipizubov, Sergey; Avezov, Anvar

    2009-01-01

    The measures and actions on prevention, detection and response to criminal or unauthorized acts involving radioactive materials in Uzbekistan are presented. In frames of program of radiation monitoring to prevent illicit trafficking of nuclear and radioactive materials main customs border checkpoints were equipped with commercial radiation portal monitors. Special radiation monitors elaborated and manufactured in INP AS RU are installed in INP(main gates, research reactor and laboratory building) to provide nuclear security of Institute facilities. The experience of Uzbekistan in establishing radiation monitoring systems on its borders, their operation and maintenance would be useful for realization of proposed plan of strengthening measures to prevent illicit trafficking in Republics of Central Asia region.

  11. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  12. U.S. Southwest Border Security: An Operational Approach

    Science.gov (United States)

    2012-06-08

    NAFTA North American Free Trade Agreement NG National Guard ONDCP Office of National Drug Control Policy SGA Small Group Advisor TCO Transnational......Transit Zone Interdiction Efforts (Washington DC: Government Accountability Office, 2002), 20. 3The Constitution Net, s.v. “Impunity,” http

  13. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available technologies used • Radar and Electronic warfare systems, optronic systems, unmanned aerial vehicles, databases, software, networks. • Preparation time 8 months • Executed over two weeks Working with real results After the experiment • Overall...

  14. Securing the Northern Maritime Border Through Maritime Domain Awareness

    Science.gov (United States)

    2010-09-01

    and purpose of the agreement” (United States Department of State [USDOS], 2003). According to this pro memoria document, armament consists of M-60, .50...of Justice. United States Department of State. (2003). Pro Memoria of the United States Department of State. Washington, DC. Retrieved August 16

  15. Homeland Security: Unmanned Aerial Vehicles and Border Surveillance

    Science.gov (United States)

    2010-07-08

    outfit the Predator B with a synthetic aperture radar (SAR) system17 and a moving target indicator (MTI) radar. Adding SAR and MTI to the Predator B’s...Predator Squadrons,” Inside the Air Force, June 7, 2002. 17 For more information about Synthetic Aperture Radar, see http://www.sandia.gov/radar...contributed to the seizing of more than 22,000 pounds of marijuana and the apprehension of 5,000 illegal immigrants,” others disagree.24 “Unmanned aircraft

  16. Using Automatic Identification System Technology to Improve Maritime Border Security

    Science.gov (United States)

    2014-12-01

    digital selective calling EPIRB Emergency Position Indicting Radio Beacon EU European Union FAA Federal Aviation Administration GAO U. S. Government...that has visited a hovering vessel or received merchandise outside the territorial sea. A hovering vessel is defined as a vessel loitering offshore...often with the intent to introduce merchandise into the United States illegally. Departing the United States and transiting international or foreign

  17. Border Security and Military Support: Legal Authorizations and Restrictions

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2006-01-01

    ... enforcement unless explicitly authorized. There are alternative legal authorities for deploying the National Guard, and the precise scope of permitted activities and funds may vary with the authority exercised. This report will be updated as warranted.

  18. Continuation or Equilibration: The Algerian Conflict and European Security

    National Research Council Canada - National Science Library

    Lynch, Michael

    1997-01-01

    .... Algeria's conflict has ramifications that travel far beyond its borders. Europe states rely upon Algerian natural gas for their energy needs, and are fearful of the impact of Islamic revivalism on their security situations...

  19. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  20. Nuclear terrorism: Identifying and combating the risks. International conference on nuclear security, 16 March 2005, London, UK

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    Security strategies, for many centuries, have been based on boundaries: the strategic placement of cities and borders to take advantage of natural barriers; defences that relied on walls, trenches and armadas; and the use of ethnic, religious or other groupings to distinguish friend from foe. In the 20th Century, the advent of airplanes, submarines and ballistic missiles began to undermine this approach to security by enabling the remote delivery of destruction on a scale previously not envisioned. But the change that has altered the international security landscape the most drastically is, in fact, globalization. The global community has become interdependent, with the constant movement of people, ideas and goods. Many aspects of modern life, communication, the global marketplace and, most recently, the rise in international terrorism - clearly indicate that our understanding of and approaches to national and international security must be adjusted, in keeping with new realities. This statement discusses: Nuclear Security and the Protection Against Nuclear Terrorism, IAEA Nuclear Security Plan of Activities founded on measures to guard against thefts of nuclear and other radioactive material and to protect related facilities against malicious acts; cooperation with other organizations and efforts

  1. Internal Border Controls in the European Union

    DEFF Research Database (Denmark)

    Jørgensen, Carsten Willemoes; Sørensen, Karsten Engsig

    2012-01-01

    Recent events, involving inter alia France and Denmark, have stimulated renewed interest in the introduction of different forms of border controls at the internal borders within the European Union. These border control measures are aimed at checking either persons or goods or both. Against...... the background of these events, this article analyses the existing rules regulating controls of persons and goods, and explores how these rules may or may not stand in the way of introducing border controls at the European Union’s internal borders. These events have resulted in a call for reforms of the current...

  2. Fifty Feet Above The Wall: Cartel Drones in the U.S.-Mexico Border Zone Airspace, and What to do About Them

    Science.gov (United States)

    2018-03-01

    troop movements and border security personnel. It is sensible that the drug cartels, who have a history of adopting technology to perform surveillance...countering narco- drones at the U.S.–Mexico border. 14. SUBJECT TERMS U.S.–Mexico border, drug cartel, emerging threat, disruptive technology ...Forces Commander Michael Waltz. He contends, “unfortunately, I don’t think we’re ready right now…We don’t have the technology —both the detection

  3. Risk management of infrastructure development in border area Indonesia - Malaysia

    Science.gov (United States)

    Fitri, Suryani; Trikariastoto, Reinita, Ita

    2017-11-01

    Border area is geographically adjacent to neighboring countries with the primary function of maintaining state sovereignty and public welfare. Area in question is part of the provinces, districts or cities that directly intersect with national boundaries (or territory) and / or that have a functional relationship (linkage) and has a strategic value for the state. The border area is considered strategic because it involves the national lives of many people in terms of the interests of political, economic, social and cultural as well as defense and security (poleksosbudhankam) both located on land, sea or air. The border area is geographically adjacent to neighboring countries with the primary function of maintaining state sovereignty and public welfare. Area in question is part of the provinces, districts or cities that directly intersect with national boundaries (or territory) and / or that have a functional relationship (linkage) and has a strategic value for the state. To realize the necessary research on the development of the area, based on good practices from other countries some of the city that can meet all these challenges and at least can be applied with minor changes / adjustments. Furthermore, the application must be supported by the availability of funds. This study to discuss about any problems either obstacles or things that drive to develop function becomes an ideal border area with major support infrastructure for housing, transportation, energy availability, and distribution of clean water which will strengthen in its function which consists of five pillars, namely: central community service; trade and distribution center; financial center; tourism center; related to the field of community development. Articulation between key stakeholders such as government, private, and community is a major concern in this study, including in determining the appropriate financing schemes. The results of this study will be recommended to the government to improve

  4. Cross-border reprogenetic services.

    Science.gov (United States)

    Couture, V; Drouin, R; Tan, S-L; Moutquin, J-M; Bouffard, C

    2015-01-01

    The purpose of this review is to synthesize the current knowledge on the international movement of patients and biopsied embryo cells for pre-implantation genetic diagnosis and its different applications. Thus far, few attempts have been made to identify the specific nature of this phenomenon called 'cross-border reprogenetic services'. There is scattered evidence, both empirical and speculative, suggesting that these services raise major issues in terms of service provision, risks for patients and the children-to-come, the legal liabilities of physicians, as well as social justice. To compile this evidence, this review uses the narrative overview protocol combined with thematic analysis. Five major themes have emerged from the literature at the conjunction of cross-border treatments and reprogenetics: 'scope', 'scale', 'motivations', 'concerns', and 'governance'. Similar themes have already been observed in the case of other medical tourism activities, but this review highlights their singularity with reprogenetic services. It emphasizes the diagnostic and autologous feature of reprogenetics, the constant risk of misdiagnosis, the restriction on certain tests for medically controversial conditions, and the uncertain accessibility of genetic counseling in cross-border settings. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  5. Strengthening border control and management

    International Nuclear Information System (INIS)

    Chatzis, I.

    2008-01-01

    The world has experienced monumental changes in recent years. Globalization has brought many benefits. Business and commerce have increased and, as a result, brought us cheaper, more accessible goods from all regions of the world. We have access to relatively cheap and certainly much easier travel. We now live in a world of instant communications with mobile phones, laptops and 'BlackBerries'. However, there is a downside to globalization - transnationally organized crime and the reality of terrorism have grown. As more people cross borders, it is harder to detect criminals and terrorists. In the European Union, the internal borders of the now 27 member States have been dismantled. Effective international measures to counter organized crime and terrorist groups are of crucial importance. It is important to think globally and to act locally. The paper looks at some of the crime challenges and provides insight into the role and work of the United Nations Office on Drugs and Crime (UNODC) in drugs and crime control. It focuses on border control initiatives conducted by the UNODC. (author)

  6. Unresolved legal questions in cross-border health care in Europe: liability and data protection.

    Science.gov (United States)

    van der Molen, I N; Commers, M J

    2013-11-01

    Directive 2011/24/EU was designed to clarify the rights of EU citizens in evaluating, accessing and obtaining reimbursement for cross-border care. Based on three regional case studies, the authors attempted to assess the added value of the Directive in helping clarify issues in to two key areas that have been identified as barriers to cross-border care: liability and data protection. Qualitative case study employing secondary data sources including research of jurisprudence, that set up a Legal framework as a base to investigate liability and data protection in the context of cross-border projects. By means of three case studies that have tackled liability and data protection hurdles in cross-border care implementation, this article attempts to provide insight into legal certainty and uncertainty regarding cross-border care in Europe. The case studies reveal that the Directive has not resolved core uncertainties related to liability and data protection issues within cross-border health care. Some issues related to the practice of cross-border health care in Europe have been further clarified by the Directive and some direction has been given to possible solutions for issues connected to liability and data protection. Directive 2011/24/EU is clearly a transposition of existing regulations on data protection and ECJ case law, plus a set of additional, mostly, voluntary rules that might enhance regional border cooperation. Therefore, as shown in the case studies, a practical and case by case approach is still necessary in designing and providing cross-border care. © 2013 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  7. Beyond Our Borders? Public Resistance to Global Genomic Data Sharing.

    Directory of Open Access Journals (Sweden)

    Mary A Majumder

    2016-11-01

    Full Text Available Prospects have never seemed better for a truly global approach to science to improve human health, with leaders of national initiatives laying out their vision of a worldwide network of related projects. An extensive literature addresses obstacles to global genomic data sharing, yet a series of public polls suggests that the scientific community may be overlooking a significant barrier: potential public resistance to data sharing across national borders. In several large United States surveys, university researchers in other countries were deemed the least acceptable group of data users, and a just-completed US survey found a marked increase in privacy and security concerns related to data access by non-US researchers. Furthermore, diminished support for sharing beyond national borders is not unique to the US, although the limited data from outside the US suggest variation across countries as well as demographic groups. Possible sources of resistance include apprehension about privacy and security protections. Strategies for building public support include making the affirmative case for global data sharing, addressing privacy, security, and other legitimate concerns, and investigating public concerns in greater depth.

  8. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  9. Reprint of: Dream vs. reality: seven case-studies on the desirability and feasibility of cross-border hospital collaboration in Europe.

    Science.gov (United States)

    Glinos, Irene A; Baeten, Rita

    2015-01-01

    Despite being a niche phenomenon, cross-border health care collaboration receives a lot of attention in the EU and figures visibly on the policy agenda, in particular since the policy process which eventually led to the adoption of Directive 2011/24/EU. One of the underlying assumptions is that cross-border collaboration is desirable, providing justification to both the European Commission and to border-region stakeholders for promoting it. The purpose of this paper is to question this assumption and to examine the role of actors in pushing (or not) for cross-border collaboration. The analysis takes place in two parts. First, the EU policies to promote cross-border collaboration and the tools employed are examined, namely (a) use of European funds to sponsor concrete border-region collaboration projects, (b) use of European funds to sponsor research which gives visibility to cross-border collaboration, and (c) use of the European Commission's newly acquired legal mandate to encourage "Member States to cooperate in cross-border health care provision in border-regions" (Art. 10) and support "Member States in the development of European reference networks between health care providers and centres of expertise" (Art. 12). Second, evidence gathered in 2011-2013 from seven European border-regions on hospital cross-border collaboration is systematically reviewed to assess the reality of cross-border collaboration - can it work and when, and why do actors engage in cross-border collaboration? The preliminary findings suggest that while the EU plays a prominent role in some border-region initiatives, cross-border collaboration needs such a specific set of circumstances to work that it is questionable whether it can effectively be promoted. Moreover, local actors make use of the EU (as a source of funding, legislation or legitimisation) to serve their needs. Copyright © 2014. Published by Elsevier Ltd.

  10. Illicit economies and social order: the border area of Peru, Brazil and Colombia

    Directory of Open Access Journals (Sweden)

    Noam López

    2015-12-01

    Full Text Available In recent years, the border shared by Peru, Colombia and Brazil has become an enclave of drug production and trafficking for the international markets. It is a territory whose control is disputed by non-state actors and where state security forces suffer from severe material and transport limitations. This paper takes an ethnographic approach to explain the limitations of border security and the institutional challenges of controlling drug and wood trafficking in this context. It places the ideas of reproduction and social change at the centre of the discussion on drugs and borders, as key ways of thinking about the dynamics of growing and processing coca-derived drugs in the global South.

  11. Cross border environmental issues arising from the former Soviet Union nuclear fuel cycle

    International Nuclear Information System (INIS)

    Shaw, B.R.; Dooley, J.J.; Bradley, D.J.

    1998-02-01

    Radioactive contamination from sites in the Former Soviet Union (FSU) threaten bordering states via transport through marine environments. Japan, North Korea, South Korea, Germany, Sweden, Norway, and Finland share waterways or border common bodies of water with the FSU. Cross-border contamination resulting from past and in some cases current radioactive waste practices FSU nuclear wastes could under the right circumstances destabilize military, economic, or other relationships between the FSU and these border nations. The United States has an ongoing obligation to assist many of these border nations in times of need. This analysis was sponsored by the Office of Policy and International Affairs, Office of Materials-Asset Management and National Security Policy Analysis. The Center for Environmental Security was tasked to identify cross-border and other policy issues from an extensive body of technical materials dealing with nuclear materials management in the Former Soviet Union compiled over time by Pacific Northwest National Laboratory. The analysis focused on cross-border impacts but also provides insights into policy analysis based on this existing technical work. The efficiencies and results realized by this study indicate that this analytical methodology has merit for additional policy studies. There are three elements comprising the problem of understanding cross border transport. The amount of FSU nuclear waste that has been disposed of in ways that did not, or probably will not contain the waste is the first element. The past and probable future entry of these wastes into groundwater and surface waters, thence to seas is the second. Finally, adverse effects on human health and welfare from ingesting contaminated sea products, and from damaged fisheries and food production activities is the third

  12. Caught in the Middle at the U.S.-Canadian Border

    Science.gov (United States)

    2013-03-01

    strategic-plan-fy-2012-2016.pdf.; Janet Napolitano, “Northern Border Strategy,” Homeland Security Digital Library, June 2012, http://www.hsdl.org...Stewardship,” Homeland Security Digital Library, January 19, 2007, http://www.hsdl.org/?view&did=470382. 14 U.S. Coast Guard, Great Lakes Maritime...28 per cent of merchandise shipments between Canada and the United States pass through the Windsor-Detroit Corridor … Our national economy―and our

  13. PUBLIC SERVICES AND THE EURO-REGIONAL COOPERATION

    Directory of Open Access Journals (Sweden)

    Badulescu Alina

    2012-07-01

    Full Text Available Besides the goods and private services, covering the specific needs of individual or groups based on specific mechanisms of demand and supply, human needs can be addressed also through public services. They are designed to meet the general interests of members of a community or society at large and established by public authorities, subject to certain fundamental principles of organization and operation, such as: the principle of efficiency, the principle of equity, the principle of continuity, the principle of movability and the principle of decentralization. In the same time, public services involve in many areas of economic and social life is not just a national issue, but also have characteristics and provision ways at international, regional and euro-regional level. This paper underlines the main areas of euro-regional co-operation interest in the public services sectors, such as: the sectors of environment, agriculture and territorial planning, the sectors of transportation, security and telecommunication, the sector of the economy and labour force, the sector of cross-border populations: social protection and public health, the sectors of education, research and culture.

  14. Threats to cross-border wildlife linkages in the Sky Islands Wildlands Network

    Science.gov (United States)

    Kim Vacariu

    2005-01-01

    One of the greatest challenges facing conservationists in the Sky Islands region is finding a realistic means to maintain historic travel routes for wide-ranging species crossing the United States-Mexico border. This challenge is made difficult due to the ongoing efforts by the Federal government to install additional security infrastructure to stem the flood of...

  15. The Dilemma of Porous Borders: Uganda’s Experience in Combating Terrorism

    Science.gov (United States)

    2017-01-10

    burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA...that laxity in immigration control, poor remuneration , and corruption among security officials at border stations complicates the challenge of porous...Special Branch was disbanded and PATU placed under a newly created Directorate of Counter Terrorism. Since then, a

  16. 46 CFR 7.120 - Mexican/United States border to Point Fermin, CA.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Mexican/United States border to Point Fermin, CA. 7.120 Section 7.120 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC... from the southerly tower of the Coronado Hotel in approximate position latitude 32°40.8′ N. longitude...

  17. Cross-border effects of capacity mechanisms in interconnected power systems

    NARCIS (Netherlands)

    Bhagwat, P.C.; Richstein, J.C.; Chappin, E.J.L.; Iychettira, K.K.; de Vries, L.J.

    2017-01-01

    The cross-border effects of a capacity market and a strategic reserve in interconnected electricity markets are modeled using an agent-based modeling methodology. Both capacity mechanisms improve the security of supply and reduce consumer costs. Our results indicate that interconnections do not

  18. 75 FR 40864 - Notice of Fiscal Year 2010 Border Grant Funding and Solicitation for Applications

    Science.gov (United States)

    2010-07-14

    ... Federal Grant Web site, http://www.grants.gov . Eligible projects for funding with BEG are identified in... applications for BEG funding at the Federal Grant Web site, http://www.grants.gov . FOR FURTHER INFORMATION... the MOE explanation, http://www.fmcsa.dot.gov/safety-security/grants/beg/moe.aspx . The Border...

  19. 77 FR 5521 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2012-02-03

    ... recommendations on how to proceed on those topics: The work of the Global Supply Chain Security Air Cargo... Partnership Against Terrorism (C-TPAT) program and Beyond the Border (BTB)--Report by the Global Supply Chain... Intellectual Property Rights (IPR) Enforcement Subcommittee: IPR Distribution Chain Management concept. Prior...

  20. 78 FR 64968 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)

    Science.gov (United States)

    2013-10-30

    ... regarding the Partner Government Agency--Message Set (PGA-MS). 2. The Global Supply Chain Subcommittee... the Global Shipment Identification Number (GSIN) as a possible tool for use in Distribution Chain... and Border Protection, Department of Homeland Security (DHS). ACTION: Committee Management; Notice of...