WorldWideScience

Sample records for global security threat

  1. Nuclear security: A global response to a global threat

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2016-01-01

    The threat of nuclear terrorism is real. The possibility of criminals getting hold of nuclear and other radioactive material cannot be ruled out. Much progress has been made in tackling this threat nationally, regionally and globally, but more needs to be done. International cooperation is vital. As the global platform for cooperation in nuclear security, the IAEA helps countries to establish and maintain robust and sustainable national nuclear security regimes. We help ensure that measures are taken to protect nuclear and other radioactive material, as well as the facilities in which such material is housed, from malicious acts. This has been an important year for nuclear security with the entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material. This establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. I encourage all countries that have not yet done so to adhere to this Amendment and thereby contribute to a stronger global nuclear security regime. In this edition of the IAEA Bulletin, you will learn about the different areas of security where our work is making a real difference. We highlight the progress made in a number of countries.

  2. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  3. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  4. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  5. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  6. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  7. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  8. Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis

    OpenAIRE

    Princely Ifinedo

    2015-01-01

    Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economic factors and information security threats and controls in the financial services industry. Essentially, it seeks to enrich the information provide...

  9. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  10. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  11. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  12. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  13. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  14. Rapid emergence of pathogens in agro-ecosystems: global threats to agricultural sustainability and food security.

    Science.gov (United States)

    McDonald, Bruce A; Stukenbrock, Eva H

    2016-12-05

    Agricultural ecosystems are composed of genetically depauperate populations of crop plants grown at a high density and over large spatial scales, with the regional composition of crop species changing little from year to year. These environments are highly conducive for the emergence and dissemination of pathogens. The uniform host populations facilitate the specialization of pathogens to particular crop cultivars and allow the build-up of large population sizes. Population genetic and genomic studies have shed light on the evolutionary mechanisms underlying speciation processes, adaptive evolution and long-distance dispersal of highly damaging pathogens in agro-ecosystems. These studies document the speed with which pathogens evolve to overcome crop resistance genes and pesticides. They also show that crop pathogens can be disseminated very quickly across and among continents through human activities. In this review, we discuss how the peculiar architecture of agro-ecosystems facilitates pathogen emergence, evolution and dispersal. We present four example pathosystems that illustrate both pathogen specialization and pathogen speciation, including different time frames for emergence and different mechanisms underlying the emergence process. Lastly, we argue for a re-design of agro-ecosystems that embraces the concept of dynamic diversity to improve their resilience to pathogens. This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'. © 2016 The Author(s).

  15. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  16. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  17. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  18. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  19. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  20. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  1. The emergence of Ebola as a global health security threat: From ′lessons learned′ to coordinated multilateral containment efforts

    Directory of Open Access Journals (Sweden)

    Sarathi Kalra

    2014-01-01

    Full Text Available First reported in remote villages of Africa in the 1970s, the Ebolavirus was originally believed to be transmitted to people from wild animals. Ebolavirus (EBOV causes a severe, frequently fatal hemorrhagic syndrome in humans. Each outbreak of the Ebolavirus over the last three decades has perpetuated fear and economic turmoil among the local and regional populations in Africa. Until now it has been considered a tragic malady confined largely to the isolated regions of the African continent, but it is no longer so. The frequency of outbreaks has increased since the 1970s. The 2014 Ebola outbreak in Western Africa has been the most severe in history and was declared a public health emergency by the World Health Organization. Given the widespread use of modern transportation and global travel, the EBOV is now a risk to the entire Global Village, with intercontinental transmission only an airplane flight away. Clinically, symptoms typically appear after an incubation period of approximately 11 days. A flu-like syndrome can progress to full hemorrhagic fever with multiorgan failure, and frequently, death. Diagnosis is confirmed by detection of viral antigens or Ribonucleic acid (RNA in the blood or other body fluids. Although historically the mortality of this infection exceeded 80%, modern medicine and public health measures have been able to lower this figure and reduce the impact of EBOV on individuals and communities. The treatment involves early, aggressive supportive care with rehydration. Core interventions, including contact tracing, preventive initiatives, active surveillance, effective isolation and quarantine procedures, and timely response to patients, are essential for a successful outbreak control. These measures, combined with public health education, point-of-care diagnostics, promising new vaccine and pharmaceutical efforts, and coordinated efforts of the international community, give new hope to the Global effort to eliminate Ebola

  2. The Emergence of Ebola as a Global Health Security Threat: From ‘Lessons Learned’ to Coordinated Multilateral Containment Efforts

    Science.gov (United States)

    Kalra, Sarathi; Kelkar, Dhanashree; Galwankar, Sagar C.; Papadimos, Thomas J.; Stawicki, Stanislaw P.; Arquilla, Bonnie; Hoey, Brian A.; Sharpe, Richard P.; Sabol, Donna; Jahre, Jeffrey A.

    2014-01-01

    First reported in remote villages of Africa in the 1970s, the Ebolavirus was originally believed to be transmitted to people from wild animals. Ebolavirus (EBOV) causes a severe, frequently fatal hemorrhagic syndrome in humans. Each outbreak of the Ebolavirus over the last three decades has perpetuated fear and economic turmoil among the local and regional populations in Africa. Until now it has been considered a tragic malady confined largely to the isolated regions of the African continent, but it is no longer so. The frequency of outbreaks has increased since the 1970s. The 2014 Ebola outbreak in Western Africa has been the most severe in history and was declared a public health emergency by the World Health Organization. Given the widespread use of modern transportation and global travel, the EBOV is now a risk to the entire Global Village, with intercontinental transmission only an airplane flight away. Clinically, symptoms typically appear after an incubation period of approximately 11 days. A flu-like syndrome can progress to full hemorrhagic fever with multiorgan failure, and frequently, death. Diagnosis is confirmed by detection of viral antigens or Ribonucleic acid (RNA) in the blood or other body fluids. Although historically the mortality of this infection exceeded 80%, modern medicine and public health measures have been able to lower this figure and reduce the impact of EBOV on individuals and communities. The treatment involves early, aggressive supportive care with rehydration. Core interventions, including contact tracing, preventive initiatives, active surveillance, effective isolation and quarantine procedures, and timely response to patients, are essential for a successful outbreak control. These measures, combined with public health education, point-of-care diagnostics, promising new vaccine and pharmaceutical efforts, and coordinated efforts of the international community, give new hope to the Global effort to eliminate Ebola as a public

  3. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  4. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  5. Hybrid threats, cyber warfare and NATO's comprehensive approach for countering 21st century threats: mapping the new frontier of global risk and security management

    OpenAIRE

    Bachmann, Sascha

    2011-01-01

    The end of the so-called ‘Cold War’ has seen a change in the nature of present threats and with it to the overall role and mission of NATO, the North Atlantic Treaty Organization. The collapse of the Soviet Union and the Warsaw Pact in 1991 also removed the original raison d’etre of the Alliance: the prospect of having to repel a Soviet led attack by the Warsaw Pact on the West through the so called ‘Fulda gap’ in Germany (referring to the German lowlands between Frankfurt am Main and the for...

  6. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  7. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  8. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  9. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  10. Threats to financial system security

    Energy Technology Data Exchange (ETDEWEB)

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  11. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  12. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  13. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  14. Global Health Security

    Centers for Disease Control (CDC) Podcasts

    2017-09-21

    Dr. Jordan Tappero, a CDC senior advisor on global health, discusses the state of global health security.  Created: 9/21/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID), Center for Global Health (CGH).   Date Released: 9/21/2017.

  15. Smart Grid Security: Threats, Challenges, and Solutions

    OpenAIRE

    Sanjab, Anibal; Saad, Walid; Guvenc, Ismail; Sarwat, Arif; Biswas, Saroj

    2016-01-01

    The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utmost importance to: a) understand its underlying vulnerabilities and associated threats, b) quanti...

  16. Security Requirements for New Threats at International Airports

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2018-03-01

    Full Text Available The paper refers to security requirements for new threats international airports, taking specifically into consideration current challenges within processing of passengers, in light of types of current major threats, in a way ensuring positive passenger experience within their journey. In addition, within the scope of this paper, presented initial outcome of study research among professional aviation stakeholder?s environment, on current threats in the area of security and protection of airport infrastructure. The airports are a very demanding environment: seasonal traffic, fluctuating passenger volumes and last minute changes mean there is a lot of flexibility required in order to meet specific needs of airport authorities and their clients or the passengers (Dolnik, 2009. Therefore, security in aviation sector has been a big issue for civil aviation authorities, as airports are susceptible targets for terrorist attacks. The list of incidents is extensive and gets longer every year despite strict security measures. Within decades, aviation has become the backbone of our global economy bringing people to business, tourists to vacation destinations and products to markets. Statistically flying remains the safest mode of travelling compared to other modes of transportation. However, simultaneously terrorists and criminals continue in their quest to explore new ways of disrupting air transportation and the challenge to secure airports and airline assets remain real. This calls for greater awareness of security concerns in the aviation sector. The key element, how to protects against terrorist modus operandi, is to stay ahead of recent threats, incidents and breaches occurring worldwide. It requires implementation of effective data sharing systems, in order to proactively monitor potential risks and vulnerabilities within different type of aviation ecosystems.

  17. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  18. Global Warming: A Reduced Threat?.

    Science.gov (United States)

    Michaels, Patrick J.; Stooksbury, David E.

    1992-10-01

    One popular and apocalyptic vision of the world influenced by increasing concentrations of infrared-absorbing trace gases is that of ecological disaster brought about by rapidly rising temperatures, sea level, and evaporation rates. This vision developed from a suite of climate models that have since considerably changed in both their dynamics and their estimates of prospective warming. Observed temperatures indicate that much more warming should already have taken place than predicted by earlier models in the Northern Hemisphere, and that night, rather than day, readings in that hemisphere show a relative warming. A high-latitude polar-night warming or a general night warming could be either benign or beneficial. A large number of plant species show both increased growth and greater water-use efficiency under enhanced carbon dioxide.An extensive body of evidence now indicates that anthropo-generated sulfate emissions are mitigating some of the warming, and that increased cloudiness as a result of these emissions will further enhance night, rather than day, warming. The sulfate emissions, though, are not sufficient to explain all of the night warming. However, the sensitivity of climate to anthropogenerated aerosols, and the general lack of previously predicted warming, could drastically alter the debate on global warming in favor of less expensive policies.

  19. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  20. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  1. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  2. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  3. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2017-01-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  4. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  5. Threat Prioritization Process for the Czech Security Strategy Making

    Directory of Open Access Journals (Sweden)

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  6. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  7. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  8. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  9. Computer security threats faced by small businesses in Australia

    OpenAIRE

    Hutchings, Alice

    2012-01-01

    In this paper, an overview is provided of computer security threats faced by small businesses. Having identified the threats, the implications for small business owners are described, along with countermeasures that can be adopted to prevent incidents from occurring. The results of the Australian Business Assessment of Computer User Security (ABACUS) survey, commissioned by the Australian Institute of Criminology (AIC), are drawn upon to identify key risks (Challice 2009; Richards 2009). Addi...

  10. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  11. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  12. Quantifying Security Threats and Their Impact

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2009-01-01

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper we illustrate this infrastructure by means of a sample example involving an e-commerce application.

  13. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  14. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  15. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  16. Investigation of a Markov Model for Computer System Security Threats

    Directory of Open Access Journals (Sweden)

    Alexey A. A. Magazev

    2017-01-01

    Full Text Available In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. In the framework of this model the functioning of the computer system is considered as a sequence of failures and recovery actions which appear as results of information security threats acting on the system. We provide a detailed description of the model: the explicit analytical formulas for the probabilities of computer system states at any arbitrary moment of time are derived, some limiting cases are discussed, and the long-run dynamics of the system is analysed. The dependence of the security state probability (i.e. the state for which threats are absent on the probabilities of threats is separately investigated. In particular, it is shown that this dependence is qualitatively different for odd and even moments of time. For instance, in the case of one threat the security state probability demonstrates non-monotonic dependence on the probability of threat at even moments of time; this function admits at least one local minimum in its domain of definition. It is believed that the mentioned feature is important because it allows to locate the most dangerous areas of threats where the security state probability can be lower then the permissible level. Finally, we introduce an important characteristic of the model, called the relaxation time, by means of which we construct the permitting domain of the security parameters. Also the prospects of the received results application to the problem of finding the optimal values of the security parameters is discussed.

  17. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    OpenAIRE

    Elena Vladimirovna Batueva

    2014-01-01

    The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is sh...

  18. Transregional Threats and Maritime Security Cooperation

    Science.gov (United States)

    2017-08-01

    continue to grow. As of 2015, China’s coast guard had 205 ships, more than the combined coast guards of Japan, Vietnam, Indonesia, Malaysia , and the...raised the possibility of China assisting the Philippines in maritime security. • China has maritime security initiatives with Malaysia and...Pakistan. They have also conducted maritime safety drills with their Omani counterparts. In recent years, the IRIN has made efforts to operate well

  19. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  20. Collective Study On Security Threats In MANET

    Directory of Open Access Journals (Sweden)

    Muhammad Zunnurain Hussain

    2017-01-01

    Full Text Available In this paper the authors will be discussing the security issues in MANET amp the methods to protect it. Authors will be talk about related work in securing the network different type of attacks how to sense these sorts of attack what are the features of MANET then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested So that the users can use proper authentication techniques and network resources can be properly utilized.

  1. Security Threats in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios

    2011-01-01

    Over the last few years, technological advances in the design of processors, memory, and radio communications have propelled an active interest in the area of distributed sensor networking, in which a number of independent, self-sustainable nodes collaborate to perform a large sensing task. Secur...

  2. Engineering security agreements against external insider threat

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.

    2013-01-01

    Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of

  3. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  4. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  5. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  6. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  7. Impact of Human Security Threats on Leadership and Political ...

    African Journals Online (AJOL)

    Human security threats in contemporary Africa have become a major political challenge. Whether it involves sectional conflicts, kidnapping, human trafficking, armed robbery they have continued to exert a far reaching impact on the leadership and political stability in the region. This paper is therefore an attempt to examine ...

  8. Forecast Of International Security Threat Of Russia In 2017

    Directory of Open Access Journals (Sweden)

    A. O. Bezrukov

    2017-01-01

    Full Text Available The article analyzes the threats to international security of Russia in 2017. It presents the analysis of the twelve situations, the development of which could have a significant effect on the interests of Russia in the field of international security. There is the most probable scenario for every situation and a list of conditions of its occurrence. The objective of the forecast is reduction of uncertainty of the future and the promotion of reasonable hypotheses about its likely scenarios. The forecast task is to help decision-makers, mentally put yourself in a situation in which realized one of the scenarios for the future and to encourage them to calculate their possible actions. In the preparation of the forecast two scenario analysis tools were used: the allocation of two key variables, the ratio of which determines the spectrum of the analyzed scenarios, and the key events method, which consists of several stages and allows to evaluate the prospect of implementing the scenario observed in real time. Authors conclude that the USA with the new president will be forced to choose between maintaining global posture and keeping order at home, and the EU will be absorbed by internal issues. In 2017 for Russia is important to keep the positive dynamics in the Transatlantic and Grand Eurasia regions, and in the Middle East. For this purpose it is necessary to ignore the provocations – mainly in Europe. The source of a new crisis may be NATO members discouraged by lack of attention to them by the USA or allies of Russia.

  9. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  10. Illicit trafficking of nuclear and other radioactive material: The 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhausler, F.

    2006-01-01

    Illicit trafficking in nuclear and other radioactive material, which could be used for building a nuclear weapon or a radiological dispersal device, has been a subject of concern for more than a decade. A major obstacle to assessing the actual security threat due to nuclear trafficking is the inclusion in the analysis of incidents that do not represent a security threat, in the sense of being a possible pre-stage to a clandestine nuclear weapons programme or a terrorist operation involving a crude nuclear device or a radiological dispersal device. International transport of contaminated scrap metal, or discovery of lost or abandoned radioactive sources are examples of such incidents, which have little or no security relevance. This paper analyses the global data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (DSO) using special filters to discriminate between incidents that are of security relevance and those that are not. (author)

  11. Security Threats Emerging from the Middle East and North Africa

    OpenAIRE

    Çınar, Bekir

    2015-01-01

    The main security threats affecting the Middle East and North African (MENA) region arise from energy insecurity, immigration and terrorism. These threats would remain if authorities and other stake holders do not address the root causes of the problems, which are artificial national borders, authoritarian regimes and lack of pluralist education. This paper suggests that lifting state borders and setting up regional economic communities such as the EU may ease conflicts in the region which ca...

  12. Computer Security of NPP Instrumentation and Control Systems: Cyber Threats

    International Nuclear Information System (INIS)

    Klevtsov, A.L.; Trubchaninov, S.A.

    2015-01-01

    The paper is devoted to cyber threats, as one of the aspects in computer security of instrumentation and control systems for nuclear power plants (NPP). The basic concepts, terms and definitions are shortly addressed. The paper presents a detailed analysis of potential cyber threats during the design and operation of NPP instrumentation and control systems. Eleven major types of threats are considered, including: the malicious software and hardware Trojans (in particular, in commercial-off-the-shelf software and hardware), computer attacks through data networks and intrusion of malicious software from an external storage media and portable devices. Particular attention is paid to the potential use of lower safety class software as a way of harmful effects (including the intrusion of malicious fragments of code) on higher safety class software. The examples of actual incidents at various nuclear facilities caused by intentional cyber attacks or unintentional computer errors during the operation of software of systems important to NPP safety.

  13. The cyber security threat stops in the boardroom.

    Science.gov (United States)

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  14. Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security

    Directory of Open Access Journals (Sweden)

    Stephen Blank

    2016-06-01

    Full Text Available The global economy can be viewed today as a myriad of border-crossing supply chain networks of production, supply, distribution and marketing systems. Given the enormous value embodied in these systems, and an environment increasingly characterized by uncertainty and vulnerability, it is not surprising that concern about supply chain security has intensified. Concern takes many forms. For example, how supply chains might be used as vehicles for criminal activity (smuggling, trafficking of narcotics and importing counterfeit goods or acts of terrorism (radio-active materials, bombs, even nukes in containers. Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. These threats could result in substantial disruption to supply chains and damage to companies and their customers.Clima But larger storms are brewing, whose menace to supply chain security is greater still – and where actions to protect supply chains move more slowly. These include the continued deterioration of transportation infrastructure, a new posture on trade which views supply chains as threats to jobs and wages, and the impact of climate change. These threats do not lie off in the distant future; they are threats of today and tomorrow.

  15. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  16. The Food Security of Ukraine: Status, Threats, Prospects

    Directory of Open Access Journals (Sweden)

    Rudnichenko Yevhenii M.

    2017-08-01

    Full Text Available The article analyzes the existing approaches to the normative treatment of the category of «food security». An author’s own definition of the concept of «food security» has been proposed, which must be understood as the status of provision to society foods of adequate quality and sufficient quantity. An author’s own approach as to the feasibility of applying qualitative parameters for food security assessment and a critical attitude to quantitative indicators has been formulated. The Food security index and the Ukrainian rating for 2012-2016 with emphasizing the negative tendencies and developments have been provided. The article also provides a detailed characterization of the main indicators of Ukraine’s food security in 2016 by the three directions, which are: financial accessibility of foods; physical accessibility of foods; food quality and safety. Strengths and weaknesses of Ukraine’s food security and the main threats to food security were determined, the main prospects were allocated.

  17. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  18. Northern Security and Global Politics

    DEFF Research Database (Denmark)

    This book takes a comprehensive approach to security in the Nordic-Baltic region, studying how this region is affected by developments in the international system. The advent of the new millennium coincided with the return of the High North to the world stage. A number of factors have contributed......-unipolar", indicating a period of flux and of declining US unipolar hegemony. Drawing together contributions from key thinkers in the field, Northern Security and Global Politics explores how this situation has affected the Nordic-Baltic area by addressing two broad sets of questions. First, it examines what impact...... declining unipolarity - with a geopolitical shift to Asia, a reduced role for Europe in United States policy, and a more assertive Russia - will have on regional Nordic-Baltic security. Second, it takes a closer look at how the regional actors respond to these changes in their strategic environment...

  19. RUSSIA'S ECONOMIC SECURITY: THREATS TO NATIONAL INTERESTS AND THEIR REFLECTION

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2014-01-01

    Full Text Available The relevance of this study due to the fact that at the present time the situation inRussiais complemented by the negative consequences of market reforms in the economy. According to statistical studies in the country with infl ation of about 10% per year among the total population of more than 20% of people with incomes below the subsistence minimum, and the income gap between the highest-income populations and low-income groups more than 12 times. The inequitable distribution of material and spiritual wealth, unemployment (over 9%, ignoring the legitimate rights and interests of a particular person and their direct violation, corruption, alcoholism, drug addiction largely led to the reproduction of aggression, violence in the country. The recession has limited the ability of the material support of the institutions of culture, education, health. The majority of the population is a feeling of uncertainty, future uncertainty, anxiety, loss of landmarks.Objectives The purpose of this work is the identifi cation and characterization of threats to economic security of theRussian Federationat the present time, and to develop recommendations for the prevention of threats to the national interests ofRussia.Method’s. The methodological basis of this article was legal, comparative and economic-statistical methods of analysis. Results. In the framework of the submitted article, the authors found that threats to the economic security ofRussiaare potential dangers that can occur when inept and ineffi cient use of economic resources ofRussiaon the domestic and foreign markets. Major threats to the economic security of theRussian Federationare: bankruptcy, weak absorption lines; corruption; threats to small business development; investment crisis, the massive outfl ow of capital; the crisis in the social sphere; food addiction; the crisis of industrial policy, as well as strengthening the role and place of TNCs.Conclusions and Relevance. The practical

  20. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  1. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  2. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  3. Evolution of the perception of the threats to security in Spain

    Directory of Open Access Journals (Sweden)

    Rafael Grasa

    1993-07-01

    Full Text Available security was internal, in other words, subversion and opposition to the regime. Public opinion, however, revealed that characteristics very different to those in the context of the western block existed, such as a void perception of the soviet threat as opposed to a marked antiamericanism for its support of the regime.This legacy of threats weighed heavily during the transition together with the existence of a cleavage between the armed forces, the political actors and public opinion regarding the real necessity of intergration into NATO. In the eighties there exists a clear differentiation between the threats perceived by public opinion and those considered by the political elites. With regard to the former,serious threats to Spain do not exist. only certain concerns when the subject of security took on importance in the field of public opinion, such as during the referendum campaign over NATO in 1986 which was mixed with the scarce perception of the soviet threat, theconstant danger represented by the United States and the slight rise in those who believed in the Moroccan threat, and the impact of the Gulf War in 1991 and the consequent increase of the threat represented by the arab countries. For the political actors, the mainthreat contemplated was the protection of territorial integrity on a stage closer to the western Mediterranean instead of a global threat to the western block something only considered at a theoretical level with the strategic concept of Spanish defence within the framework of participation in NATO.From 1992 onwards with the Defence Directive, the threat concept is replaced by that of risk and which recovers the importance given over to North Africa. It is argued in the belief that security is indivisible and must be shared not only with the European members. A greater convergence is also initiated in the nineties between the political actors and public opinion with respect to considering what are the risks in a global

  4. Global Climate Change: Threat Multiplier for AFRICOM?

    National Research Council Canada - National Science Library

    Yackle, Terri A

    2007-01-01

    .... Whatever the catalyst for this abrupt climate change, stability for Africa hinges upon mitigating the effects of global climate change to prevent future conflicts such as Darfur, and the instability...

  5. The globalization of public health, I: Threats and opportunities.

    Science.gov (United States)

    Yach, D; Bettcher, D

    1998-01-01

    The globalization of public health poses new threats to health but also holds important opportunities in the coming century. This commentary identifies the major threats and opportunities presented by the process of globalization and emphasizes the need for transnational public health approaches to take advantage of the positive aspects of global change and to minimize the negative ones. Transnational public health issues are areas of mutual concern for the foreign policies of all countries. These trends indicate a need for cross-national comparisons (e.g., in the areas of health financing and policy development) and for the development of a transnational research agenda in public health. PMID:9585736

  6. Redefining Maritime Security Threats in the Eastern Indian Ocean Region.

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Arjun [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    This occasional paper analyzes the general security issues and trends relating to maritime trafficking of radiological and nuclear material using small vessels, minor ports, and unchecked areas of coastline existing in the Eastern Indian Ocean Region today. By the Eastern Indian Ocean Region is meant the area starting from the tip of the Indian peninsula in the west to the Straits of Malacca in the east. It lays focus on the potential sources of nuclear or radiological material that may be trafficked here. It further undertakes a study of the terrorist groups active in the region as well as the multinational or national interdiction organizations that have been created to counter maritime threats. It also seeks to discern the various technologies for detecting materials of concern available in the area. Finally, it ascertains possible methods and technologies to improve the maritime security system in the region.

  7. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  8. Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  9. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  10. The tundra - a threat to global climate?

    International Nuclear Information System (INIS)

    Roejle Christensen, T.

    1997-01-01

    The tundra biome has an important direct influence on the global climate through its exchange of radiatively active 'greenhouse gases', carbon dioxide and methane. A number of suggestions have been raised as to how a changing climate may alter the natural state of this exchange causing significant feedback effects in a changing climate. This paper provides a brief discussion of three different issues relating to the interaction between tundra and climate. It is concluded that release of methane hydrates, permafrost degradation and major biome changes are processes which in the long term may have important effects on further development of the global climate. (au) 32 refs

  11. Zika Virus: An Emerging Global Health Threat

    Directory of Open Access Journals (Sweden)

    Rahul Mittal

    2017-12-01

    Full Text Available Zika virus (ZIKV is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV, and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease.

  12. Zika Virus: An Emerging Global Health Threat

    Science.gov (United States)

    Mittal, Rahul; Nguyen, Desiree; Debs, Luca H.; Patel, Amit P.; Liu, George; Jhaveri, Vasanti M.; S. Kay, Sae-In; Mittal, Jeenu; Bandstra, Emmalee S.; Younis, Ramzi T.; Chapagain, Prem; Jayaweera, Dushyantha T.; Liu, Xue Zhong

    2017-01-01

    Zika virus (ZIKV) is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS) and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV), and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease. PMID:29276699

  13. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  14. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  15. Chytridiomycosis: a global threat to amphibians.

    Science.gov (United States)

    Pereira, P L L; Torres, A M C; Soares, D F M; Hijosa-Valsero, M; Bécares, E

    2013-12-01

    Chytridiomycosis, which is caused by Batrachochytrium dendrobatidis, is an emerging infectious disease of amphibians. The disease is one of the main causes of the global decline in amphibians. The aetiological agent is ubiquitous, with worldwide distribution, and affects a large number of amphibian species in several biomes. In the last decade, scientific research has substantially increased knowledge of the aetiological agent and the associated infection. However, important epidemiological aspects of the environment-mediated interactions between the aetiological agent and the host are not yet clear. The objective of the present review is to describe chytridiomycosis with regard to the major features of the aetiological agent, the host and the environment.

  16. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  17. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    OpenAIRE

    Anatoliy Petrovich Sterkhov

    2015-01-01

    From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identi...

  18. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  19. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  20. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  1. The global threat of antimicrobial resistance: science for intervention

    Directory of Open Access Journals (Sweden)

    I. Roca

    2015-07-01

    Full Text Available In the last decade we have witnessed a dramatic increase in the proportion and absolute number of bacterial pathogens resistant to multiple antibacterial agents. Multidrug-resistant bacteria are currently considered as an emergent global disease and a major public health problem. The B-Debate meeting brought together renowned experts representing the main stakeholders (i.e. policy makers, public health authorities, regulatory agencies, pharmaceutical companies and the scientific community at large to review the global threat of antibiotic resistance and come up with a coordinated set of strategies to fight antimicrobial resistance in a multifaceted approach. We summarize the views of the B-Debate participants regarding the current situation of antimicrobial resistance in animals and the food chain, within the community and the healthcare setting as well as the role of the environment and the development of novel diagnostic and therapeutic strategies, providing expert recommendations to tackle the global threat of antimicrobial resistance.

  2. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  3. Identifying species threat hotspots from global supply chains.

    Science.gov (United States)

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  4. Discrete-Event Simulation with Agents for Modeling of Dynamic Asymmetric Threats in Maritime Security

    National Research Council Canada - National Science Library

    Ng, Chee W

    2007-01-01

    .... Discrete-event simulation (DES) was used to simulate a typical port-security, local, waterside-threat response model and to test the adaptive response of asymmetric threats in reaction to port-security procedures, while a multi-agent system (MAS...

  5. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  6. A Cyber Security Risk Assessment of Hospital Infrastructure including TLS/SSL and other Threats

    OpenAIRE

    Millar, Stuart

    2016-01-01

    Cyber threats traditionally target governments, financial institutions and businesses. However, of growing concern is the threat to healthcare organizations. This study conducts a cyber security risk assessment of a theoretical hospital environment, to include TLS/SSL, which is an encryption protocol for network communications, plus other physical, logical and human threats. Despite significant budgets in the UK for the NHS, the spend on cyber security appears worryingly low and many hospital...

  7. Security, Privacy, Threats and Risks in Cloud Computing ― A Vital Review

    OpenAIRE

    Goyal, Sumit

    2016-01-01

    Cloud computing is a multi million dollar business. As more and more enterprises are adopting cloud services for their businesses, threat of security has become a big concern for these enterprises and cloud users. This review describes the latest threats and risks associated with cloud computing and suggests techniques for better privacy and security of data in cloud environment. Threats and risks associated with cloud service models (SaaS, PaaS and IaaS) along with cloud deployment models (p...

  8. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    Science.gov (United States)

    2015-06-01

    to properly understand homeland security threats and their origin directly impacts our ability to prevent or mitigate these threats. “Homeland...of new cognitive approaches or policy tools to eliminate or mitigate homeland security threats, perhaps even at the level of their root causes. A key...to self-similar ‘fractal’ structure. The frequency spectrum of 1/f noise or flicker noise with a power-law spectrum S (f) ≈ f⁻β.” Bak, Tang, and

  9. External threats to economic security of enterprises of shipping business

    OpenAIRE

    Khaiminova, Y.

    2012-01-01

    Розглядається морське піратство як загроза економічній безпеці підприємств судноплавного бізнесу. Досліджуються економічні наслідки морського піратства. Розглядаються напрями боротьби с морським піратством.Marine piracy as threat economic security of enterprises of shipping business was examined in the article. The economic consequences of marine piracy were investigated. Directions of fight of s are examined by marine piracy were considered....

  10. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    Energy Technology Data Exchange (ETDEWEB)

    Scheffran, Juergen [Hamburg Univ. (Germany). Research Group Climate Change and Security

    2009-07-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  11. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    International Nuclear Information System (INIS)

    Scheffran, Juergen

    2009-01-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  12. Avian Influenza: a global threat needing a global solution

    Directory of Open Access Journals (Sweden)

    Koh GCH

    2008-11-01

    Full Text Available Abstract There have been three influenza pandemics since the 1900s, of which the 1919–1919 flu pandemic had the highest mortality rates. The influenza virus infects both humans and birds, and mutates using two mechanisms: antigenic drift and antigenic shift. Currently, the H5N1 avian flu virus is limited to outbreaks among poultry and persons in direct contact to infected poultry, but the mortality rate among infected humans is high. Avian influenza (AI is endemic in Asia as a result of unregulated poultry rearing in rural areas. Such birds often live in close proximity to humans and this increases the chance of genetic re-assortment between avian and human influenza viruses which may produce a mutant strain that is easily transmitted between humans. Once this happens, a global pandemic is likely. Unlike SARS, a person with influenza infection is contagious before the onset of case-defining symptoms which limits the effectiveness of case isolation as a control strategy. Researchers have shown that carefully orchestrated of public health measures could potentially limit the spread of an AI pandemic if implemented soon after the first cases appear. To successfully contain and control an AI pandemic, both national and global strategies are needed. National strategies include source surveillance and control, adequate stockpiles of anti-viral agents, timely production of flu vaccines and healthcare system readiness. Global strategies such as early integrated response, curbing the disease outbreak at source, utilization of global resources, continuing research and open communication are also critical.

  13. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    International Nuclear Information System (INIS)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante

    2017-01-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  14. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante, E-mail: barreto@unifor.br, E-mail: midredcb@hotmail.com [Universidade de Fortaleza (UNIFOR), CE (Brazil)

    2017-07-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  15. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  16. Illicit trafficking of nuclear and other radioactive material: the 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhaeusler, F.

    2005-01-01

    Full text: Illicit trafficking in nuclear and other radioactive material, which could lead to the creation of a nuclear device or a radiological dispersal device (RDD), has been a subject of concern for more than a decade now. This concern became even more pronounced after the September 11 th attacks in the United States, which demonstrated that modern day terrorists are willing and capable of inflicting mass casualties among civilian population in target countries in order to further their goals. The problem of illicit trafficking - intentional diversion and smuggling of nuclear fissile material and radioactive sources - has been closely watched and studied by several national institutions and international organizations. This resulted in the establishment of several nuclear smuggling databases, tracking illicit trafficking incidents. The number of such incidents for a given period varies widely between the different databases, reflecting the different sources of information used, the different geographical regions covered, as well as the different methodologies applied to data mining and data analysis. One major obstacle to assessing the actual security threat due to illicit trafficking is the inclusion of incidents in the analysis, which do not represent a security threat in the sense of being the pre-stage of a terrorist operation or a malevolent act. Such incidents mainly involve inadvertent movement of illegally disposed of radioactive sources in scrap metal or contaminated goods across international borders and discoveries of so called 'orphan' radiation sources. This paper analyzes the global data contained in the database on nuclear smuggling, theft and orphan radiation sources (DSTO) operated by the University of Salzburg, using special filters to discriminate between illicit trafficking incidents involving a criminal intent and those that do not. Thereby, the net security threat of illicit trafficking will be determined to help provide a realistic

  17. Threats to information security in a highly organized system of the “Smart city”

    Science.gov (United States)

    Kurcheeva, G. I.; Denisov, V. V.; Khvorostov, V. A.

    2017-01-01

    The article discusses issues related to comprehensive development and introduction of technologies such as “Smart city”. The urgency of accelerating the development of such highly organized systems, primarily in terms of reducing threats to information security, is emphasized in the paper. In accordance with authors’ analysis of the composition and structure of the threats to information security, “Accessibility”, “Integrity” and “Confidentiality” are highlighted. Violation of any of them leads to harmful effects on the information and other system resources. The protection of “Accessibility” mobilizes one third of all efforts to ensure information security that must be taken into account when allocating protective actions. The threats associated with failure of the supporting infrastructure are also significantly reduced. But the threats associated with failures of the system itself and failures of users are clearly increasing. There is a high level of society and production informatization, and the threats to information security are changing accordingly.

  18. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory

    2016-04-25

    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  19. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  20. Work security in a global economy.

    Science.gov (United States)

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  1. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the arti...

  2. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    interests. These threats were separate from traditional regional or state-centered threats, and included such diverse issues as terrorism, mass migrations ...organizations as examples of TOC; the Sinaloa Cartel, the Yakuza, the Camorra. This conceptual framework leads to the conclusion that the best way to deal

  3. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  4. Global health security and the International Health Regulations

    Directory of Open Access Journals (Sweden)

    Oliva Otavio

    2010-12-01

    Full Text Available Abstract Global nuclear proliferation, bioterrorism, and emerging infections have challenged national capacities to achieve and maintain global security. Over the last century, emerging infectious disease threats resulted in the development of the preliminary versions of the International Health Regulations (IHR of the World Health Organization (WHO. The current HR(2005 contain major differences compared to earlier versions, including: substantial shifts from containment at the border to containment at the source of the event; shifts from a rather small disease list (smallpox, plague, cholera, and yellow fever required to be reported, to all public health threats; and shifts from preset measures to tailored responses with more flexibility to deal with the local situations on the ground. The new IHR(2005 call for accountability. They also call for strengthened national capacity for surveillance and control; prevention, alert, and response to international public health emergencies beyond the traditional short list of required reporting; global partnership and collaboration; and human rights, obligations, accountability, and procedures of monitoring. Under these evolved regulations, as well as other measures, such as the Revolving Fund for vaccine procurement of the Pan American Health Organization (PAHO, global health security could be maintained in the response to urban yellow fever in Paraguay in 2008 and the influenza (H1N1 pandemic of 2009-2010.

  5. Weak and Failing States: Evolving Security Threats and U.S. Policy

    National Research Council Canada - National Science Library

    Wyler, Liana S

    2008-01-01

    .... national security goal since the end of the Cold War. Numerous U.S. government documents point to several threats emanating from states that are variously described as weak, fragile, vulnerable, failing, precarious, failed, in crisis, or collapsed...

  6. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  7. Securing Networks from Modern Threats using Next Generation Firewalls

    OpenAIRE

    Delgiusto, Valter

    2016-01-01

    Classic firewalls have long been unable to cope with modern threats that ordinary Internet users are exposed to. This thesis discusses their successors - the next-generation firewalls. The first part of the thesis describes modern threats and attacks. We described in detail the DoS and APT attacks, which are among the most frequent and which may cause most damage to the system under attack. Then we explained the theoretical basics of firewalls and described the functionalities of next gen...

  8. Organizational Security Threats Related to Portable Data Storage Devices: Qualitative Exploratory Inquiry

    Science.gov (United States)

    Cooper, Paul K.

    2017-01-01

    There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…

  9. Addressing the Cyber-security and Cyber-terrorism Threats [video

    OpenAIRE

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  10. A study of cyber security in hospitality industry- threats and countermeasures: case study in Reno, Nevada

    OpenAIRE

    Shabani, Neda

    2017-01-01

    The purpose of this study is to analyze cyber security and security practices of electronic information and network system, network threats, and techniques to prevent the cyber attacks in hotels. Helping the information technology directors and chief information officers (CIO) is the aim of this study to advance policy for security of electronic information in hotels and suggesting some techniques and tools to secure the computer networks. This research is completely qualitative while the cas...

  11. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...... in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also...

  12. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    Gareva, R.

    2007-01-01

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  13. Threats to Security Posed by ISIS in Syria: A Human Security Approach

    Directory of Open Access Journals (Sweden)

    Lee-Ann Louw

    2017-02-01

    Full Text Available The civil war in Syria coupled with the attacks by ISIS, has resulted in one of the largest humanitarian crises since World War II. Although international efforts have resulted in regaining control of important cities, these military approaches have escalated and inflamed the violence of which innocent civilians bear the consequences. The continuing violence and resulting threats or insecurities negatively affect the lives, freedom, dignity and development of the people to name but a few. For that reason, the aim is to explore the applicability of a human security approach to the conflict in Syria that focuses on, among other aspects, minimising violence, mitigating the effects of the conflict, protecting people, restoring peace and eliminating the grounds that resulted in the development of these conditions in the first place.

  14. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  15. Global climate change and international security

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  16. Economic security of the Russian Federation: current status, level and threats

    Directory of Open Access Journals (Sweden)

    V. V. Grigoryeva

    2017-01-01

    Full Text Available The problems of national and economic security maintenanceis aggravating in modern conditions of globalization and international competition related to controlof market channels, technological, information and natural resources.Today Russia is making all efforts to protect its position on the world stage and improve the lives of its citizens.Despite the worsening of the present economic, political and social differences in the world, the Russian Federation has its own national interests, which can be possible to fulfill only on the basis of sustainable development of the national economic security system.The latter traditionally determines the ability of the state economic system to maintain normal conditions for the national economy functioning and the population activity. The national economic securitystabilitycan be estimated only by the application of elaborate tools of the economic development indicators analysis and the threshold values examinationaimed at the determination of the quality characteristic of actual and the most successful model of the economic activity.The analysis of the current Russian economic situation showed the presence of some serious problems existing in the national economy. The economic security level of Russia, having a tendency to increase in the period of 1998-2013, has been sharply reduced to critical points since 2014. So, it is necessary to take some measures to restructure the system of economic security of the state. Based on the research it was identified the list of the most dangerous threats to the modern Russian economy, which includes: low level of the country industrial production; the economy dependence on goods import and raw materials export; low living standards of the population; the rapid growth of the shadow economy and corruption; the lack of civil science and innovationdevelopment. The main strategic directions for economic security levelincrease in Russia today and in the future are aimed at

  17. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  18. Quantifying Security Threats and Their Potential Impacts: A Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2010-01-01

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this infrastructure by means of an e-commerce application.

  19. Ethnicity: A threat to Nigeria's security and development | Nweke ...

    African Journals Online (AJOL)

    The negative implications of ethnicity to national security and development are enormous. This paper interrogates ethnicity as the major hindrance to Nigeria.s security and development. The paper unveils the role of the constitution of the Federal Republic of Nigeria in strengthening ethnicity and calls for a constitutional ...

  20. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    Science.gov (United States)

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  1. Southwest Hispanic Community -- The Absence of Homeland Security Threats

    Science.gov (United States)

    2012-12-01

    or insurgent threats unique to that community are revealed. A mixed method research methodology using components of “ ethnography ,” along with other... qualitative analysis methods, will be utilized. Ethnography includes both quantitative and qualitative methods to determine the sociocultural contexts...1 B. RESEARCH QUESTIONS .............................................................................4

  2. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  3. Secure in insecurity: The case of threat perception/acceptance in the Philippines

    Directory of Open Access Journals (Sweden)

    Amador IV Peleo

    2015-12-01

    Full Text Available Current theoretical and policy-based explanations of security in the Philippines have portrayed “politics” and “security” as distinct and separate fields. However, the recent “2011–2016 National Security Policy: Securing the Gains of Democracy”, has conflated “security” and “politics”, as may be observed in its two national security goals “to promote internal socio-political stability” and “to exercise full sovereignty over its territory”. Although likely derived from administrative expediency, the composite policy definition is also likely to result in the conceptualisation of political goals that are only partially attainable and of a security environment that will remain “unsecured”. As this appears to be a norm of governance in the Philippines, this paper examines the possibility that national security policy-making is likely more concerned with the survival of the regime during which the policy was created rather than with the long-term stabilisation of the entire state. Several theories may be useful in accounting for this behaviour; namely, small states conflict theory, securitisation theory and threat normalisation theory. This paper is intended to show that the definition of threat corresponds to threat-acceptance and may likely lead to threat-toleration than to threat-resolution.

  4. Antimicrobial resistance: A global emerging threat to public health systems.

    Science.gov (United States)

    Ferri, Maurizio; Ranucci, Elena; Romagnoli, Paola; Giaccone, Valerio

    2017-09-02

    Antimicrobial resistance (AMR) became in the last two decades a global threat to public health systems in the world. Since the antibiotic era, with the discovery of the first antibiotics that provided consistent health benefits to human medicine, the misuse and abuse of antimicrobials in veterinary and human medicine have accelerated the growing worldwide phenomenon of AMR. This article presents an extensive overview of the epidemiology of AMR, with a focus on the link between food producing-animals and humans and on the legal framework and policies currently implemented at the EU level and globally. The ways of responding to the AMR challenges foresee an array of measures that include: designing more effective preventive measures at farm level to reduce the use of antimicrobials; development of novel antimicrobials; strengthening of AMR surveillance system in animal and human populations; better knowledge of the ecology of resistant bacteria and resistant genes; increased awareness of stakeholders on the prudent use of antibiotics in animal productions and clinical arena; and the public health and environmental consequences of AMR. Based on the global nature of AMR and considering that bacterial resistance does not recognize barriers and can spread to people and the environment, the article ends with specific recommendations structured around a holistic approach and targeted to different stakeholders.

  5. Chinese Perceptions of Traditional and Nontraditional Security Threats

    Science.gov (United States)

    2007-03-01

    will not be challenged.) For example, during a speech in Singapore in June 2005, the U.S. Secretary of Defense Donald Rumsfeld expressed the belief ...right answer. The individual is paramount and is in control of events around him. Easterners, on the other hand, products of the teachings of Taoism ...seen as American scholars who refute the China threat theory. Their belief in power politics supports the perception that America’s goal is hegemony

  6. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  7. Global Nuclear Safety and Security Network

    International Nuclear Information System (INIS)

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  8. Security threats and their mitigation in infrastructure as a service

    Directory of Open Access Journals (Sweden)

    Bineet Kumar Joshi

    2016-09-01

    Full Text Available Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS is the basic requirement for all delivery models. Infrastructure as a service delivers all possible it resources (Network Components, Operating System, etc. as a service to users. From both users and providers point of view: integrity, privacy and other security issues in IaaS are the important concern. In this paper we studied in detail about the different types of security related issues in IaaS layer and methods to resolve them to maximize the performance and to maintain the highest level of security in IaaS.

  9. Using a Prediction Model to Manage Cyber Security Threats

    Directory of Open Access Journals (Sweden)

    Venkatesh Jaganathan

    2015-01-01

    Full Text Available Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  10. Using a Prediction Model to Manage Cyber Security Threats.

    Science.gov (United States)

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  11. Using a Prediction Model to Manage Cyber Security Threats

    Science.gov (United States)

    Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024

  12. Risks and threats of tax state security and methods of their neutralization

    Directory of Open Access Journals (Sweden)

    Y.V. Lebedzevych

    2016-12-01

    Full Text Available The article substantiates the relevance of the study to ensure security of the state tax. Scientists studied different approaches to defining the essence of the concept of "security tax" on the key features that would satisfy the interests of all subjects of tax relations and the necessity of legal consolidation of this concept. Analyzed the economic, social and legal nature of the existence of the security tax, identified key indicators of fiscal security of Ukraine. To determine the effectiveness of the tax administration in the interests of the tax security highlights the main threats, tax security risks caused by external and internal factors, and propose measures for their elimination and prevent the possibility of their occurrence. The stages of tax risk management with effective building security tax, designed structurally-logic of the tax risk management security.

  13. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    Science.gov (United States)

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  14. The threat nets approach to information system security risk analysis

    NARCIS (Netherlands)

    Mirembe, Drake

    2015-01-01

    The growing demand for healthcare services is motivating hospitals to strengthen outpatient case management using information systems in order to serve more patients using the available resources. Though the use of information systems in outpatient case management raises patient data security

  15. Study on Cyber Security and Threat Evaluation in SCADA Systems

    Science.gov (United States)

    2012-03-01

    125 4.3.2 ISO 27001 , 27002 ............................................................................................ 125 4.3.3...system environments. 4.3.2 ISO 27001 , 27002 The ISO 27001 and 27002 standards ensure proper security processes and technology are implemented in...asset owner, integrators, and vendors. Now it is an independent set of 3 standards which resemble the ISO /IEC 27001 and 27002 standards. ISO /IEC

  16. Security in transnational interoperable PPDR communications: Threats and requirements

    NARCIS (Netherlands)

    Ferrús, R.; Sallent, O.; Verkoelen, C.; Fransen, F.; Saijonmaa, J.; Olivieri, C.; Duits, M.; Galin, A.; Pangallo, F.; Modi, D.P.

    2015-01-01

    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery

  17. Threats and trusted countermeasures using a security protocol in the ...

    African Journals Online (AJOL)

    Mobile Agent computing is a paradigm of distributed computing, that has generated considerable excitement in the research community. Despite that, it has not been translated into a significant number of real-world applications due to a new dimensionality of security problem it brings along with it. In this paper ...

  18. State surveillance as a threat to personal security of individuals

    Directory of Open Access Journals (Sweden)

    Sławomir Czapnik

    2015-12-01

    Full Text Available Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.

  19. INFORMATION THREATS IN A GLOBALIZED WORLD: ECONOMICS, POLITICS, SOCIETY (EXPERIENCE OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Anatoliy Holovka

    2016-11-01

    Full Text Available The scientific article deals with both integral vision of the contemporary informative risks in the globalized world and their classification. The essence of the informative security is exposed, which is one of main factors of steady development of the modern informative society. In consideration of the foreign practice, the experience of Ukraine is also analyzed in counteraction to the contemporary informative threats. The effective policy of safety and counteraction to the informative threats is one of the basic constituents of the state national safety system and at the same time testifies to the correct character of connections between the public organs and the society. Under the conditions of unrestrained progress of information technologies and general informatization in all sectors of people’s life (politics, economy, defense, energy etc., providing of control and defense of informative space of the country becomes much more difficult task. Modern Ukrainian realities certify convincingly, that Ukraine is in an extremely difficult political situation that influences all spheres of Ukrainians’ life. The key reason of such situation is a military-informative aggression against Ukraine from Russia, which is the fact of waging a «hybrid war». As it is known, this type of war combines the application of both classic soldiery instruments (military technique, firearms, regular troops and methods of informative influence (cyber-attack, informative diversions, aggressive propaganda, impact on public opinion. This factor encourages such research. The object of the study is the phenomenon of information risks in the modern world. Subject of research – is the impact of modern information threats to the state and society, namely the economic, political and social spheres. For a holistic analysis of the subject of research was used appropriate methodology – systematic approach, method of comparative analysis, general scientific methods

  20. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  1. Cyber Security Insider Threats :: Government’s Role in Protecting India’s Critical Infrastructure Sectors

    OpenAIRE

    Vohra, Pulkit

    2014-01-01

    This research identifies the problem of insider threats in the critical infrastructure sectors of India. It is structured to answer the research question: "Why insider threats should be the primary concern for Indian government to protect its critical infrastructure sectors.” It defines the critical infrastructure sectors and portrays the cyber security scenario of India. Also, through the research study, it identifies the lack of awareness and non-seriousness of employees in the critical sec...

  2. Threats to the National Economic Security of Ukraine at the Current Stage

    Directory of Open Access Journals (Sweden)

    Kuharskaya Natalia A.

    2017-04-01

    Full Text Available It is substantiated that the most important factor of the national economic security of the country is to match both the economic and the industrial relations systems to the economic development of the country. The article provides detailed consideration of the particularities of occurrence of threats to the national economic security of Ukraine by allocating seven major structural blocks, in which threats were not overcome during the years of independence, and some of them even became intensified: 1 institutional sphere; 2 social sphere; 3 financial sphere; 4 shadowing and corruptness of economy; 5 a high level of physical wear and tear of fixed assets and of the production infrastructure; 6 de-industrialization of economy; 7 innovative development. The main components of the national economic security, which would assist in overcoming these threats, have been developed.

  3. Global Threat Reduction Initiative International Partners' Conference. Summary of the proceedings and findings of the conference

    International Nuclear Information System (INIS)

    2004-01-01

    The Global Threat Reduction Initiative (GTRI) International Partners' Conference took place in Vienna, Austria, from September 18-19, 2004. More than 590 representatives from 100 International Atomic Energy Agency (IAEA) Member States attended the GTRI International Partners' Conference on September 18-19, 2004, in Vienna, Austria. Representatives from ten non-governmental and international organizations were also present during the conference. The Governments of the United States and the Russian Federation co-sponsored the International Partners Conference, with support from the International Atomic Energy Agency. The purpose of the International Partners' Conference was to build and broaden international support for efforts by national authorities to identify, secure, recover, and/or facilitate the disposition of high-risk nuclear and radioactive materials that pose a potential threat to the international community. One of the significant outcomes of the International Partners Conference was reaching agreement on the Findings of the Conference (enclosed in this document) by participating Member States that outlined a broadly shared opinion of participating Member States on efforts to reduce the potential threat posed by vulnerable, unsecured nuclear and other radioactive material. It is hoped that this document can be used as a framework to consolidate, expand, and accelerate domestic, regional, and IAEA programs that address unsecured vulnerable nuclear and radioactive materials, as deemed necessary by Member States. As a first step, participating members states urged the international community to note additional opportunities to further build support for activities related to GTRI

  4. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along

  5. MINIMIZATION OF IMPACTS PERTAINING TO EXTERNAL AND INTERNAL ENERGY SECURITY THREATS OF THERMAL POWER PLANTS

    Directory of Open Access Journals (Sweden)

    V. N. Nagornov

    2012-01-01

    Full Text Available The paper contains a classification of internal and external threats for thermal power plants and recommendations on minimization of these risks. A set of concrete measures aimed at ensuring TPP energy security has been presented in the paper. The system comprises preventive measures aimed at reducing the possibilities of emergence and implementation of internal and external threats. The system also presupposes to decrease susceptibility of fuel- and energy supply systems to the threats, and application of liquidation measures that ensure elimination of emergency situation consequences and restoration of the conditions concerning fuel- and power supply to consumers.

  6. Significance of the institute of appeals under the conditions of increasing threats to national security

    Directory of Open Access Journals (Sweden)

    A. V. Kapulovskyi

    2015-03-01

    Full Text Available The article deals with the regulatory and scientific foundation for the development of the institute of citizens’ treatments in terms of obvious internal and external threats to national security. An attempt to construct an applicable model of management of public processes in terms of threats to national security, in which public opinion plays a key value. The fact that a successful resolution of problem of public participation in the preparation and acceptance of political decisions requires not only the presence of the constitutionally enshrined rights and duties and political institutions formed democratically, but also a variety of forms and ways of influencing in the activities of public authorities. At the same time, in a not declared, the so-called »hybrid» war, in which warfare are conducted locally - in some parts of the state and all other public and private institutions function in usual mode, tracking of possible threats to national security and factors that give rise to such threats should be carried out by means of both cleanly military, and civil means and methods. Thus, one of the most effective civil means of tracking such threats are the reception of citizens’ treatments, their processing and the adoption of appropriate response measures, in my opinion. Keywords: national security, public safety, human rights, public authorities, public interest.

  7. THE NORTHERN BORDER A FORGOTTEN NATIONAL SECURITY THREAT

    Science.gov (United States)

    2017-04-06

    Deputy Director of the DEA, Jack Riley.70 However, they have been seen recently expanding their physical and permanent presence in Canada. In 2015...balanced approach. Notes 1 Jane A. Bullock, George D. Haddow, and Damon P. Coppola, Homeland Security: The Essentials (Waltham, MA : Butterworth -Heinemann...Michoacán Family (La Familia Michoacána or LFM), Knights Templar (Los Caballeros Templarios or LCT), and Los Zetas.” Jack Riley, Acting Deputy

  8. Increasing homogeneity in global food supplies and the implications for food security

    NARCIS (Netherlands)

    Khoury, C.K.; Bjorkman, A.D.; Dempewolf, H.; Ramirez-Villegas, J.; Guarino, L.; Jarvis, A.; Rieseberg, L.H.; Struik, P.C.

    2014-01-01

    The narrowing of diversity in crop species contributing to the world’s food supplies has been considered a potential threat to food security. However, changes in this diversity have not been quantified globally. We assess trends over the past 50 y in the richness, abundance, and composition of crop

  9. Global demand for gold is another threat for tropical forests

    International Nuclear Information System (INIS)

    Alvarez-Berríos, Nora L; Mitchell Aide, T

    2015-01-01

    The current global gold rush, driven by increasing consumption in developing countries and uncertainty in financial markets, is an increasing threat for tropical ecosystems. Gold mining causes significant alteration to the environment, yet mining is often overlooked in deforestation analyses because it occupies relatively small areas. As a result, we lack a comprehensive assessment of the spatial extent of gold mining impacts on tropical forests. In this study, we provide a regional assessment of gold mining deforestation in the tropical moist forest biome of South America. Specifically, we analyzed the patterns of forest change in gold mining sites between 2001 and 2013, and evaluated the proximity of gold mining deforestation to protected areas (PAs). The forest cover maps were produced using the Land Mapper web application and images from the MODIS satellite MOD13Q1 vegetation indices 250 m product. Annual maps of forest cover were used to model the incremental change in forest in ∼1600 potential gold mining sites between 2001–2006 and 2007–2013. Approximately 1680 km 2 of tropical moist forest was lost in these mining sites between 2001 and 2013. Deforestation was significantly higher during the 2007–2013 period, and this was associated with the increase in global demand for gold after the international financial crisis. More than 90% of the deforestation occurred in four major hotspots: Guianan moist forest ecoregion (41%), Southwest Amazon moist forest ecoregion (28%), Tapajós–Xingú moist forest ecoregion (11%), and Magdalena Valley montane forest and Magdalena–Urabá moist forest ecoregions (9%). In addition, some of the more active zones of gold mining deforestation occurred inside or within 10 km of ∼32 PAs. There is an urgent need to understand the ecological and social impacts of gold mining because it is an important cause of deforestation in the most remote forests in South America, and the impacts, particularly in aquatic systems

  10. Global patterns in threats to vertebrates by biological invasions

    Science.gov (United States)

    Bellard, C.; Genovesi, P.; Jeschke, J. M.

    2016-01-01

    Biological invasions as drivers of biodiversity loss have recently been challenged. Fundamentally, we must know where species that are threatened by invasive alien species (IAS) live, and the degree to which they are threatened. We report the first study linking 1372 vertebrates threatened by more than 200 IAS from the completely revised Global Invasive Species Database. New maps of the vulnerability of threatened vertebrates to IAS permit assessments of whether IAS have a major influence on biodiversity, and if so, which taxonomic groups are threatened and where they are threatened. We found that centres of IAS-threatened vertebrates are concentrated in the Americas, India, Indonesia, Australia and New Zealand. The areas in which IAS-threatened species are located do not fully match the current hotspots of invasions, or the current hotspots of threatened species. The relative importance of biological invasions as drivers of biodiversity loss clearly varies across regions and taxa, and changes over time, with mammals from India, Indonesia, Australia and Europe are increasingly being threatened by IAS. The chytrid fungus primarily threatens amphibians, whereas invasive mammals primarily threaten other vertebrates. The differences in IAS threats between regions and taxa can help efficiently target IAS, which is essential for achieving the Strategic Plan 2020 of the Convention on Biological Diversity. PMID:26817767

  11. A study of insider threat in nuclear security analysis using game theoretic modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Yim, Man-Sung; Schneider, Erich

    2017-01-01

    Highlights: • Implications of an insider threat in nuclear security were quantitatively analyzed. • The analysis was based on of a hypothetical nuclear facility and using game theoretic approach. • Through a sensitivity analysis, vulnerable paths and important parameters were identified. • The methodology can be utilized to prioritize the implementation of PPS improvements in a facility. - Abstract: An Insider poses a greater threat to the security system of a nuclear power plant (NPP) because of their ability to take advantage of their access rights and knowledge of a facility, to bypass dedicated security measures. If an insider colludes with an external terrorist group, this poses a key threat to the safety-security interface. However, despite the importance of the insider threat, few studies have been conducted to quantitatively analyze an insider threat. This research examines the quantitative framework for investigating the implications of insider threat, taking a novel approach. Conventional tools assessing the security threats to nuclear facilities focus on a limited number of attack pathways. These are defined by the modeler and are based on simple probabilistic calculations. They do not capture the adversary’s intentions nor do they account for their response and adaptation to defensive investments. As an alternative way of performing physical protection analysis, this research explores the use of game theoretic modeling of Physical Protection Systems (PPS) analysis by incorporating the implications of an insider threat, to address the issues of intentionality and interactions. The game theoretic approach has the advantage of modeling an intelligent adversary and insider who has an intention to do harm and complete knowledge of the facility. Through a quantitative assessment and sensitivity analysis, vulnerable but important parameters in this model were identified. This made it possible to determine which insider threat is more important. The

  12. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    Energy Technology Data Exchange (ETDEWEB)

    Pederson, Ann C. [ORNL; Snow, Catherine L. [ORNL; Townsend, Jeremy [ORNL; Shannon, Michael [ORNL

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  13. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  14. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  15. Cyber security information exchange to gain insight into the effects of cyber threats and incidents

    NARCIS (Netherlands)

    Fransen, F.; Smulders, A.C.M.; Kerkdijk, H.

    2015-01-01

    The last couple of years we have seen an increase in interests and initiatives in establishing threat intelligence sharing communities, and on the development of standards and platforms for automated cyber security information sharing. These initiatives are focused on helping organisations to

  16. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  17. The Global Threat Reduction Initiative's Return of Highly Enriched Uranium from Chile

    Energy Technology Data Exchange (ETDEWEB)

    Messick, C.E.; Dickerson, S.L.; Greenberg, R.F. Jr. [U.S. Department of Energy, National Nuclear Security Administration, Washington D.C. (United States); Andes, T.C. [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2011-07-01

    In March 2010, the U.S. National Nuclear Security Administration's Office of Global Threat Reduction (GTRI), in collaboration with the Chilean Nuclear Energy Commission (CCHEN), completed a shipment of 18.2 kilograms of non-U.S.-origin highly enriched uranium (HEU) to the United States. The HEU was in the form of 71 aluminium-clad material test reactor (MTR) fuel elements and was the first GTRI Gap Program shipment that included non-U.S. origin irradiated nuclear fuel. Although shipments of research reactor fuels are not unique, this shipment served as a cornerstone to the first Presidential Nuclear Security Summit held in Washington, D.C., in April 2010. Carrying out the shipment became critical when a severe earthquake struck Chile just one day before the shipment was to occur. As the fuel had already been packaged in casks and the ocean vessels were nearing the port, U.S. and Chilean officials decided that it was most imperative that the shipment continue as planned. After careful analysis of the situation, inspection of the transportation packages, roadways, and port services, the shipment team was able to make the shipment occur in a safe and secure manner. This paper describes the loading activities at both the RECH-1 and RECH-2 reactors as well as the transportation of the loaded casks to the port of departure. (author)

  18. APPROACHES TO GLOBAL SECURITY. ACTORS, MANIFESTATIONS AND TENDENCIES

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2013-01-01

    Full Text Available Nowadays, the world seems to be in a transition from the current system founded on the liberal social, economic and political model to a more diverse and heterogeneous model in which the determinant role is played by a number of state and non-state actors. The step from the Western system of cultural, political and predominant economic values to a more diverse and heterogeneous system makes the actors involved defend not only their visions, but also promote their own interests. The differences between visions gain relevance and clarity because the countries supporting them obtain increased power, and that is more than obvious. All this leads to a symmetric allocation of different means, which generates uncertainties and diminishes unilateral actions This transition process impacts global security especially through the asymmetric, unconventional and hybrid risks and threats manifesting worldwide.

  19. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  20. Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies

    Directory of Open Access Journals (Sweden)

    Paulina Silva

    2016-12-01

    Full Text Available Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC; while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals.

  1. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

    Directory of Open Access Journals (Sweden)

    Zehui Wu

    2017-01-01

    Full Text Available SDN-based controller, which is responsible for the configuration and management of the network, is the core of Software-Defined Networks. Current methods, which focus on the secure mechanism, use qualitative analysis to estimate the security of controllers, leading to inaccurate results frequently. In this paper, we employ a quantitative approach to overcome the above shortage. Under the analysis of the controller threat model we give the formal model results of the APIs, the protocol interfaces, and the data items of controller and further provide our Threat/Effort quantitative calculation model. With the help of Threat/Effort model, we are able to compare not only the security of different versions of the same kind controller but also different kinds of controllers and provide a basis for controller selection and secure development. We evaluated our approach in four widely used SDN-based controllers which are POX, OpenDaylight, Floodlight, and Ryu. The test, which shows the similarity outcomes with the traditional qualitative analysis, demonstrates that with our approach we are able to get the specific security values of different controllers and presents more accurate results.

  2. REGIONAL SECURITY IN THE HORN OF AFRICA: CONFLICTS, AGENDAS AND THREATS

    Directory of Open Access Journals (Sweden)

    Nilton César Fernandes Cardoso

    2017-01-01

    Full Text Available This paper aims at analyzing security dynamics in the Horn of Africa in the post-independence period, identifying the actors, agendas and threats. For this purpose, it is subdivided into three parts. The first one analyzes the security dynamics taking place in the Horn of Africa during the Cold War period, focusing on the regional rivalries and on the penetration of extraregional actors. In the second part, there is a discussion regarding the transformations which occurred in region in the immediate post-Cold War period, focusing both on the unities’ (states internal security dynamics and on the regional ones. The third and last section aims at identifying “new” threats and regional and international responses, as well as the emerging strategic importance of the region to traditional superpowers in the post-9/11 period, marked by the process of securitization.

  3. Identifying the Species Threat Hotspots from Global Supply Chains

    OpenAIRE

    Moran, Daniel; Kanemoto, Keiichiro

    2016-01-01

    Identifying species threat hotspots has been a successful approach for setting conservation priorities. One major challenge in conservation is that in many hotspots export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprin...

  4. GLOBAL DIMENSIONS OF ECOLOGICAL SECURITY IN DOMINANTA STRATEGIC PARTNERSHIP

    Directory of Open Access Journals (Sweden)

    А. Bokhan

    2014-06-01

    Full Text Available In the articles considered pressing questions of development of strategic partnership are taking into account priorities of ecological security that appears qualificatory and integrating for the countries of the world at the terms of display of calls and threats of globalization. The expediency of forming a joint environmental responsibility and market pragmatism in foreign policy of the countries of the world. Defined trends of strengthening ecological conflicts in the regions of the world because of the acute shortage of natural and energy resources, disproportions in distribution and irrational consumption. It is proved that the capacity for sustained leadership will be the countries who will testify capacity up to new forms of strategic partnership on the principles of ecological security, economic decisions considering interests and competitive aspirations for joint protection of the future of mankind. It is vitally necessary given the complexity of the influence of the parameters of the international system of ecological security in the economic, political and social transformation in society.

  5. Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal From Security Threats

    OpenAIRE

    Ferrando, Roman; Stacey, Paul

    2017-01-01

    Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world. With this rapidly expanding pervasive deployment of IoT devices, and supporting infrastructure, we are fast approaching the point where the problem of IoT based cyber-security attacks is a serious threat to industrial operations, business activity and social interactions that leverage IoT technologies. The number of threats and successful attacks against connected systems using IoT devices an...

  6. US Centers for Disease Control and Prevention and Its Partners' Contributions to Global Health Security.

    Science.gov (United States)

    Tappero, Jordan W; Cassell, Cynthia H; Bunnell, Rebecca E; Angulo, Frederick J; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca

    2017-12-01

    To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world.

  7. Global Security, Medical Isotopes, and Nuclear Science

    Science.gov (United States)

    Ahle, Larry

    2007-10-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

  8. Global Security, Medical Isotopes, and Nuclear Science

    International Nuclear Information System (INIS)

    Ahle, Larry

    2007-01-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R and D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities

  9. Transactional costs of the interaction between business and government as a threat to the economic security of the state

    Directory of Open Access Journals (Sweden)

    Evmenov Aleksandr

    2018-01-01

    Full Text Available The article considers the costs of the interaction between the state and business as a threat to the development of the economy of the Russian Federation from the point of view of ensuring economic security. The authors identified significant obstacles both from the business and from the government side, which pose a threat to economic security. The study is of interest for the further development of a system of providing the economic security of the Russian Federation.

  10. Predicting malicious behavior tools and techniques for ensuring global security

    CERN Document Server

    Jackson, Gary M

    2012-01-01

    A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates ava

  11. Ebola virus – new threat to global health

    Directory of Open Access Journals (Sweden)

    Rina K. Kusumaratna

    2015-12-01

        The Ebola virus outbreak constitutes a serious warning that epidemics may occur anywhere and places every afflicted nation at risk. Therefore it is essential to institute measures to stop its spread and its future threat, which is a moral obligation of members of the health profession, whether academicians, researchers, or health ministry officials.

  12. NON-TRADITIONAL SECURITY THREATS IN CENTRAL ASIA REGIONAL PERSPECTIVE OF COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ramakant Trivedi

    2011-01-01

    Full Text Available Abstract: The article explores the roots and current state of religious extremism in Central Asia, as well as investigates its connections with the global salafi movement. It evaluates attempts of the regional players and external stakeholders to address the existing threats, and provides recommendations for their advancement.

  13. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  14. Carbon plants nutrition and global food security

    Science.gov (United States)

    Mariani, Luigi

    2017-02-01

    To evaluate the effects of carbon nutrition on agricultural productivity, a physiological-process-based crop simulation model, driven by the 1961-1990 monthly climate data from global FAO dataset, was developed and applied to four crops (wheat, maize, rice and soybean -WMRS) which account for 64% of the global caloric consumption of humans. Five different temperatures and CO2 scenarios (current; glacial; pre-industrial; future_1 with 560 ppmv for CO2 and +2 °C for temperature; and future_2 with 800 ppmv for CO2 and +4 °C) were investigated. The relative values of WMRS global productions for past and future scenarios were, respectively, 49% of the present-day scenario for glacial, 82% for pre-industrial, 115% for future_1 and 124% for future_2. A sensitive growth of productivity of future scenarios (respectively to 117% and 134%) was observed if the northward shift of crops was allowed, and a strong increase was obtained without water limitation (from 151% to 157% for the five scenarios) and without biotic and abiotic stresses (from 30% to 40% for WMRS subject to the current scenario). Furthermore since the beginning of the Green Revolution (roughly happened between the '30s and the '50s of the twentieth century) production losses due to sub-optimal levels of CO2 and to biotic and abiotic stresses have been masked by the strong technological innovation trend still ongoing, which, in the last century, led to a strong increase in the global crop production (+400%-600%). These results show the crucial relevance of the future choices of research and development in agriculture (genetics, land reclamation, irrigation, plant protection, and so on) to ensure global food security.

  15. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  16. Cyber security threats in the power sector: Need for a domain specific regulatory framework in India

    International Nuclear Information System (INIS)

    Ananda Kumar, V.; Pandey, Krishan K.; Punia, Devendra Kumar

    2014-01-01

    India is poised to spend over USD 5.8 billion as part of the National Smart Grid Mission aimed to alleviate India's ailing power sector as part of its 12th Five year plan (2012–2017). The federal government sponsored Restructured Accelerated Power Development and Reforms Program (R-APDRP) is also focused on building ICT capability in the state electricity boards. Presently however, there is no power sector specific cyber security mandates or policies in India. The Stuxnet, Shamoon and Anonymous incidents have shown that cyber attacks can cause significant damage and pose a risk to National Critical Infrastructure. A lack of security planning as part of designing the Smart grids can potentially leave gaping holes in the country's power sector stability. The paper highlights key cyber security threats across the entire power sector value chain—from generation, to transmission and distribution. It is aimed at building the case for power sector specific cyber security regulations based on the experience of regulators in other critical infrastructure sectors like Banking and Telecom in India and power sector regulations internationally. - Highlights: • Cyber security in power sector is key to protecting national critical infrastructure. • Poor cyber security planning would impact the power sector in India. • A laissez-faire approach to cyber security in power sector may not yield results. • There is a need for power sector specific cyber security regulations

  17. Computer Security: Computer security threats, vulnerabilities and attacks (3/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

  18. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    Science.gov (United States)

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  19. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  20. Information security threats in web-portals on the open journal systems platform

    Directory of Open Access Journals (Sweden)

    Anton A. Abramov

    2018-05-01

    Full Text Available This article addresses the problem of security threats while working with web portals built on the Open Journal Systems platform. The Open Journal Systems (OJS platform was originally developed as part of the Public Knowledge Project and it is one of the most popular open-source platforms for web journals today. Based on the data available in the Public Knowledge Project, there were more than 10,000 active journals using the open journal systems platform by the end of 2016. A migration of a journal to such advanced and complex platform helps to handle the entire workflow over a single web portal. Therefore it is an important move and only peer-reviewed journals that are part of Russian and Worldwide citation systems go for it. At the same time the problem of keeping privacy for a manuscript before it is published is very important for these journals and for authors who submit it to the journal. The paper describes the most common threats for the web portals on the OJS platform as well as a particular model of the security threats, and suggests the measures that could help to neutralize these threats.

  1. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  2. FRAUDULENT TRANSACTIONS WITH BANK PLASTIC CARDS AS A THREAT TO ECONOMIC SECURITY IN THE BANKING SPHERE

    Directory of Open Access Journals (Sweden)

    Elena V. Ilinich

    2013-01-01

    Full Text Available Banks active development of cashless payments by plastic cards, the growing number of fraudulent transactions and the damage they cause, create new challenges and threats to economic security in the sphere of banking activity. The latest information technologies are active used by organized crime groups, the methods of committing crimes are changing and are not yet adequately reflected by banks and law enforcement agencies.

  3. Do New Mobile Devices in Enterprises Pose A Serious Security Threat?

    OpenAIRE

    Ali A Altalbe

    2013-01-01

    The purpose of this paper is to introduce a research proposal designed to explore the network securityissues concerning mobile devices protection. Many threats exist and they harm not only computers but handheld devices as well. The mobility of phones and their excessive use make them more vulnerable. The findings suggest a list of protections that can provide high level of security for new mobile devices.

  4. Negotiable Collateral Damage: Civil Liberties Versus National Security in Times of Threat

    Science.gov (United States)

    2011-06-01

    concept of defense. In his influential work, ―A Theory of Human Motivation,‖ published in 1943, Maslow theorized five hierarchical types of needs...rarely changes due to threats to national security; thus, this study does not reference this issue. 7 A. H. Maslow , "A Theory of Human Motivation...Americans living in the Pacific region of the United States. 52 Abraham Lincoln and Thomas Harry

  5. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    Science.gov (United States)

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  6. G-8 leaders tackle global energy security

    International Nuclear Information System (INIS)

    Quevenco, R.

    2006-01-01

    Leaders of the Group of 8 countries backed the IAEA's work at their annual summit held 15-17 July 2006 in St. Petersburg, Russia. A concluding summary statement endorsed IAEA programmes and initiatives in areas of nuclear safety, security, and safeguards. The G8 nations adopted a St. Petersburg Plan of Action to increase transparency, predictability and stability of the global energy markets, improve the investment climate in the energy sector, promote energy efficiency and energy saving, diversify energy mix, ensure physical safety of critical energy infrastructure, reduce energy poverty and address climate change and sustainable development. In a statement on global energy security, the G8 said countries who have or are considering plans for nuclear energy believe it will contribute to global energy security while reducing air pollution and addressing climate change. The G8 said it acknowledged the efforts made in development by the Generation IV International Forum (GIF) and the IAEA's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). GIF and INPRO both bring together countries to develop next generation nuclear energy systems, including small reactors, very high temperature reactors and supercritical water-cooled reactors. The G8 reaffirmed its full commitment to all three pillars of the NPT and called on all States to comply with their NPT obligations, including IAEA safeguards as well as developing effective measures aimed at preventing trafficking in nuclear equipment, technology and materials. The G8 is seeking universal adherence to IAEA comprehensive safeguards agreements and is actively engaged in efforts to make comprehensive safeguards agreements together with an Additional Protocol the universally accepted verification standard. The G8 noted that an expansion of the peaceful use of nuclear energy must be carried forward in a manner consistent with nuclear non-proliferation commitments and standards. It discussed concrete

  7. Climate change impacts on global food security.

    Science.gov (United States)

    Wheeler, Tim; von Braun, Joachim

    2013-08-02

    Climate change could potentially interrupt progress toward a world without hunger. A robust and coherent global pattern is discernible of the impacts of climate change on crop productivity that could have consequences for food availability. The stability of whole food systems may be at risk under climate change because of short-term variability in supply. However, the potential impact is less clear at regional scales, but it is likely that climate variability and change will exacerbate food insecurity in areas currently vulnerable to hunger and undernutrition. Likewise, it can be anticipated that food access and utilization will be affected indirectly via collateral effects on household and individual incomes, and food utilization could be impaired by loss of access to drinking water and damage to health. The evidence supports the need for considerable investment in adaptation and mitigation actions toward a "climate-smart food system" that is more resilient to climate change influences on food security.

  8. WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES

    OpenAIRE

    Ranjit Panigrahi; Kalpana Sharma; M.K. Ghose

    2013-01-01

    Wireless Sensor Network (WSN) has a huge range of applications such as battlefield, surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. T...

  9. Strengthening global health security capacity--Vietnam demonstration project, 2013.

    Science.gov (United States)

    Tran, Phu Dac; Vu, Long Ngoc; Nguyen, Hien Tran; Phan, Lan Trong; Lowe, Wayne; McConnell, Michelle S; Iademarco, Michael F; Partridge, Jeffrey M; Kile, James C; Do, Trang; Nadol, Patrick J; Bui, Hien; Vu, Diep; Bond, Kyle; Nelson, David B; Anderson, Lauren; Hunt, Kenneth V; Smith, Nicole; Giannone, Paul; Klena, John; Beauvais, Denise; Becknell, Kristi; Tappero, Jordan W; Dowell, Scott F; Rzeszotarski, Peter; Chu, May; Kinkade, Carl

    2014-01-31

    Over the past decade, Vietnam has successfully responded to global health security (GHS) challenges, including domestic elimination of severe acute respiratory syndrome (SARS) and rapid public health responses to human infections with influenza A(H5N1) virus. However, new threats such as Middle East respiratory syndrome coronavirus (MERS-CoV) and influenza A(H7N9) present continued challenges, reinforcing the need to improve the global capacity to prevent, detect, and respond to public health threats. In June 2012, Vietnam, along with many other nations, obtained a 2-year extension for meeting core surveillance and response requirements of the 2005 International Health Regulations (IHR). During March-September 2013, CDC and the Vietnamese Ministry of Health (MoH) collaborated on a GHS demonstration project to improve public health emergency detection and response capacity. The project aimed to demonstrate, in a short period, that enhancements to Vietnam's health system in surveillance and early detection of and response to diseases and outbreaks could contribute to meeting the IHR core capacities, consistent with the Asia Pacific Strategy for Emerging Diseases. Work focused on enhancements to three interrelated priority areas and included achievements in 1) establishing an emergency operations center (EOC) at the General Department of Preventive Medicine with training of personnel for public health emergency management; 2) improving the nationwide laboratory system, including enhanced testing capability for several priority pathogens (i.e., those in Vietnam most likely to contribute to public health emergencies of international concern); and 3) creating an emergency response information systems platform, including a demonstration of real-time reporting capability. Lessons learned included awareness that integrated functions within the health system for GHS require careful planning, stakeholder buy-in, and intradepartmental and interdepartmental coordination and

  10. Student Dissertation Explores Privatization of Global Security

    OpenAIRE

    Naval Postgraduate School Public Affairs Office

    2012-01-01

    NPS national security affairs doctoral student Cmdr. Dan Straub weighs the benefits and challenges of using private security contractors for United Nations peacekeeping efforts in his upcoming dissertation.

  11. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyonam; Kim, So Young; Yim, Mansung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Schneider, Erich [Univ. of Texas at Austin, Texas (United States)

    2014-05-15

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  12. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    International Nuclear Information System (INIS)

    Kim, Kyonam; Kim, So Young; Yim, Mansung; Schneider, Erich

    2014-01-01

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  13. Moving towards global health equity: Opportunities and threats: An ...

    African Journals Online (AJOL)

    Background: The theme of the 13th World Congress on Public Health, “Moving Towards Global Health Equity: Opportunities and Threats”, strikes an optimistic note as the gaps within and between countries are greater than at any time in recent history. There is no consensus on what globalization is, but most agree that it will ...

  14. Globalization Crisis and National Security: A Reflection on Nigeria ...

    African Journals Online (AJOL)

    Globalization Crisis and National Security: A Reflection on Nigeria Textile Industry. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... Thus, while globalization has several palpable positive effects on the countrys industrial growth, it also ...

  15. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  16. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  17. Introductory remarks at the Global Threat Reduction Initiative Partners Conference (GTRI). 18 September 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    The security of nuclear and other radioactive material has taken on dramatically heightened significance in recent years, due to a number of factors: first, the increasing awareness that nuclear weapons related 'know-how' is no longer confined to a relatively few countries; second, the uncovering of an illicit procurement network capable of supplying nuclear designs and equipment; and third, the rise of extremist groups that have demonstrated an interest in obtaining and using nuclear and radiological weapons. Against this background, the need to protect nuclear material and facilities, and to control nuclear material and radioactive sources, has become an ever more global priority. The IAEA has been active in the field of nuclear security for many years, but the urgency and scope of our efforts underwent a 'sea-change' in the months following September 2001. International cooperation has become the hallmark of these security efforts. While nuclear security is and should remain a national responsibility, many countries still lack the programmes and the resources to respond properly to the threat of nuclear and radiological terrorism. International efforts are focused both on assisting these countries in strengthening their programmes, and on building global networks for combating cross-border threats. The Agency's work has three main points of focus: prevention, detection and response. Our first objective is to assist States in preventing any illicit or non-peaceful use of nuclear or other radioactive materials - including acts of terrorism. This requires effective physical protection of nuclear materials in use, storage and transport, as well as protection of related nuclear facilities. It demands strong State programmes for accounting and control of nuclear material. It recognizes the benefits of the conversion of research reactors to use low enriched uranium a process that requires substantial funding and, in some cases, the development of technological

  18. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  19. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  20. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  1. Children and adolescents facing a continuous security threat: Aggressive behavior and post-traumatic stress symptoms.

    Science.gov (United States)

    Nuttman-Shwartz, Orit

    2017-07-01

    There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of

  2. Security Assistance in Nigeria: Shaping the International Environment to Meet U.S. National Security Objectives in the Global Era

    National Research Council Canada - National Science Library

    Prendergast, Kenneth

    2003-01-01

    .... While American interests in Sub-Saharan Africa are significant and growing, there are also important transnational security threats, infectious diseases, organized international criminal activities...

  3. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  4. Transforming Gender and Food Security in the Global South | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Gender and Food Security in the Global South. Page couverture du livre: Transforming Gender and Food Security in the Global South. Directeur(s):. Jemimah Njuki, John R. Parkins et Amy Kaler. Maison(s) d'édition: Routledge, CRDI. 29 septembre 2016. ISBN : 9781138680418. 312 pages. e-ISBN :.

  5. Deploying Difference: Security Threat Narratives and State Displacement from Protected Areas

    Directory of Open Access Journals (Sweden)

    Elizabeth Lunstrum

    2018-01-01

    Full Text Available State actors are increasingly treating protected areas as sites of security threats and policing resident communities as though they are the cause of this insecurity. This is translating into community eviction from protected areas that is authorised by security concerns and logics and hence not merely conservation concerns. We ground this claim by drawing upon empirical work from two borderland conservation areas: Mozambique's Limpopo National Park (LNP and Guatemala's Maya Biosphere Reserve (MBR. In both cases, we show how these security-provoked evictions are authorised by the mobilisation of interlocking axes of difference that articulate notions of territorial trespass with that of a racialised enemy. Rather than a new problem or phenomena, we show how these axes are rooted in prior histories of state actors rendering racialised subjects dangerous, Cold War histories in both cases and a longer colonial history with the LNP. We also show how standing behind these evictions is the nation-state and its practices of protected area territorialisation. From here, we illustrate how the rationale behind displacement from protected areas matters, as evictions become more difficult to contest once they are authorised by security considerations. The cases, however, differ in one key respect. While displacement from the LNP is an instance of conservation-induced displacement (CID, although one re-worked by security considerations, eviction from the MBR is motivated more centrally by security concerns yet takes advantage of protected area legislation. The study hence offers insight into a growing literature on conservation-security encounters and into different articulations of conservation, security, and displacement.

  6. Global Vigilence. Strengthening Nuclear Security Worldwide

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2013-01-01

    Nuclear terrorism is a continuing threat. Progress has been made in recent years in ensuring that nuclear and other radioactive material, as well as associated facilities, are properly protected everywhere in the world. But much remains to be done

  7. ECONOMIC SECURITY – NEW APPROACHES IN THE CONTEXT OF GLOBALIZATION

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2015-08-01

    Full Text Available Nowadays, more than ever, economic relations between states are the ones that define the general character of the relations between them and establish economic security as a concept which cannot be neglected anymore. Globalization, the process that shapes the international environment, undermines the old definition of economic security and forces its redefinition. The article aims to identify and analyse the effects of globalization on economic security and the new approaches it takes in this context.

  8. AR.Drone: security threat analysis and exemplary attack to track persons

    Science.gov (United States)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  9. SYSTEMATIZATION OF INTERNATIONAL EXPERIENCE OF ENSURING ECONOMIC SECURITY OF EXACERBATION OF THE THREATS AND CHALLENGES OF A NEW TYPE FOR NATIONAL AND INTERNATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Tatyana Momot

    2016-11-01

    Full Text Available The aim of the work is to systematize the international experience of economic security both in terms of individual countries and the global economy as a whole. Setting such a goal it is associated with the growth of globalization and integration processes in the world economy, which are the new threat of economic security. Methods. Theoretical and methodological basis of the study were research and findings on issues of economic security at the level of the world economy as a whole and individual national economies in particular. We used such general scientific and special methods, such as analysis and synthesis, comparison, generalization, adaptation. The findings led to the conclusion that the protection of national interests and the formation of an economic security strategy – the most important functions of the state, the implementation of which is impossible without a system of self-regulation mechanisms and regulation. The government should implement a set of measures to promote economic growth, and that will guarantee the economic security of the country. These measures should cover all sectors of the economy. These measures include the implementation an active structural and social policies, enhancing the activity of the state in investment, financial, monetary and foreign economic sphere, the continuation of institutional reforms. The practical significance is to separate the differences used methodological approaches to ensure the economic security of the EU member countries and the CIS. This is explained by the fact that the first group of countries is focused on standards and borrows the experience of the leading EU countries (Germany, France, and the second group, located in the zone of influence of Russia (Moldova, Ukraine, Belarus, Kazakhstan, – on the Russian developments and standards. In turn, Russia in their design focuses more on standards to ensure economic security, which have been made in the period of the Soviet

  10. Moving towards global health equity: Opportunities and threats: An ...

    African Journals Online (AJOL)

    MESKE

    time in recent history. ... Results: Equity has been a long quest in public health and global health equity could be seen as part of ... Sub-Saharan Africa will remain an enduring preoccupation ..... In recent years, “Equity as a shared vision for health and ..... skilled workers is evolving as a policy position in the US and Europe.

  11. Higher Education in the Global Market: Opportunities and Threats

    Science.gov (United States)

    Singh, Navin

    2011-01-01

    The world is marked by the twin processes of economic and cultural globalization in an era of information technology. The identities of all societies are evolving as social and political boundaries are shrinking day-by-day. As a result of significant economic and political changes, cross-cultural contact is at an all-time high in human history.…

  12. Global Challenges and Threats: European and US Approaches

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    2010-01-01

    Full Text Available Este artículo presenta las similitudes y diferencias que existen en las aproximaciones de seguridad entre la Unión Europea y los Estados Unidos, así como sus implicaciones para la OTAN. La Estrategia de Seguridad Europea enfatiza los desafíos y amenazas globales, dejando en un segundo plano los problemas de seguridad tradicional existentes en la periferia europea. Los Estados Unidos, por su parte, que es una potencia militar global tiende a considerar los problemas de seguridad europea en un contexto más global. El artículo hace un recorrido por las políticas puestas en pie por la Unión Europea y los Estados Unidos para hacer frente a los desafíos globales y explica las similitudes y diferencias en orden a entender los problemas cruciales que los estados miembros de la OTAN tienen que abordar para dar consistencia y permanencia al nuevo concepto estratégico de la OTAN que se está elaborando.

  13. Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments

    Science.gov (United States)

    2010-11-01

    behavioral feature values. This would provide a baseline notional object trust and is formally defined as follows: TO(1)[0, 1] = ∑ 0,n:νbt wtP (S) (8...TO(2)[0, 1] = ∑ wtP (S) · identity(O,P ) (9) 28- 12 RTO-MP-IST-091 Combining Trust and Behavioral Analysis to Detect Security Threats in Open...respectively. The wtP weight function determines the significance of a particular behavioral feature in the final trust calculation. Note that the weight

  14. Evaluating Strategies for Achieving Global Collective Action on Transnational Health Threats and Social Inequalities

    OpenAIRE

    Hoffman, Steven Justin

    2015-01-01

    This dissertation presents three studies that evaluate different strategies for addressing transnational health threats and social inequalities that depend upon or would benefit from global collective action. Each draws upon different academic disciplines, methods and epistemological traditions. Chapter 1 assesses the role of international law in addressing global health challenges, specifically examining when, how and why global health treaties may be helpful. Evidence from 90 quantitati...

  15. Global Food Security Problems in the Modern World Economy

    Science.gov (United States)

    Abdulkadyrova, Madina A.; Dikinov, Andzor H.; Tajmashanov, Hassan È.; Shidaev, Lomali A.; Shidaeva, Eliza A.

    2016-01-01

    Importance: Food problem at the present stage of development of mankind is that due to improper and overly intensive use of natural resources, increasing demand for livestock products, increasing per capita food consumption and other factors, there has been a steady rise in food prices, represents a threat to food security in the countries with…

  16. Maritime Security – The Need for a Global Agreement

    OpenAIRE

    Dinos Stasinopoulos

    2003-01-01

    This note reviews US maritime security measures, outlines work carried out by international organisations and then frames maritime security within the wider context of maritime trade. Finally, it suggests the development of a Global Agreement linking security and other maritime trade-related issues. The initiative for such an agreement should be undertaken by the EU only if current International Maritime Organisation (IMO) efforts fail to produce a maritime security framework with binding req...

  17. Global Security Contingency Fund: Summary and Issue Overview

    Science.gov (United States)

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  18. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  19. The Urban Crisis in Sub-Saharan Africa: A Threat to Human Security and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Mediel Hove

    2013-03-01

    Full Text Available Urban centres have existed and have been evolving for many centuries across the world. However, the accelerated growth of urbanisation is a relatively recent phenomenon. The enormous size of urban populations and more significantly, the rapidity with which urban areas have been and are growing in many developing countries have severe social, economic and physical repercussions. This paper argues that the accelerated growth of urbanisation has amplified the demand for key services. However, the provision of shelter and basic services such as water and sanitation, education, public health, employment and transport has not kept pace with this increasing demand. Furthermore, accelerated and poorly managed urbanisation has resulted in various types of atmospheric, land and water pollution thereby jeopardising human security. This paper offers the conclusion that the increased environmental, social and economic problems associated with rapid urbanisation pose a threat to sustainable development, human security and, crucially, peace.

  20. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  1. Zika virus: Global health challenge, threat and current situation.

    Science.gov (United States)

    Aziz, Hafsa; Zia, Aadarash; Anwer, Amania; Aziz, Muneeba; Fatima, Shazia; Faheem, Muhammad

    2017-06-01

    ZIKV has emerged as grave global health issue in the past few years. ZIKV was firstly isolated in 1947 from a rhesus sentinel monkey in the Zika forest in Uganda. It is usually transmitted by the bite of infected mosquitoes and infects skin fibroblasts, skin keratinocytes, etc. ZIKV until now was under reported because of its clinical similarity with the dengue and chikungunya. It is usually spread through the course of the sylvatic cycle. In this cycle, the virus or pathogen lifespan is spent between the wild animal and vectors. The intrinsic incubation period is not yet fully known but it is observed that the very first symptoms of ZIKV infection can appear or develop within 3-12 days of time period and usually subside within 7 days of time. There is a strong relationship between prenatal Zika virus infection and microcephaly; other serious brain anomalies to the infant or newborn are Guillain-Barré syndrome. To date no vaccines are available for ZIKV prevention hence only symptomatic treatment is recommended in infected patients. Usually ZIKV is detected by serologic (IgM ELISA), plaque reduction neutralization test (PRNT) along with in-house" molecular techniques (RT-PCR). ZIKV infection being imminent global health issue warrants strong protective measures to prevent it from becoming an epidemic. Early detection and prevention is the key to tackle this grave potential health hazard. J. Med. Virol. 89:943-951, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  2. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework.

    Science.gov (United States)

    Gushulak, Bd; Weekers, J; Macpherson, Dw

    2009-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced

  3. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  4. The potential distribution of cassava mealybug (Phenacoccus manihoti, a threat to food security for the poor.

    Directory of Open Access Journals (Sweden)

    Tania Yonow

    Full Text Available The cassava mealybug is a clear and present threat to the food security and livelihoods of some of the world's most impoverished citizens. Niche models, such as CLIMEX, are useful tools to indicate where and when such threats may extend, and can assist with planning for biosecurity and the management of pest invasions. They can also contribute to bioeconomic analyses that underpin the allocation of resources to alleviate poverty. Because species can invade and establish in areas with climates that are different from those that are found in their native range, it is essential to define robust range-limiting mechanisms in niche models. To avoid spurious results when applied to novel climates, it is necessary to employ cross-validation techniques spanning different knowledge domains (e.g., distribution data, experimental results, phenological observations. We build upon and update a CLIMEX niche model by Parsa et al. (PloS ONE 7: e47675, correcting inconsistent parameters and re-fitting it based on a careful examination of geographical distribution data and relevant literature. Further, we consider the role of irrigation, the known distribution of cassava production and a targeted review of satellite imagery to refine, validate and interpret our model and results. In so doing, we bring new insights into the potential spread of this invasive insect, enabling us to identify potential bio-security threats and biological control opportunities. The fit of the revised model is improved, particularly in relation to the wet and dry limits to establishment, and the parameter values are biologically plausible and accord with published scientific literature.

  5. Threats to security and ischaemic heart disease deaths: the case of homicides in Mexico.

    Science.gov (United States)

    Lee, Eileen H; Bruckner, Tim A

    2017-02-01

    Ischaemic heart disease (IHD) ranks as the leading cause of death worldwide. Whereas much attention focuses on behavioural and lifestyle factors, less research examines the role of acute, ambient stressors. An unprecedented rise in homicides in Mexico over the past decade and the attendant media coverage and publicity have raised international concern regarding its potential health sequelae. We hypothesize that the rise in homicides in Mexico acts as an ecological threat to security and elevates the risk of both transient ischaemic events and myocardial infarctions, thereby increasing IHD deaths. We applied time-series methods to monthly counts of IHD deaths and homicides in Mexico for 156 months spanning January 2000 to December 2012. Methods controlled for strong temporal patterns in IHD deaths, the unemployment rate and changes in the population size at risk. After controlling for trend and seasonality in IHD deaths, a 1-unit increase in the logged count of homicides coincides with a 7% increase in the odds of IHD death in that same month (95% confidence interval: 0.04 - 0.10). Inference remains robust to additional sensitivity checks, including a state-level fixed effects analysis. Our findings indicate that the elevated level of homicides in Mexico serves as a population-level stressor that acutely increases the risk of IHD death. This research adds to the growing literature documenting the role of ambient threats, or perceived threats, to security on cardiovascular health. © The Author 2016; all rights reserved. Published by Oxford University Press on behalf of the International Epidemiological Association

  6. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis.

  7. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    International Nuclear Information System (INIS)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill

    2016-01-01

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis

  8. An Overview of Global Nuclear Security Regime and Its Introduction into the Nigerian Educational System

    International Nuclear Information System (INIS)

    Jonah, S.A.

    2013-01-01

    Nuclear security is the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the respective country. Within a State the nuclear security regime resembles layers of an onion with equipment and personnel securing the borders and ports representing the outer layer. Nuclear power, research reactor and nuclear medicine facilities constitute the various inner layers down to the actual target materials. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, hardware and software. Nigeria is a non-nuclear weapons state and without a large-scale nuclear industry, but have a major role to play in preventing nuclear terrorism globally. It is pertinent to know that as the Fukushima accident and other nuclear accidents have demonstrated, nuclear crises do not respect borders. Therefore, nuclear threats must be addressed by all nations. Furthermore, to set the groundwork for the safe, peaceful and stable use of nuclear energy in Nigeria and all over the world, efforts must be made to enhance nuclear safety and security. This paper discusses the present international nuclear security regime and possibility of integrating it into the Nigerian educational system in view of current global perspectives and nuclear renaissance.

  9. A new global threat for the public safety: Zika virus

    Directory of Open Access Journals (Sweden)

    Simona Bicheru

    2016-04-01

    Full Text Available Zika virus, the etiological agent of Zika fever, is transmitted by mosquitoes and has been affecting the South American continent starting with 2015. It was reported in several European countries, carried by the people who returned from Latin America, as reported by the health authorities in those countries. Today, according to the World Health Organization (WHO, the virus suspected to cause serious birth defects in the fetus has also been confirmed in 21 of the 55 countries of South America, but also in other states from Europe and North America. Zika virus is a single stranded positive sense RNA virus belonging to Flavivirus genus (family Flaviviridae and was first identified in 1947 in Uganda rainforest Zika. The increased number of cases of microcephaly, in children from northern Brazil, suggested a connection with Zika virus, but it has not yet been proven. Also, the virus can be transmitted sexually and through blood or blood products. Diagnosis of the infection is made using Polymerase Chain Reaction (PCR. So far, there is no specific antiviral treatment or vaccine against the infection with Zika virus. The best form of prevention is to avoid mosquito bites. WHO has estimated that the spread of Zika virus, transmitted through mosquito bite, is “a global public health emergency”. The priority is to protect pregnant women and to control the mosquitoes.

  10. Concern over Zika virus outbreak: another alarming global threat

    Directory of Open Access Journals (Sweden)

    Hafiz MY

    2016-06-01

    Full Text Available Muhammad Yusuf Hafiz,1 Syed Uzair Mahmood,2 Maria Shoaib,1 Farah Hafiz Yusuf1 1Dow Medical College, Dow University of Health Sciences, 2Sindh Medical College, Jinnah Sindh Medical University, Karachi, Pakistan Abstract: Zika virus, as highlighted by the World Health Organization in February 2016, has emerged as a public health emergency of international concern. Zika virus is enveloped and icosahedral, and has a nonsegmented, single-stranded, positive-sense RNA genome. It belongs to Flaviviridae family. Aedes aegypticus mosquito is the known vector. Transmission is anthroponotic (human to vector to human during outbreaks, or occurs perinatally in utero, sexually, and via transfusion of infected blood. Zika virus is turning out to be a major public health concern. Not only has it shown dramatic teratogenic association and caused serious neurological concerns but it has also spread around the globe. Countries that have not yet been affected by Zika virus should adopt proper preventive methods to limit its spread in the population. Keywords: Zika virus, global spread, teratogenic, neurological anomalies, public health emergency

  11. The global energy challenge: new challenges and threats, the ways to overcome them

    OpenAIRE

    Alexandr N. Zakharov

    2017-01-01

    The article describes key aspects of global energy issues, with an emphasis on energy security. The Russian Federation is to face three inter-related challenges: provide energy security, stimulate economic growth and protect the environment, reducing emissions of greenhouse gases that will reduce the level of air pollution and contribute to the global improvement of the atmosphere. The author analyzes the status and prospects of world energy markets and the forecast of their development for t...

  12. Threats without Threateners? Exploring Intersections of Threats to the Global Commons and National Security

    Science.gov (United States)

    2012-01-01

    contamination and might facilitate natural spread of diseases. Cholera , for instance, is linked to unsafe water.3 Migration is a key connection among...3 For links between cholera outbreaks and scarcity of safe water, see, Dasgupta (2010) and Holmner and others 2010, and for modeling of the spread...example, the Chiapas, Mexico , conflict in the 1990s was certainly sharpened by scarcity (Chassang and i Miquel, 2008; Homer-Dixon, 2001). One of the

  13. The global nephrology workforce: emerging threats and potential solutions!

    Science.gov (United States)

    Sharif, Muhammad U; Elsayed, Mohamed E; Stack, Austin G

    2016-02-01

    Amidst the rising tide of chronic kidney disease (CKD) burden, the global nephrology workforce has failed to expand in order to meet the growing healthcare needs of this vulnerable patient population. In truth, this shortage of nephrologists is seen in many parts of the world, including North America, Europe, Australia, New Zealand, Asia and the African continent. Moreover, expert groups on workforce planning as well as national and international professional organizations predict further reductions in the nephrology workforce over the next decade, with potentially serious implications. Although the full impact of this has not been clearly articulated, what is clear is that the delivery of care to patients with CKD may be threatened in many parts of the world unless effective country-specific workforce strategies are put in place and implemented. Multiple factors are responsible for this apparent shortage in the nephrology workforce and the underpinning reasons may vary across health systems and countries. Potential contributors include the increasing burden of CKD, aging workforce, declining interest in nephrology among trainees, lack of exposure to nephrology among students and residents, rising cost of medical education and specialist training, increasing cultural and ethnic disparities between patients and care providers, increasing reliance on foreign medical graduates, inflexible work schedules, erosion of nephrology practice scope by other specialists, inadequate training, reduced focus on scholarship and research funds, increased demand to meet quality of care standards and the development of new care delivery models. It is apparent from this list that the solution is not simple and that a comprehensive evaluation is required. Consequently, there is an urgent need for all countries to develop a policy framework for the provision of kidney disease services within their health systems, a framework that is based on accurate projections of disease burden, a

  14. Global health security: the wider lessons from the west African Ebola virus disease epidemic

    Science.gov (United States)

    Heymann, David L; Chen, Lincoln; Takemi, Keizo; Fidler, David P; Tappero, Jordan W; Thomas, Mathew J; Kenyon, Thomas A; Frieden, Thomas R; Yach, Derek; Nishtar, Sania; Kalache, Alex; Olliaro, Piero L; Horby, Peter; Torreele, Els; Gostin, Lawrence O; Ndomondo-Sigonda, Margareth; Carpenter, Daniel; Rushton, Simon; Lillywhite, Louis; Devkota, Bhimsen; Koser, Khalid; Yates, Rob; Dhillon, Ranu S; Rannan-Eliya, Ravi P

    2018-01-01

    The Ebola virus disease outbreak in West Africa was unprecedented in both its scale and impact. Out of this human calamity has come renewed attention to global health security—its definition, meaning, and the practical implications for programmes and policy. For example, how does a government begin to strengthen its core public health capacities, as demanded by the International Health Regulations? What counts as a global health security concern? In the context of the governance of global health, including WHO reform, it will be important to distil lessons learned from the Ebola outbreak. The Lancet invited a group of respected global health practitioners to reflect on these lessons, to explore the idea of global health security, and to offer suggestions for next steps. Their contributions describe some of the major threats to individual and collective human health, as well as the values and recommendations that should be considered to counteract such threats in the future. Many different perspectives are proposed. Their common goal is a more sustainable and resilient society for human health and wellbeing. PMID:25987157

  15. Skin bleaching: A neglected form of injury and threat to global skin ...

    African Journals Online (AJOL)

    Skin bleaching: A neglected form of injury and threat to global skin. JC Street, K Gaska, KM Lewis, ML Wilson. Abstract. Skin bleaching is the use of creams, gels, or soaps to lighten the skin and is known to cause a number of injuries, many of which are potentially life-threatening. Despite the growing body of research ...

  16. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  17. MIGRATORY THREATS TO NATIONAL SECURITY OF UKRAINE: CURRENT CHALLENGES AND WAYS OF REGULATION

    Directory of Open Access Journals (Sweden)

    Mychailo Romaniuk

    2016-11-01

    Full Text Available The purpose of the article is to disclose the migratory threats which are connected with external and mass internal inter-regional migrations, which are caused by the annexation of the Crimea and military aggression in Donbas by Russia. Methodological and practical aspects of improving the management of intensive interstate and inter-regional migratory processes, negative consequences of which threaten national security of the country because of hybrid war in Donbas, illegal migration, worsening of the demographic situation, departure of scientists and specialists abroad are described in the article too. The main strategic objective, which consists of maintenance of state sovereignty, territorial integrity of Ukraine, and also integration in European and migratory space, ensuring close to the world standards of quality and length of life, realization of rights and freedoms of citizens, is formulated. Actions and tasks of the state migratory policy, ways and methods of regulation of external migrations of the population are considered. Principal reasons of external migrations of population are identified and analysed. The inwardly-regional, interregional and intergovernmental migrations of population of Ukraine in the years of its state independence (1991- 2014 are analyzed in details. The results of analysis showed that migratory activity goes down on inwardly-regional and interregional levels. Also intensity of exchange of population went down between the regions of country. At the same time Ukraine for years state independence through depopulation processes lost 6,5 million persons, and in the external migratory moving of population of loss made over 1 million persons. The problem of illegal external labour migration is considered. It is noted that illegal migration from Ukraine to the threats to national security in the Law of Ukraine "On the National Security of Ukraine" is not included, and a threat to national security posed by illegal

  18. Evaluating the Security of the Global Containerized Supply Chain

    National Research Council Canada - National Science Library

    Willis, Henry H; Ortiz, David S

    2004-01-01

    .... However, heightened awareness of terrorism has redefined supply-chain security-the consequences of an attack on or via a critical global port could be a tremendous loss of life and a crippling of the U.S...

  19. Global Food Security Support Analysis Data (GFSAD) Crop Mask 2010 Global 1 km V001

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Making Earth System Data Records for Use in Research Environments (MEaSUREs) Global Food Security Support Analysis Data (GFSAD) Crop Mask Global 1 kilometer...

  20. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  1. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  2. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  3. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  4. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    Science.gov (United States)

    Greitzer, Frank L.; Frincke, Deborah A.

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, to support a move from an insider threat detection stance to one that enables prediction of potential insider presence. Twodistinctiveaspects of the approach are the objectiveof predicting or anticipating potential risksandthe useoforganizational datain additiontocyber datato support the analysis. The chapter describes the challenges of this endeavor and reports on progressin definingausablesetof predictiveindicators,developingaframeworkfor integratingthe analysisoforganizationalandcyber securitydatatoyield predictions about possible insider exploits, and developing the knowledge base and reasoning capabilityof the system.We also outline the typesof errors that oneexpectsina predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  5. Lack of skilled personnel as threat to HR security of industrial enterprises

    Directory of Open Access Journals (Sweden)

    Ozernikova Tatiana

    2017-01-01

    Full Text Available The article assesses the needs of Russian industrial enterprises for skilled labor. The authors consider deficiency in qualified personnel as a threat to the human resources security of industrial enterprises, and analyze its causes. The study includes the criteria to distinguish highly skilled employees in the labor force (education level, occupation, correspondence of performed work to education, and analysis of the dynamics of their number. It identifies the internal and external factors that have a significant influence on the number of qualified personnel. The external factors include the size of the salary, population growth due to migration, the regional level of the socio-economic development. The applied methods of analysis are single-factor analysis of variance (F-test, multiple regression and descriptive statistics. The analysis is based on the materials of the Russian Federal State Statistics Service, as well as on the Russian Longitudinal Monitoring Survey - Higher School of Economics.

  6. National Security Implications of Global Warming Policy

    Science.gov (United States)

    2010-03-01

    Although numerous historical examples demonstrate how actual climate change has contributed to the rise and fall of powers, global warming , in and of...become convinced that global warming is universally bad and humans are the primary cause, political leaders may develop ill-advised policies restricting

  7. The NNSA global threat reduction initiative's efforts to minimize the use of highly enriched uranium for medical isotope production

    International Nuclear Information System (INIS)

    Staples, Parrish

    2010-01-01

    The mission of the National Nuclear Security Administration's (NNSA) Office of Global Threat Reduction (GTRI) is to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. GTRI is a key organization for supporting domestic and global efforts to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civilian nuclear applications. GTRI implements the following activities in order to achieve its threat reduction and HEU minimization objectives: Converting domestic and international civilian research reactors and isotope production facilities from the use of HEU to low enriched uranium (LEU); Demonstrating the viability of medical isotope production technologies that do not use HEU; Removing or disposing excess nuclear and radiological materials from civilian sites worldwide; and Protecting high-priority nuclear and radiological materials worldwide from theft and sabotage. This paper provides a brief overview on the recent developments and priorities for GTRI program activities in 2010, with a particular focus on GTRI's efforts to demonstrate the viability of non-HEU based medical isotope production technologies. (author)

  8. Neither International nor Global: Rethinking the Problematic Subject of Security

    Directory of Open Access Journals (Sweden)

    David Chandler

    2010-09-01

    Full Text Available This paper argues that the problematic of the international and the global has been a barrier to understanding the transformation of security discourse over the last decade. Academic treatments of security within the discipline of international relations have been structured by the traditional liberal binaries, which conceive of political communities capable of constituting securing subjects at either the level of the state or the global. Today’s dominant framing of the security problematic seems to evade easy articulation within this structure and in some readings is seen to presage a transitory stage from the international to the global. An alternative reading is sketched out here, that of the post- liberal, which suggests that the apparent shift towards the global can not be captured from within the liberal problematic and highlights that rather than traditional disagreements over the nature of the subject of security – the constitution of the securing actor – we are witnessing the disappearance of securing agency itself.

  9. Nuclear proliferation and the potential threat of nuclear terrorism. 8 November 2004, Sydney, Australia, Asia-Pacific Nuclear Safeguards and Security Conference

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Today, the focus of the world is on nuclear proliferation and the potential threat of nuclear terrorism in Asia and the Pacific, and this address is presenting the perspectives on the challenges IAEA faces, and how the IAEA is working to strengthen nuclear security and the nuclear non-proliferation regime. But one would emphasize at the outset that, while much of our work must begin locally and regionally, we must not forget to think globally, because ultimately the existence of a nuclear threat anywhere is a threat everywhere, and as a global community, we will win or lose this battle together. This presentation, discusses cooperation, assistance, regional and international networks, and the importance of learning from each other. In effect, the focal subject is 'security culture', a mindset that, while providing the impetus for local and regional action, thinks globally and is fully capable of extending across borders. Sixty years ago, on a day in August, the dawn of the Nuclear Age in Asia left nearly a quarter of a million people dead, with two devices considered crude by modern standards. For six decades, we have managed to avoid a repeat of that event, but remain haunted by the prospect. It is my firm belief that we cannot move out from under the shadow of Hiroshima and Nagasaki until we are ready to make that move collectively, and build a system of security that transcends borders, that focuses on the equal value of every human life, and in which nuclear weapons have no place. May it not ultimately be said of our civilization that we created the inventions that led to our own demise

  10. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    International Nuclear Information System (INIS)

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  11. Food Security: Selected Global and U.S. Resources

    Science.gov (United States)

    Kocher, Megan

    2015-01-01

    Food security is researched and dealt with on local, regional, national, and global levels with solutions ranging from local farmers' market initiatives to increasing crop yields through genetically modified plants to streamlining global supply chains. Because of its broad, interdisciplinary nature, it is necessary to narrow the focus of this…

  12. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    Science.gov (United States)

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  13. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  14. Security threats to automotive CAN networks-Practical examples and selected short-term countermeasures

    International Nuclear Information System (INIS)

    Hoppe, Tobias; Kiltz, Stefan; Dittmann, Jana

    2011-01-01

    The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests performed on the control systems for the window lift, warning light and airbag control system as well as the central gateway. These results are supplemented in this article by a classification of these four attack scenarios using the established CERT taxonomy and an analysis of underlying security vulnerabilities, and especially, potential safety implications. With respect to the results of these tests, in this article we further discuss two selected countermeasures to address basic weaknesses exploited in our tests. These are adaptations of intrusion detection (discussing three exemplary detection patterns) and IT-forensic measures (proposing proactive measures based on a forensic model). This article discusses both looking at the four attack scenarios introduced before, covering their capabilities and restrictions. While these reactive approaches are short-term measures, which could already be added to today's automotive IT architecture, long-term concepts also are shortly introduced, which are mainly preventive but will require a major redesign. Beneath a short overview on respective research approaches, we discuss their individual requirements, potential and restrictions.

  15. EU Contribution to Global CBRN Security

    OpenAIRE

    GOULART DE MEDEIROS MARGARIDA; ABOUSAHL SAID; MAIER EDDIE; SIMONART TRISTAN; DUPRE BRUNO

    2016-01-01

    The EU promotes a culture of CBRN safety and security within the EU and internationally. Accordingly, the Instrument Contributing to Stability and Peace (IcSP) contributes to international efforts to mitigate CBRN risks, whether of natural (e.g. pandemics, volcanic eruptions), accidental (Fukushima) or criminal (trafficking, terrorism) origin, following a consistent ‘all hazards’ approach. The aim is twofold: to prevent CBRN incidents and to build partner countries' capacities for emergency r...

  16. Explaining Global Secularity: Existential Security or Education?

    Directory of Open Access Journals (Sweden)

    Claude M. J. Braun

    2012-11-01

    Full Text Available At the time of data analysis for this report there were 193 countries in the world. Various institutions – the United Nations, the World Health Organization, the CIA, the World Values Survey, Gallup, and many others – have performed sophisticated statistical analyses on cross-national data. The present investigation demonstrates that valid and reliable data concerning religiosity and secularity exist for most countries and that these data are comparable. Cross-national data relating to social, political, economic and cultural aspects of life were tested for correlation with religiosity/secularity. In contrast to the most widely accepted general account of secularity, the Existential Security Framework (ESF; Norris & Inglehart, 2004, secularity was not most highly related to material security, though these were highly related. Rather, secularity was most strongly related to the degree of formal education attained. Material security explained no significant variance beyond education. Thus, religion’s primary function in the world today is being replaced, not so much by the pseudo-materialistic supplication for better living conditions as posited by the ESF, but by contemporary education – extensive knowledge of contemporary cultures, philosophy, modes of thought or processes of reasoning.

  17. Global threats from invasive alien species in the twenty-first century and national response capacities

    Science.gov (United States)

    Early, Regan; Bradley, Bethany A.; Dukes, Jeffrey S.; Lawler, Joshua J.; Olden, Julian D.; Blumenthal, Dana M.; Gonzalez, Patrick; Grosholz, Edwin D.; Ibañez, Ines; Miller, Luke P.; Sorte, Cascade J. B.; Tatem, Andrew J.

    2016-01-01

    Invasive alien species (IAS) threaten human livelihoods and biodiversity globally. Increasing globalization facilitates IAS arrival, and environmental changes, including climate change, facilitate IAS establishment. Here we provide the first global, spatial analysis of the terrestrial threat from IAS in light of twenty-first century globalization and environmental change, and evaluate national capacities to prevent and manage species invasions. We find that one-sixth of the global land surface is highly vulnerable to invasion, including substantial areas in developing economies and biodiversity hotspots. The dominant invasion vectors differ between high-income countries (imports, particularly of plants and pets) and low-income countries (air travel). Uniting data on the causes of introduction and establishment can improve early-warning and eradication schemes. Most countries have limited capacity to act against invasions. In particular, we reveal a clear need for proactive invasion strategies in areas with high poverty levels, high biodiversity and low historical levels of invasion. PMID:27549569

  18. Global partnering related to nuclear materials safeguards and security - A pragmatic approach to international safeguards work

    International Nuclear Information System (INIS)

    Stanford, Dennis

    2007-01-01

    This paper documents issues Nuclear Fuel Services, Inc. has addressed in the performance of international work to safeguards and security work. It begins with a description of the package we put together for a sample proposal for the Global Threat Reduction Initiative, for which we were ranked number one for technical approach and cost, and concludes with a discussion of approaches that we have taken to performing this work, including issues related to performing the work as part of a team. The primary focus is on communication, workforce, equipment, and coordination issues. Finally, the paper documents the rules that we use to assure the work is performed safely and successfully. (author)

  19. Declining global per capita agricultural production and warming oceans threaten food security

    Science.gov (United States)

    Funk, Christopher C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that is grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be determined by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices and policies. This paper discusses several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14% between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21st century food availability in some countries by disrupting moisture transports and bringing down dry air over crop growing areas. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced rainfall during the main growing season along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, this study presents an analysis of emerging

  20. Declining Global Per Capita Agricultural Production and Warming Oceans Threaten Food Security

    Science.gov (United States)

    Funk, Chris C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that was grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be controlled by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices, and policies. In this paper we discuss several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia, and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14 percent between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21 st century food availability by disrupting Indian Ocean moisture transports and tilting the 21 st century climate toward a more El Nino-like state. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced main growing season rainfall along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, we present an analysis of

  1. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  2. Global plutonium management: A security option

    International Nuclear Information System (INIS)

    Sylvester, K.W.B.

    1998-01-01

    The US surplus plutonium disposition program was created to reduce the proliferation risk posed by the fissile material from thousands of retired nuclear weapons. The Department of Energy has decided to process its Put into a form as secure as Pu in civilian spent fuel. While implementation issues have been considered, a major one (Russian reciprocity) remains unresolved. Russia has made disposition action conditional on extracting the fuel value of its Pu but lacks the infrastructure to do so. Assistance in the construction of the required facilities would conflict with official US policy opposing the development of a Pu fuel cycle. The resulting stagnation provides impetus for a reevaluation of US nonproliferation objectives and Pu disposition options. A strategy for satisfying Russian fuel value concerns and reducing the proliferation risk posed by surplus weapons-grade plutonium (WGPu) is proposed. The effectiveness of material alteration (e.g., isotopic, chemical, etc.hor-ellipsis) at reducing the desire, ability and opportunity for proliferation is assessed. Virtually all the security benefits attainable by material processing can be obtained by immobilizing Pu in large unit size/mass monoliths without a radiation barrier. Russia would be allowed to extract the Pu at a future date for use as fuel in a verifiable manner. Remote tracking capability, if proven feasible, would further improve safeguarding capability. As an alternate approach, the US could compensate Russia for its Pu, allowing it to be disposed of or processed elsewhere. A market based method for pricing Pu is proposed. Surplus Pu could represent access to nuclear fuel at a fixed price at a future date. This position can be replicated in the uranium market and priced using derivative theory. The proposed strategy attempts to meet nonproliferation objectives by recognizing technical limitations and satisfying political constraints

  3. Deterrence and the New Global Security Environment - Lecture note

    International Nuclear Information System (INIS)

    Sitt, Bernard

    2006-01-01

    This lecture note makes an analysis of a collective publication entitled 'Deterrence and the New Global Security Environment', edited by Ian Kenyon and John Simpson (Routledge, New York, 2006). This collection of papers rigorously examines the current place of deterrence in international security relations, delivering the best of contemporary thinking. This is a special issue of the leading journal 'Contemporary Security Policy'. The present Lecture note emphasises a particular deterrence situation mentioned in this publication which is the one involving terrorist actors

  4. Global Climate Change: National Security Implications

    Science.gov (United States)

    2008-05-01

    it cost to treat asthma in children and other health problems caused by the dirt we were putting out of the smokestacks. It was passed by the...in Latin America for a number of years. General Clark used to say, “In SOUTHCOM, take no credit and expect none.” And I think that was a good rule...damage the health of our children .35 People also need to better understand the implications of globalization. Not all currently appreciate how our

  5. Fairtrade, Food Security and Globalization: Building Alternative Food Systems

    Directory of Open Access Journals (Sweden)

    Martin Calisto Friant

    2016-05-01

    Full Text Available This article examines the politics and practices of Fairtrade certification in order to assess whether this alternative trading system could contribute to innovative solutions for global food security. The analysis begins by assessing the main challenges and problems characterizing the contemporary global food system. It then explores the history, vision and certification standards of the Fairtrade label. In the third section, the results of the impact studies of Fairtrade certification on producer livelihoods are discussed, analyzing the various strengths and weaknesses. Finally the article analyzes whether, and how, the Fairtrade system could positively contribute to improving global food security. To conclude this paper argues that the greatest strength of Fairtrate is not the certification mechanism itself but rather the social and environmental principles it represents. Fairtrade standards could serve to inform broader international policies, which could lead to a sustainable transformation of the global food system.

  6. Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

    Directory of Open Access Journals (Sweden)

    John Patrick Barrowclough

    2018-01-01

    Full Text Available The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a data breaches and (b weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor’s vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT applications and identify the vulnerabilities that enabled them.

  7. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Directory of Open Access Journals (Sweden)

    Lucas B. Fortini

    2017-07-01

    Full Text Available For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also found other (but not all anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  8. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  9. Just Security and the Crisis of Global Governance

    OpenAIRE

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade into others. Managing them so as to avoid such failures is an essential function of global governance. Public space is the home of governance (formal and informal) and of rights-exercising groups and ...

  10. The pharmaceuticalisation of security: Molecular biomedicine, antiviral stockpiles, and global health security.

    Science.gov (United States)

    Elbe, Stefan

    2014-12-01

    Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.

  11. XRIndex: A brief screening tool for individual differences in security threat detection in x-ray images

    Directory of Open Access Journals (Sweden)

    Elena eRusconi

    2015-08-01

    Full Text Available X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported Attention to Detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012. Here we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals.

  12. Opening of Offshore Oil Business in Mexico and Associated Framework to Cope with Potential Maritime Security Threats

    Directory of Open Access Journals (Sweden)

    Adriana Ávila-Zúáiga-Nordfjeld

    2018-03-01

    Full Text Available After 75 years of State oil monopoly, Mexico performed the first business oil round in 2015 involving the private sector. This auction-round offered 14 oil exploration fields located on the continental shelf to private companies. The development and exploitation of these hydrocarbon fields faces significant challenges regarding security. The economic loss for theft of hydrocarbons through illegal connections to pipelines is estimated to 973 million, 125 thousand U.S. dollar, only for the year of 2014. While productive research has been made, it has mainly focused on transportation systems and basically, pipelines. The development and establishment of policies prioritizing maritime security and protection of critical offshore infrastructure against theft of hydrocarbons, drugs organizations and terror attacks needs to be included in the national agenda to improve maritime security and mitigate potential security threats at sea, including damage to the marine environment. This could increase the trust of investors and stakeholders and would contribute to the faster development of new exploration and production fields. While the International Ship and Port Facility Security Code (ISPS Code is the cornerstone for the construction of the port?s security program and establishes the requirements of the Port Facility Security Plan (PFSP, including oil port facilities, it has not been fully implemented in several important Mexican ports. It is concluded that some important ports lack many of the core security processes, procedures and controls that should be included in any PFSP. This article briefly reviews the situation of the oil industry from a security perspective and discusses key elements of maritime security; addressing the necessity of the inclusion of maritime security and protection of critical oil infrastructure offshore in the national agenda that would provide for future research directions in the maritime security domain and contribute to

  13. Epilogue: global food security, rhetoric, and the sustainable intensification debate

    NARCIS (Netherlands)

    Kuijper, T.W.M.; Struik, P.C.

    2014-01-01

    The need to feed nine billion people in 2050 has given rise to widespread debate in science and policy circles. The debate is largely framed in neo-Malthusian terms, and elements of global food security (resilience of the food system, food quantity and quality, right to and access to food) demand

  14. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human Security and Mutual Vulnerability: The Global Political Economy of Development and ... that will help us understand this turbulent and chaotic period in human history. ... The Rapid Research Fund (RRF) for Ebola Virus Disease Outbreaks will fund ... Copyright · Open access policy · Privacy policy · Research ethics ...

  15. Just Security and the Crisis of Global Governance

    NARCIS (Netherlands)

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade

  16. Strengthening global health security by embedding the International Health Regulations requirements into national health systems.

    Science.gov (United States)

    Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin

    2018-01-01

    The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.

  17. Human trafficking as a threat for the security of member states of EU

    Directory of Open Access Journals (Sweden)

    Mirela Kapo

    2017-07-01

    Full Text Available The topic “Trafficking of human beings” as subject to advanced studies has been chosen due to a growing interest linked with the phenomenon in question. The study introduces a legal criminal overview of the criminal activity consisted of the recruitment, transport, transfer or reception of persons by means of force or forms of fraud for exploitation purposes. Human trafficking represents a threat for the security of member states. The trend to penetrate to all spheres of the society has obliged the European states to draft a new directive reflecting the growing concern about the phenomenon in question, by respecting human rights in accordance with the legal framework under the United Nations, International Labor Organization (ILO, and Council of Europe etc. The new European priorities aim at victims’ identification, their protection and prevention of the phenomenon and more intense criminal prosecution of traffickers. With the view of fully developing this topic, the outline consists of four chapters preceded by a historical background of human trafficking. Special importance in this study, specifically in the second chapter, is attached to the assistance and protection of the victims of human trafficking. It is crucial that these victims exercise their rights effectively. Therefore, the European directives foresee assistance and support before, after and during the criminal proceeding. The third chapter refers to the relevant legal mechanisms in this field assuring the victims of trafficking legal defense, the right to information and their social, psychological and physical recovery. One of the “key” legal instruments is the Palermo Convention, which gives for the first time a detailed definition of the term of trafficking and smuggling and makes the differences between them. All legal instruments converge to one point: the consent of the human trafficking victim is not important when it is used any of the means of force, threat

  18. Global energy security and the implications for the EU

    International Nuclear Information System (INIS)

    Umbach, Frank

    2010-01-01

    The following article will analyse the global and geopolitical dimensions of the future international energy security and its implications for Europe and the EU-27. In this context, I will discuss to which extent the EU's newly proclaimed 'Energy Action Plan' of the EU Spring summit of 2007 and its declared common energy (foreign) policy are a sufficient strategy to cope with the new global and geopolitical challenges. The article concludes the following: (1) The interlinkage between globally designed traditional energy security concepts - that rely just on economic factors and 'market-strategies' - and domestic as well as regional political stability demands new thinking with regard to both energy supply security and foreign and security policies. (2) Although after the Russian-Ukrainian gas conflict in January 2006, energy security has forced its way up the European energy and foreign policy agendas, the EU-27 member states have largely failed to forge a coherent European energy security and energy foreign policy strategy after their Spring summit of 2007 because its declared political solidarity has been still lacking. But the 2nd Strategic Energy Review of November 2008 has recommended new initiatives to overcome this lack by promoting concrete infrastructure and other projects for enhancing Europe's supply security and its political solidarity as part of a common energy (foreign) policy. If the EU is able to implement the March 2007 and November 2008 decisions, the EU oil and gas demand will drastically reduce and freeze at current levels. In this case, Putin's energy policies by using Russia's energy resources and pipeline monopolies as a political instrument to enforce its economic and geopolitical interests will be proved as self-defeating in Russia's long-term strategic interests. It will reduce Gazprom's gas exports to a much smaller EU gas market than originally forecasted as the result of a deliberate EU policy of decreasing its overall gas demand and

  19. Globally reasoning about localised security policies in distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    In this report, we aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax......, defined in detail in this report, and their behaviour is clearly established by the Semantics, also defined in detail in this report. The systems include the formal attachment of security policies into their locations, whose intended interactions are trapped by the policies, aiming at taking access...... control decisions of the system, and the Semantics also takes care of this. Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done. We identify how this LTS is indeed obtained, and propose an alternative...

  20. The Threat from European Missile Defence System to Russian National Security

    Directory of Open Access Journals (Sweden)

    Alexey I. Podberezkin

    2014-01-01

    Full Text Available The article analyses the political and military aspects of progress in the dialogue between Russia and the U.S./NATO on cooperation in missile defense; investigates the past experiences and current state of cooperation between Russia and the Alliance on missile defense issues; examines the technical features of American missile defence systems today; finds a solution to question whether or not the European Missile Defence Program actually threatens Russia's nuclear deterrent and strategic stability in general; identifies both potential benefits and possible losses for Russia stemming from the development of cooperation with the United States and NATO in countering ballistic missile threats, or from refusal to have such cooperation. Evidently, the initiative of creation of a missile defense in Europe surely belongs to the USA. Washington has enormous technological, financial, economic, military and institutional capabilities in the field of a missile defense, exceeding by far other NATO member-states. In February 2010, the President of the United States B. Obama adopted a project "European Phased Adaptive Approach" (EPAA as an alternative to G. Bush's global strategic missile defense plan. The first two stages of the Phased Adaptive Approach are focused on creating a system capable of intercepting small, medium and intermediate-range ballistic missiles. The possibility of intercepting long-range missiles is postponed to the third (2018 and forth phases (2020. Moscow finds especially troublesome the third and the fourth phases of Washington's project of creating a European segment of the global antiballistic missile system, considering prospective capabilities of the U.S. interceptor missiles 61 and the envisioned areas of their deployment. The U.S. counter-evidence is that phase four interceptors do not exist yet. Russia insists on getting the political and legal guarantees from the U.S. and NATO that their missile defense systems will not slash

  1. An integrative approach to threat assessment and management: security and mental health response to a threatening client.

    Science.gov (United States)

    Farkas, Gary M; Tsukayama, John K

    2012-01-01

    Workplace violence threat assessment and management practices represent an interdisciplinary approach to the diversion of potentially dangerous employees and clients. This case study illustrates such an intervention in a complex situation involving a social service agency and its client. Following a curtailment of services and an arrest, the client developed an escalating homicidal anger toward the agency administrator. Once a Tarasoff warning was received, the agency contacted a security company who organized a threat assessment and management plan involving interdisciplinary collaboration. Information developed in the course of the assessment was presented to prosecutors, who facilitated the client's arrest and involuntary psychiatric commitment until he was judged to be no longer dangerous. This case ultimately involved an integration of the services of security, law enforcement, mental health professionals, prosecutors, the courts and the state mental health system in leading to a successful diversion of the client from a path of intended violence.

  2. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  3. Simulating the Adaptive Mechanisms to Reduce the Risks of Occurence of Threats to the Economic Security of Enterprise

    Directory of Open Access Journals (Sweden)

    Glushchevsky Vyacheslav V.

    2017-09-01

    Full Text Available The article is concerned with addressing the topical problem of effectively countering real and potential threats to economic security of enterprises and reducing the risks of their occurrence. The article is aimed at simulating the adaptive mechanisms to counteract external influences on the marketing component of enterprise’s economic security and developing a system of measures for removing threats to price destabilization of its orders portfolio based on a modern economic-mathematical instrumentarium. The common causes of the threats occurrence related to the price policy of enterprise and the tactics of the contractual processes with the business partners have been explored. Hidden reserves for price maneuvering in concluding contracts with customers have been identified. An algorithmic model for an adaptive pricing task in terms of an assortment of industrial enterprise has been built. On the basis of this model, mechanisms have been developed to counteract the threats of occurrence and aggravation of a «price conflict» between the producing enterprise and the potential customers of its products, and to advise on how to remove the risks of their occurrence. Prospects for using the methodology together with the instrumentarium for economic-mathematical modeling in terms of tasks of the price risks management have been indicated.

  4. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  5. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  6. Global Food Security Governance: Civil Society Engagement in the Reformed Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.

    2015-01-01

    In 2007/8 world food prices spiked and global economic crisis set in, leaving hundreds of millions of people unable to access adequate food. The international reaction was swift. In a bid for leadership, the 123 member countries of the United Nations’ Committee on World Food Security (CFS) adopted a

  7. Salinity a Serious Threat to Food Security – Where Do We Stand?

    International Nuclear Information System (INIS)

    Zaman, M.; Shahid, Shabbir A; Pharis, Richard P.

    2016-01-01

    Over the past many years, overexploitation has shrunk the soil resources to an unprecedented level and there is great concern that it may not be able to provide the needed food to mankind in future, especially the food for the growing population. This shows that we are using soil resources as they are inexhaustible, continuing withdrawing from an account but never paying in and thus jeopardizing our and our children future. Thus soil resources are at the stake of diminishing capacity for ecosystem services including food production. Increasing human population, demographic pressures, climate change, increased competition between land and water resources, water scarcity, land degradation by salinity are likely to increase vulnerability to food security. The Food and Agricultural Organization (FAO) of the United Nations jointly with International Technical Panel on Soils (ITPS) has published the first-ever comprehensive report “status of the world’s soil resources” and the overwhelming conclusion drawn is very astonishing “the majority of the world’s soil resources are in only fair, poor or very poor conditions…” and conditions are getting worse in far more cases than they are improving. It also states that further loss of productive soils will seriously damage food production and food security, amplify food price volatility, and potentially plunge millions of people into hunger and poverty. Globally 33 percent land is in the state of degradation. The report offers evidence that this loss of soil resources and functions can be avoided (FAO and ITPS 2015). The latter part of the above quote gave hope; however, the question is how this damage can be reversed.

  8. International conference on nuclear security: Global directions for the future. Contributed papers

    International Nuclear Information System (INIS)

    2005-01-01

    This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress

  9. International conference on nuclear security: Global directions for the future. Contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress.

  10. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    National Research Council Canada - National Science Library

    Shawhan, Karl

    2001-01-01

    .... Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased U.S. military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms...

  11. Sovereignty and Nuclear Weapons: The Need for Real Sovereign Authority Rooted in the People’s Global Expectations about Survival, Peace and Security

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-10-01

    Full Text Available The current international security framework is based on an incomplete, anachronistic conception of sovereignty shaped largely by historical circumstance rather than principles of universal justice. Evolution of the global community over the past half century necessitates a reformulation of the concept to justly represent the rights of individual citizens and the global community as a whole. The reconceptualization of sovereignty is an essential condition for the elimination of major threats to global security, most especially those arising from the continued existence and proliferation of nuclear weapons and other weapons of mass destruction.

  12. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Science.gov (United States)

    Fortini, Lucas B.; Dye, Kaipo

    2017-01-01

    For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN) Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also

  13. An aviation security (AVSEC) screening demonstrator for the detection of non-metallic threats at 28-33 GHz

    Science.gov (United States)

    Salmon, Neil A.; Bowring, Nick; Hutchinson, Simon; Southgate, Matthew; O'Reilly, Dean

    2013-10-01

    The unique selling proposition of millimetre wave technology for security screening is that it provides a stand-off or portal scenario sensing capability for non-metallic threats. The capabilities to detect some non-metallic threats are investigated in this paper, whilst recommissioning the AVSEC portal screening system at the Manchester Metropolitan University. The AVSEC system is a large aperture (1.6 m) portal screening imager which uses spatially incoherent illumination at 28-33 GHz from mode scrambling cavities to illuminate the subject. The imaging capability is critically analysed in terms of this illumination. A novel technique for the measurement of reflectance, refractive index and extinction coefficient is investigated and this then use to characterise the signatures of nitromethane, hexane, methanol, bees wax and baking flour. Millimetre wave images are shown how these liquids in polycarbonate bottles and the other materials appear against the human body.

  14. Global threat reduction initiative efforts to address transportation challenges associated with the recovery of disused radioactive sealed sources - 10460

    International Nuclear Information System (INIS)

    Whitworth, Julie; Abeyta, Cristy L.; Griffin, Justin M.; Matzke, James L.; Pearson, Michael W.; Cuthbertson, Abigail; Rawl, Richard; Singley, Paul

    2010-01-01

    Proper disposition of disused radioactive sources is essential for their safe and secure management and necessary to preclude their use in malicious activities. Without affordable, timely transportation options, disused sealed sources remain in storage at hundreds of sites throughout the country and around the world. While secure storage is a temporary measure, the longer sources remain disused or unwanted the chances increase that they will become unsecured or abandoned. The Global Threat Reduction Initiative's Off-Site Source Recovery Project (GTRIlOSRP), recovers thousands of disused and unwanted sealed sources annually as part of GTRl's larger mission to reduce and protect high risk nuclear and radiological materials located at civilian sites worldwide. Faced with decreasing availability of certified transportation containers to support movement of disused and unwanted neutron- and beta/gamma-emitting radioactive sealed sources, GTRIlOSRP has initiated actions to ensure the continued success of the project in timely recovery and management of sealed radioactive sources. Efforts described in this paper to enhance transportation capabilities include: (sm b ullet) Addition of authorized content to existing and planned Type B containers to support the movement of non-special form and other Type B-quantity sealed sources; (sm b ullet) Procurement of vendor services for the design, development, testing and certification of a new Type B container to support transportation of irradiators, teletherapy heads or sources removed from these devices using remote handling capabilities such as the IAEA portable hot cell facility; (sm b ullet) Expansion of shielded Type A container inventory for transportation of gamma-emitting sources in activity ranges requiring use of shielding for conformity with transportation requirements; (sm b ullet) Approval of the S300 Type A fissile container for transport of Pu-239 sealed sources internationally; (sm b ullet) Technology transfer of

  15. Global and local threats to coral reef functioning and existence: review and predictions

    Energy Technology Data Exchange (ETDEWEB)

    Wilkinson, C.R. [Australian Institute of Marine Sciences, Townsville, Qld. (Australia)

    1999-07-01

    Factors causing global degradation of coral reefs are examined briefly as a basis for predicting the likely consequences of increases in these factors. The earlier consensus was that widespread but localized damage from natural factors such as storms, and direct anthropogenic effects such as increased sedimentation, pollution and exploitation, posed the largest immediate threat to coral reefs. Now truly global factors associated with accelerating Global Climate Change are either damaging coral reefs or have the potential to inflict greater damage in the immediate future e.g. increases in coral bleaching and mortality, and reduction in coral calcification due to changes in sea-water chemistry with increasing carbon dioxide concentrations. Rises in sea level will probably disrupt human communities and their cultures by making coral cays uninhabitable, whereas coral reefs will sustain minimal damage from the rise in sea level. The short-term (decades) prognosis is that major reductions are almost certain in the extent and biodiversity of coral reefs, and severe disruptions to cultures and economies dependent on reef resources will occur. The long-term (centuries to millennia) prognosis is more encouraging because coral reefs have remarkable resilience to severe disruption and will probably show this resilience in the future when climate changes either stabilize or reverse.

  16. A comparison of threats, vulnerabilities and management approaches in global seagrass bioregions

    International Nuclear Information System (INIS)

    Grech, Alana; Chartrand-Miller, Katie; McKenzie, Len; Rasheed, Michael; Taylor, Helen; Coles, Rob; Erftemeijer, Paul; Fonseca, Mark

    2012-01-01

    Global seagrass habitats are threatened by multiple anthropogenic factors. Effective management of seagrasses requires information on the relative impacts of threats; however, this information is rarely available. Our goal was to use the knowledge of experts to assess the relative impacts of anthropogenic activities in six global seagrass bioregions. The activities that threaten seagrasses were identified at an international seagrass workshop and followed with a web-based survey to collect seagrass vulnerability information. There was a global consensus that urban/industrial runoff, urban/port infrastructure development, agricultural runoff and dredging had the greatest impact on seagrasses, though the order of relative impacts varied by bioregion. These activities are largely terrestrially based, highlighting the need for marine planning initiatives to be co-ordinated with adjacent watershed planning. Sea level rise and increases in the severity of cyclones were ranked highest relative to other climate change related activities, but overall the five climate change activities were ranked low and experts were uncertain of their effects on seagrasses. The experts’ preferred mechanism of delivering management outcomes were processes such as policy development, planning and consultation rather than prescriptive management tools. Our approach to collecting expert opinion provides the required data to prioritize seagrass management actions at bioregional scales. (letter)

  17. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability.

    Science.gov (United States)

    Lu, Yonglong; Yuan, Jingjing; Lu, Xiaotian; Su, Chao; Zhang, Yueqing; Wang, Chenchen; Cao, Xianghui; Li, Qifeng; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, Simon; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-08-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients, increasing metals and persistent organic pollutants (POPs), and climate change have led to severe ecological degradation in the coastal zone, while few studies have focused on the combined impacts of pollution and climate change on the coastal ecosystems at the global level. A global overview of nutrients, metals, POPs, and major environmental changes due to climate change and their impacts on coastal ecosystems was carried out in this study. Coasts of the Eastern Atlantic and Western Pacific were hotspots of concentrations of several pollutants, and mostly affected by warming climate. These hotspots shared the same features of large populations, heavy industry and (semi-) closed sea. Estimation of coastal ocean capital, integrated management of land-ocean interaction in the coastal zone, enhancement of integrated global observation system, and coastal ecosystem-based management can play effective roles in promoting sustainable management of coastal marine ecosystems. Enhanced management from the perspective of mitigating pollution and climate change was proposed. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Additive threats from pathogens, climate and land-use change for global amphibian diversity

    DEFF Research Database (Denmark)

    Hof, Christian; Bastos Araujo, Miguel; Jetz, Walter

    2011-01-01

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change...... to be found in Africa, parts of northern South America and the Andes. Regions with the highest projected impact of land-use and climate change coincide, but there is little spatial overlap with regions highly threatened by the fungal disease. Overall, the areas harbouring the richest amphibian faunas...... and spread of the pathogenic fungal disease chytridiomycosis. Here we assess the spatial distribution and interactions of these primary threats in relation to the global distribution of amphibian species. We show that the greatest proportions of species negatively affected by climate change are projected...

  19. Health system strengthening: prospects and threats for its sustainability on the global health policy agenda.

    Science.gov (United States)

    Naimoli, Joseph F; Saxena, Sweta; Hatt, Laurel E; Yarrow, Kristina M; White, Trenton M; Ifafore-Calfee, Temitayo

    2018-01-01

    In 2013, Hafner and Shiffman applied Kingdon's public policy process model to explain the emergence of global attention to health system strengthening (HSS). They questioned, however, HSS's sustainability on the global health policy agenda, citing various concerns. Guided by the Grindle and Thomas interactive model of policy implementation, we advance and elaborate a proposition: a confluence of developments will contribute to maintaining HSS's prominent place on the agenda until at least 2030. Those developments include (1) technical, managerial, financial, and political responses to unpredictable public health crises that imperil the routine functioning of health systems, such as the 2014-2015 Ebola virus disease (Ebola) epidemic in West Africa; (2) similar responses to non-crisis situations requiring fully engaged, robust health systems, such as the pursuit of the new Sustainable Development Goal for health (SDG3); and (3) increased availability of new knowledge about system change at macro, meso, and micro levels and its effects on people's health and well-being. To gauge the accuracy of our proposition, we carried out a speculative assessment of credible threats to our premise by discussing all of the Hafner-Shiffman concerns. We conclude that (1) the components of our proposition and other forces that have the potential to promote continuing attention to HSS are of sufficient strength to counteract these concerns, and (2) prospective monitoring of HSS agenda status and further research on agenda sustainability can increase confidence in our threat assessment. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  1. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  2. Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat

    Science.gov (United States)

    2016-06-10

    personnel, outside of military police and DoD-contracted civilian LE, to provide an additional layer of security in the workplace . Augmented security does...Research, context, and conclusions from this study may prove that seemingly riskier, yet more secure; measures exist to further empower installation...commanders with safeguarding DoD men and women from active shooter attacks. Conclusion DoD leadership and commanders at all levels have the

  3. Antibiotic resistance as a global threat: Evidence from China, Kuwait and the United States

    Directory of Open Access Journals (Sweden)

    Rotimi Vincent

    2006-04-01

    Full Text Available Abstract Background Antimicrobial resistance is an under-appreciated threat to public health in nations around the globe. With globalization booming, it is important to understand international patterns of resistance. If countries already experience similar patterns of resistance, it may be too late to worry about international spread. If large countries or groups of countries that are likely to leap ahead in their integration with the rest of the world – China being the standout case – have high and distinctive patterns of resistance, then a coordinated response could substantially help to control the spread of resistance. The literature to date provides only limited evidence on these issues. Methods We study the recent patterns of antibiotic resistance in three geographically separated, and culturally and economically distinct countries – China, Kuwait and the United States – to gauge the range and depth of this global health threat, and its potential for growth as globalization expands. Our primary measures are the prevalence of resistance of specific bacteria to specific antibiotics. We also propose and illustrate methods for aggregating specific "bug-drug" data. We use these aggregate measures to summarize the resistance pattern for each country and to study the extent of correlation between countries' patterns of drug resistance. Results We find that China has the highest level of antibiotic resistance, followed by Kuwait and the U.S. In a study of resistance patterns of several most common bacteria in China in 1999 and 2001, the mean prevalence of resistance among hospital-acquired infections was as high as 41% (with a range from 23% to 77% and that among community- acquired infections was 26% (with a range from 15% to 39%. China also has the most rapid growth rate of resistance (22% average growth in a study spanning 1994 to 2000. Kuwait is second (17% average growth in a period from 1999 to 2003, and the U.S. the lowest (6% from

  4. 'Vulnerability is universal': considering the place of 'security' and 'vulnerability' within contemporary global health discourse.

    Science.gov (United States)

    Brown, Tim

    2011-02-01

    The question of global health has, at least since 9/11, (re)emerged as one of the world's key geopolitical issues and, as many scholars have noted, this increased attention to the state of world health is especially focused on questions of national security and vulnerability. Despite its prominence in political, health policy and scholarly circles, health geographers have tended to overlook this particular aspect of global health discourse. This paper seeks to redress this lacuna. It does so for three reasons. The first lies in the idea that this discourse is inherently geographical; after all, it is in essence concerned with the flows of human and non-human agents within and, more importantly here, across, national borders. It is also of interest because a focus on vulnerability allows for an analysis that goes beyond the current fixation with emerging and re-emerging infectious diseases. Although it is certainly true that the concern with such diseases dominates, and the recent focus upon H1N1 swine flu is testament to that, there is also a suggestion that the processes associated with the enhanced threat posed by these diseases are similar to those that have caused non-communicable diseases to become a global health problem too. A third reason for focussing on this aspect of the global health discourse is that the subsequent search for 'security' is highly problematic; especially if we consider the question of "who is to be protected, and from what". The aim of the paper is, then, to offer a critical review of the international discourse on global health and to highlight its relevance to scholars that self-identify as health and medical geographers. Copyright © 2010 Elsevier Ltd. All rights reserved.

  5. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  6. Global Food Security in a Changing Climate: Considerations and Projections

    Science.gov (United States)

    Walsh, M. K.; Brown, M. E.; Backlund, P. W.; Antle, J. M.; Carr, E. R.; Easterling, W. E.; Funk, C. C.; Murray, A.; Ngugi, M.; Barrett, C. B.; Ingram, J. S. I.; Dancheck, V.; O'Neill, B. C.; Tebaldi, C.; Mata, T.; Ojima, D. S.; Grace, K.; Jiang, H.; Bellemare, M.; Attavanich, W.; Ammann, C. M.; Maletta, H.

    2015-12-01

    Global food security is an elusive challenge and important policy focus from the community to the globe. Food is provisioned through food systems that may be simple or labyrinthine, yet each has vulnerabilities to climate change through its effects on food production, transportation, storage, and other integral food system activities. At the same time, the future of food systems is sensitive to socioeconomic trajectories determined by choices made outside of the food system, itself. Constrictions for any reason can lead to decreased food availability, access, utilization, or stability - that is, to diminished food security. Possible changes in trade and other U.S. relationships to the rest of the world under changing conditions to the end of the century are considered through integrated assessment modelling under a range of emissions scenarios. Climate change is likely to diminish continued progress on global food security through production disruptions leading to local availability limitations and price increases, interrupted transport conduits, and diminished food safety, among other causes. In the near term, some high-latitude production export regions may benefit from changes in climate. The types and price of food imports is likely to change, as are export demands, affecting U.S. consumers and producers. Demands placed on foreign assistance programs may increase, as may demand for advanced technologies. Adaptation across the food system has great potential to manage climate change effects on food security, and the complexity of the food system offers multiple potential points of intervention for decision makers at every level. However, effective adaptation is subject to highly localized conditions and socioeconomic factors, and the technical feasibility of an adaptive intervention is not necessarily a guarantee of its application if it is unaffordable or does not provide benefits within a relatively short time frame.

  7. Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.; van Tiel, F.

    2011-01-01

    Virtualization is one of the enabling technologies of cloud computing. It turns once dedicated physical computing resources such as servers into digital resources that can be provisioned on demand. Cloud computing thus tends to replace physical with digital security controls, and cloud security must

  8. From flip-flopping stereotypes to desecuritizing hybridity: Muslims as threats and security providers in Danish broadcast drama series

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2017-01-01

    by negative stereotypes; another is encouraged by how the very same stereotypes are ironically taken to extremes. Bearing in mind the intimate relation between identity and security, however, the stereotypical representation of difference is never innocent. The overall narratives of Danish public service...... broadcast series such as The Killing, Government and The Protectors rely on stereotypical security policy narratives identifying Muslims as threats. Even when stereotypes are creatively articulated to reverse the negative valuation, Muslim roles are distinctly charged or ‘securitized’ when compared to non......-Muslim roles. However, placing the ‘Muslim’ character centre stage allows a separate level of representation of a distinct role in the way stories articulate stereotypes, facilitating hybrid identities....

  9. New realities: Disarmament, peace-building and global security

    International Nuclear Information System (INIS)

    1993-01-01

    This publication contains excerpts from the conference on new realities: Disarmament, peace-building and global security organized by the Non-Governmental Organization Committee on Disarmament at the United Nations, 20-23 April, 1993, during the regular session of the Disarmament Commission which took place in New York in April-May, 1993. This conference focused on important and topical disarmament and peacemaking issues, and was an opportunity for delegates, non-governmental organization representatives, United Nations staff members and interested individuals to exchange information and discuss the issues in an informal and cordial atmosphere

  10. The global energy challenge: new challenges and threats, the ways to overcome them

    Directory of Open Access Journals (Sweden)

    Alexandr N. Zakharov

    2017-01-01

    Full Text Available The article describes key aspects of global energy issues, with an emphasis on energy security. The Russian Federation is to face three inter-related challenges: provide energy security, stimulate economic growth and protect the environment, reducing emissions of greenhouse gases that will reduce the level of air pollution and contribute to the global improvement of the atmosphere. The author analyzes the status and prospects of world energy markets and the forecast of their development for the period up to 2050. As the main trend the development of smalldistributed generation is highlighted, primarily in developing countries. The article justifies the importance of energy efficiency increase in Russia. In our country per unit of GDP consumes two times more energy than the member countries of the IEA, but a noticeable improvement has not yet been achieved. Meanwhile, aging, and often obsolete infrastructure in the electricity and district heat is in urgent need of investment. Attracting investment in the modernization and improvement of energy efficiency can be provided with the following key measures: reducing the dependence of fuel and energy complex on equipment imports; the research of renewable energy sources (RES; development of the most cost-effective oil and gas reserves and the change in export strategy.

  11. Organic pollution of rivers: Combined threats of urbanization, livestock farming and global climate change.

    Science.gov (United States)

    Wen, Yingrong; Schoups, Gerrit; van de Giesen, Nick

    2017-02-23

    Organic pollution of rivers by wastewater discharge from human activities negatively impacts people and ecosystems. Without treatment, pollution control relies on a combination of natural degradation and dilution by natural runoff to reduce downstream effects. We quantify here for the first time the global sanitation crisis through its impact on organic river pollution from the threats of (1) increasing wastewater discharge due to urbanization and intensification of livestock farming, and (2) reductions in river dilution capacity due to climate change and water extractions. Using in-stream Biochemical Oxygen Demand (BOD) as an overall indicator of organic river pollution, we calculate historical (2000) and future (2050) BOD concentrations in global river networks. Despite significant self-cleaning capacities of rivers, the number of people affected by organic pollution (BOD >5 mg/l) is projected to increase from 1.1 billion in 2000 to 2.5 billion in 2050. With developing countries disproportionately affected, our results point to a growing need for affordable wastewater solutions.

  12. Mercury contamination, a potential threat to the globally endangered aquatic warbler Acrocephalus paludicola.

    Science.gov (United States)

    Pacyna, Aneta Dorota; Martínez, Carlos Zumalacárregui; Miguélez, David; Jiguet, Frédéric; Polkowska, Żaneta; Wojczulanis-Jakubas, Katarzyna

    2017-12-01

    Mercury (Hg) contamination is considered a global concern for humans and wildlife, and although the number of studies dealing with that issue continues to increase, some taxonomic groups such as small passerine birds are largely understudied. In this paper, concentration of mercury in the aquatic warbler (Acrocephalus paludicola) feathers, a globally threatened passerine species, was examined. The concentration differences between two ages and sexes were investigated. The comparison of feathers taken on autumn migrants of two age categories act as a comparison of the species' exposure within the two different areas (European breeding or African wintering grounds). The average Hg concentration for all sampled individuals [2.32 μg/g dw (range 0.38-12.76)] is relatively high, compared with values found in other passerine species. An age difference was found, with first-year individuals displaying higher mercury concentrations than adults. This indicates that birds are exposed to mercury pollution during the breeding season, i.e., in the continental floodplains of eastern Europe. The average Hg concentration in feathers grown on the breeding grounds was 3.88 ± 2.59 μg/g dw, closer to the critical value of 5 μg/g dw, which is considered to impair the health of individuals. The findings suggest that mercury pollution may constitute a threat so far neglected for the endangered aquatic warbler.

  13. The global threat reduction initiative and conversion of isotope production to LEU targets

    International Nuclear Information System (INIS)

    Kuperman, A. J.

    2005-01-01

    The U.S. Global Threat Reduction Initiative (GTRI) has given a decisive impetus to the RERTR program's longstanding goal of converting worldwide production of medical radioisotopes from reliance on bomb-grade, highly enriched uranium (HEU) to low-enriched uranium (LEU) unsuitable for weapons. Although the four major; isotope producers continue to resist calls for conversion, they face mounting pressure from a variety of fronts including: (1) GTRI; (2) a related, multilateral U.S. initiative to forge agreement on conversion among the states that are home to the major producers; (3) an IAEA effort to provide technical assistance that will facilitate large-scale production of medical isotopes using LEU by producers who seek to do so; (4) planned production in the United States of substantial quantities of medical isotopes using LEU; and (5) pending U.S. legislation that would prohibit the export of HEU for production of isotopes as soon as alternative, LEU-produced isotopes are available. Accordingly, it now appears inevitable that worldwide isotope production will be converted from reliance on HEU to LEU. The only remaining question is which producers will be the first to reliably deliver sizeable quantities of LEU-produced isotopes and thereby capture global market share from the others. (author)

  14. Organic pollution of rivers: Combined threats of urbanization, livestock farming and global climate change

    Science.gov (United States)

    Wen, Yingrong; Schoups, Gerrit; van de Giesen, Nick

    2017-02-01

    Organic pollution of rivers by wastewater discharge from human activities negatively impacts people and ecosystems. Without treatment, pollution control relies on a combination of natural degradation and dilution by natural runoff to reduce downstream effects. We quantify here for the first time the global sanitation crisis through its impact on organic river pollution from the threats of (1) increasing wastewater discharge due to urbanization and intensification of livestock farming, and (2) reductions in river dilution capacity due to climate change and water extractions. Using in-stream Biochemical Oxygen Demand (BOD) as an overall indicator of organic river pollution, we calculate historical (2000) and future (2050) BOD concentrations in global river networks. Despite significant self-cleaning capacities of rivers, the number of people affected by organic pollution (BOD >5 mg/l) is projected to increase from 1.1 billion in 2000 to 2.5 billion in 2050. With developing countries disproportionately affected, our results point to a growing need for affordable wastewater solutions.

  15. Threat of plastic pollution to seabirds is global, pervasive, and increasing

    Science.gov (United States)

    Wilcox, Chris; Van Sebille, Erik; Hardesty, Britta Denise

    2015-01-01

    Plastic pollution in the ocean is a global concern; concentrations reach 580,000 pieces per km2 and production is increasing exponentially. Although a large number of empirical studies provide emerging evidence of impacts to wildlife, there has been little systematic assessment of risk. We performed a spatial risk analysis using predicted debris distributions and ranges for 186 seabird species to model debris exposure. We adjusted the model using published data on plastic ingestion by seabirds. Eighty of 135 (59%) species with studies reported in the literature between 1962 and 2012 had ingested plastic, and, within those studies, on average 29% of individuals had plastic in their gut. Standardizing the data for time and species, we estimate the ingestion rate would reach 90% of individuals if these studies were conducted today. Using these results from the literature, we tuned our risk model and were able to capture 71% of the variation in plastic ingestion based on a model including exposure, time, study method, and body size. We used this tuned model to predict risk across seabird species at the global scale. The highest area of expected impact occurs at the Southern Ocean boundary in the Tasman Sea between Australia and New Zealand, which contrasts with previous work identifying this area as having low anthropogenic pressures and concentrations of marine debris. We predict that plastics ingestion is increasing in seabirds, that it will reach 99% of all species by 2050, and that effective waste management can reduce this threat. PMID:26324886

  16. Threat of plastic pollution to seabirds is global, pervasive, and increasing.

    Science.gov (United States)

    Wilcox, Chris; Van Sebille, Erik; Hardesty, Britta Denise

    2015-09-22

    Plastic pollution in the ocean is a global concern; concentrations reach 580,000 pieces per km(2) and production is increasing exponentially. Although a large number of empirical studies provide emerging evidence of impacts to wildlife, there has been little systematic assessment of risk. We performed a spatial risk analysis using predicted debris distributions and ranges for 186 seabird species to model debris exposure. We adjusted the model using published data on plastic ingestion by seabirds. Eighty of 135 (59%) species with studies reported in the literature between 1962 and 2012 had ingested plastic, and, within those studies, on average 29% of individuals had plastic in their gut. Standardizing the data for time and species, we estimate the ingestion rate would reach 90% of individuals if these studies were conducted today. Using these results from the literature, we tuned our risk model and were able to capture 71% of the variation in plastic ingestion based on a model including exposure, time, study method, and body size. We used this tuned model to predict risk across seabird species at the global scale. The highest area of expected impact occurs at the Southern Ocean boundary in the Tasman Sea between Australia and New Zealand, which contrasts with previous work identifying this area as having low anthropogenic pressures and concentrations of marine debris. We predict that plastics ingestion is increasing in seabirds, that it will reach 99% of all species by 2050, and that effective waste management can reduce this threat.

  17. Management of Global Nuclear Materials for International Security

    International Nuclear Information System (INIS)

    Isaacs, T; Choi, J-S

    2003-01-01

    Nuclear materials were first used to end the World War II. They were produced and maintained during the cold war for global security reasons. In the succeeding 50 years since the Atoms for Peace Initiative, nuclear materials were produced and used in global civilian reactors and fuel cycles intended for peaceful purposes. The Nonproliferation Treaty (NPT) of 1970 established a framework for appropriate applications of both defense and civilian nuclear activities by nuclear weapons states and non-nuclear weapons states. As global inventories of nuclear materials continue to grow, in a diverse and dynamically changing manner, it is time to evaluate current and future trends and needed actions: what are the current circumstances, what has been done to date, what has worked and what hasn't? The aim is to identify mutually reinforcing programmatic directions, leading to global partnerships that measurably enhance international security. Essential elements are material protection, control and accountability (MPC and A) of separated nuclear materials, interim storage, and geologic repositories for all nuclear materials destined for final disposal. Cooperation among key partners, such as the MPC and A program between the U.S. and Russia for nuclear materials from dismantled weapons, is necessary for interim storage and final disposal of nuclear materials. Such cooperative partnerships can lead to a new nuclear regime where a complete fuel cycle service with fuel leasing and spent fuel take-back can be offered to reactor users. The service can effectively minimize or even eliminate the incentive or rationale for the user-countries to develop their indigenous enrichment and reprocessing technologies. International cooperation, supported by governments of key countries can be best to facilitate the forum for formation of such cooperative partnerships

  18. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    International Nuclear Information System (INIS)

    McDonald, K; Curran, B

    2014-01-01

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusion Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment

  19. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, K [Mayo Clinic, Rochester, MN (United States); Curran, B [The Warren Alpert Medical School of Brown University, Providence, RI (United States)

    2014-06-15

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusion Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.

  20. The Sustainable Development Goals and the Global Health Security Agenda: exploring synergies for a sustainable and resilient world.

    Science.gov (United States)

    Bali, Sulzhan; Taaffe, Jessica

    2017-05-01

    Both the Sustainable Development Goals (SDGs) and the Global Health Security Agenda (GHSA) represent bold initiatives to address systematically gaps in previous efforts to assure that societies can be resilient when confronted with potentially overwhelming threats to health. Despite their obvious differences, and differing criticisms of both, they shift away from vertical (problem- or disease-specific) to horizontal (comprehensive) solutions. Despite the comprehensiveness of the SDGs, they lack a specific target for global health security. The GHSA focuses primarily on infectious diseases and neglects non-communicable diseases and socioeconomic drivers of health. Even though each agenda has limitations and unique challenges, they are complementary. We discuss ways to understand and implement the two agendas synergistically to hasten progress toward a more sustainable and resilient world.

  1. Securing services in the cloud: an investigation of the threats and the mitigations

    Science.gov (United States)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  2. The application of nuclear and national security safeguard strategies to the insider threat in the private sector

    International Nuclear Information System (INIS)

    Campbell, G.K.

    1991-01-01

    This paper reports that the insider threat in commercial enterprises represents multi-billion dollar losses on an annual basis. While much of this experience is in low value, theft-related shrinkage, there are a growing number of organizations where the loss or compromise of critical assets or interruption of vital systems cannot be tolerated. In very real ways, the survival of the organization may turn on the hostile acts of knowledgeable insiders. The nuclear and National security information operations environments represents a baseline of experience from which the corporate world can draw for cost-effective, alternative approaches to this threat. However, it is equally clear that there are a variety of subtle and obvious constraints imposed by the private sector's mission, service delivery, lifestyle and cost-benefit requirements which dictate careful planning and user involvement in safeguards development and application. Where protection of our National security assets are grounded in a consequence-driven set of policies and standards, the private sector is often subject to the lack of a similar (but directly analogous) policy foundation

  3. Contributions of the US Centers for Disease Control and Prevention in Implementing the Global Health Security Agenda in 17 Partner Countries.

    Science.gov (United States)

    Fitzmaurice, Arthur G; Mahar, Michael; Moriarty, Leah F; Bartee, Maureen; Hirai, Mitsuaki; Li, Wenshu; Gerber, A Russell; Tappero, Jordan W; Bunnell, Rebecca

    2017-12-01

    The Global Health Security Agenda (GHSA), a partnership of nations, international organizations, and civil society, was launched in 2014 with a mission to build countries' capacities to respond to infectious disease threats and to foster global compliance with the International Health Regulations (IHR 2005). The US Centers for Disease Control and Prevention (CDC) assists partner nations to improve IHR 2005 capacities and achieve GHSA targets. To assess progress through these CDC-supported efforts, we analyzed country activity reports dating from April 2015 through March 2017. Our analysis shows that CDC helped 17 Phase I countries achieve 675 major GHSA accomplishments, particularly in the cross-cutting areas of public health surveillance, laboratory systems, workforce development, and emergency response management. CDC's engagement has been critical to these accomplishments, but sustained support is needed until countries attain IHR 2005 capacities, thereby fostering national and regional health protection and ensuring a world safer and more secure from global health threats.

  4. 76 FR 36560 - Extension of Agency Information Collection Activity Under OMB Review: Security Threat Assessment...

    Science.gov (United States)

    2011-06-22

    .... The collection involves applicant submission of biometric and biographic information for TSA's... of Information Technology (OIT), TSA-11, Transportation Security Administration, 601 South 12th..., electronic, mechanical, or other technological collection techniques or other forms of information technology...

  5. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  6. Climate resilient crops for improving global food security and safety.

    Science.gov (United States)

    Dhankher, Om Parkash; Foyer, Christine H

    2018-05-01

    Food security and the protection of the environment are urgent issues for global society, particularly with the uncertainties of climate change. Changing climate is predicted to have a wide range of negative impacts on plant physiology metabolism, soil fertility and carbon sequestration, microbial activity and diversity that will limit plant growth and productivity, and ultimately food production. Ensuring global food security and food safety will require an intensive research effort across the food chain, starting with crop production and the nutritional quality of the food products. Much uncertainty remains concerning the resilience of plants, soils, and associated microbes to climate change. Intensive efforts are currently underway to improve crop yields with lower input requirements and enhance the sustainability of yield through improved biotic and abiotic stress tolerance traits. In addition, significant efforts are focused on gaining a better understanding of the root/soil interface and associated microbiomes, as well as enhancing soil properties. © 2018 The Authors Plant, Cell & Environment Published by John Wiley & Sons Ltd.

  7. Design Basis Threat (DBT) Approach for the First NPP Security System in Indonesia

    International Nuclear Information System (INIS)

    Ign Djoko Irianto

    2004-01-01

    Design Basis Threat (DBT) is one of the main factors to be taken into account in the design of physical protection system of nuclear facility. In accordance with IAEA's recommendations outlined in INFCIRC/225/Rev.4 (Corrected), DBT is defined as: attributes and characteristics of potential insider and/or external adversaries, who might attempt unauthorized removal of nuclear material or sabotage against the nuclear facilities. There are three types of adversary that must be considered in DBT, such as adversary who comes from the outside (external adversary), adversary who comes from the inside (internal adversary), and adversary who comes from outside and colludes with insiders. Current situation in Indonesia, where many bomb attacks occurred, requires serious attention on DBT in the physical protection design of NPP which is to be built in Indonesia. This paper is intended to describe the methodology on how to create and implement a Design Basis Threat in the design process of NPP physical protection in Indonesia. (author)

  8. Chinese-Latin American Ties: A Convergence of Security Threats to the United States

    Science.gov (United States)

    2013-06-14

    of action. This technique provides both advantages and disadvantages . It will consider the potential for exploitation of developing countries and...characteristics disadvantageous to China. 3. Opportunities are vulnerabilities that China could exploit to Beijing’s advantage. 4. Threats are elements...leadership and funding, al Qaeda franchises are turning to criminal activities for fundraising and their objectives are shifting away from purely political

  9. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part

  10. "The Islamic State Of Iraq And The Levant" (ISIL In The System Of Threats To The National Security Of Russia

    Directory of Open Access Journals (Sweden)

    Pavel V. Agapov

    2014-09-01

    Full Text Available In the present work authors analyze political, economic, military and many other aspects of the "Islamic State of Iraq and Levant" activity as essential factor of the destabilization in the region of the Middle East. Authors investigate destructive consequences of this terrorist religious group's positions strengthening for the national security of the Russian Federation and border states. Authors note that actions in Syria and Iraq have indirect, but transnational effect, pose threat to the interests of the national security of Russia, especially including one, conducted in Crimea with the use of Islamic radicals for this purpose, who are on the peninsula and territory of the Ukraine. In the present article authors note that every year in the process of the population's psychological fatigue strengthening, new losses among the military personnel and the intelligence services staff and also death of peaceful citizens, their positions will only amplify. "Defeatism" will become a powerful political force. Problem of the international legal aspect of the counteraction to the threat from the actions of foreign fighters-terrorists who are hired or accepted with ISIL, al-Nusra Front and other groups and organizations of the terrorist orientation is connected with the implementation of the UN Security Council Resolution 2178 (2014 made on September 24, 2014. It’s main objective – development of the nonviolent ways of the conflicts prevention and settlement for the purposes of the radicalization to the level generating terrorism risk degree decrease. In the conclusion authors argument that it is especially actual for the Russian regions, which is extremely vulnerable to extremism (North Caucasus, Volga Region.

  11. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  12. Global Warming: Threat to Sundarbans and the Silence of Indo-Bangladesh Mass Media

    Directory of Open Access Journals (Sweden)

    Moumita Basu

    2018-02-01

    Full Text Available The Sundarbans or the ‘beautiful forest’ is a cluster of low-lying islands in the Bay of Bengal, considered as one of the natural wonders of the world, which is facing the problem of global warming since the past few decades. Global warming, climate change, increasing water level and salinity of the river as well as inlet areas are some recognized threats to the Sundarbans. This is threatening species survival, the health of natural systems and causing extinction of biodiversity. This study is a modest attempt to examine the factors because of which the burning issues of Sundarbans are almost excluded from the attention of the media in India as well as Bangladesh. This is despite the fact that various initiatives have been taken by the governments and at the private level in these two countries to conserve the Sundarbans ecosystem. The research paper summarizes findings of newspaper reports on Sundarbans, from Earth Day to World Environment Day 2017 (22 April to 5 June of two reputed broadsheets dailies i.e. The Daily Prothom Alo (Dhaka, Bangladesh and The Ei Samay Sangbadpatra (Kolkata, India. The youngest member of the mass communication family, the film has also been included in this paper. This is because the joint production of the two Bengali film industries has already made a lot of cinema. There is going to be more in the near future, where many issues of India and Bangladesh are getting priority, but the destruction of Sundarbans has never been the subject of any such media intervention.

  13. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Casella, Amanda J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pereira, Mario M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Steen, Franciska H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-01-01

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  14. Role of nuclear material accounting and control on nuclear security. Countermeasure against insider threat

    International Nuclear Information System (INIS)

    Osabe, Takeshi

    2014-01-01

    Possibility on unauthorized removal (theft) of nuclear material by a facility insider is a recognized as a serious threat. An insider could take advantage or knowledge of control system and access to nuclear material to intercept facility's system designed to protect theft of nuclear material by an insider. This paper will address how the facility level Nuclear Material Accounting and Control (NMAC) System should be designed and implemented to enhance deterring and detect theft of nuclear material by a facility insider. (author)

  15. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  16. Novel data visualizations of X-ray data for aviation security applications using the Open Threat Assessment Platform (OTAP)

    Science.gov (United States)

    Gittinger, Jaxon M.; Jimenez, Edward S.; Holswade, Erica A.; Nunna, Rahul S.

    2017-02-01

    This work will demonstrate the implementation of a traditional and non-traditional visualization of x-ray images for aviation security applications that will be feasible with open system architecture initiatives such as the Open Threat Assessment Platform (OTAP). Anomalies of interest to aviation security are fluid, where characteristic signals of anomalies of interest can evolve rapidly. OTAP is a limited scope open architecture baggage screening prototype that intends to allow 3rd-party vendors to develop and easily implement, integrate, and deploy detection algorithms and specialized hardware on a field deployable screening technology [13]. In this study, stereoscopic images were created using an unmodified, field-deployed system and rendered on the Oculus Rift, a commercial virtual reality video gaming headset. The example described in this work is not dependent on the Oculus Rift, and is possible using any comparable hardware configuration capable of rendering stereoscopic images. The depth information provided from viewing the images will aid in the detection of characteristic signals from anomalies of interest. If successful, OTAP has the potential to allow for aviation security to become more fluid in its adaptation to the evolution of anomalies of interest. This work demonstrates one example that is easily implemented using the OTAP platform, that could lead to the future generation of ATR algorithms and data visualization approaches.

  17. A threat-vulnerability based risk analysis model for cyber physical system security

    CSIR Research Space (South Africa)

    Ledwaba, Lehlogonolo

    2017-01-01

    Full Text Available model. An analysis of the Natanz system shows that, with an actual case security-risk score at Mitigation level 5, the infested facilities barely avoided a situation worse than the one which occurred. The paper concludes with a discussion on the need...

  18. Global food and fibre security threatened by current inefficiencies in fungal identification

    Science.gov (United States)

    2016-01-01

    Fungal pathogens severely impact global food and fibre crop security. Fungal species that cause plant diseases have mostly been recognized based on their morphology. In general, morphological descriptions remain disconnected from crucially important knowledge such as mating types, host specificity, life cycle stages and population structures. The majority of current fungal species descriptions lack even the most basic genetic data that could address at least some of these issues. Such information is essential for accurate fungal identifications, to link critical metadata and to understand the real and potential impact of fungal pathogens on production and natural ecosystems. Because international trade in plant products and introduction of pathogens to new areas is likely to continue, the manner in which fungal pathogens are identified should urgently be reconsidered. The technologies that would provide appropriate information for biosecurity and quarantine already exist, yet the scientific community and the regulatory authorities are slow to embrace them. International agreements are urgently needed to enforce new guidelines for describing plant pathogenic fungi (including key DNA information), to ensure availability of relevant data and to modernize the phytosanitary systems that must deal with the risks relating to trade-associated plant pathogens. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080994

  19. The Threats Model Construction by means of Fuzzy Cognitive Map on the basis of the Networks Security Policy

    Directory of Open Access Journals (Sweden)

    M. B. Guzairov

    2011-06-01

    Full Text Available The threats matrix construction on the basis of the access matrixes is discussed. Development of threats model on the basis of fuzzy cognitive maps displaying the threats spreading pathways from attack sources to objects is described.

  20. Hybrid Wars: The 21 st -Century's New Threats to Global Peace and ...

    African Journals Online (AJOL)

    cyber-terrorism' and 'cyber-war' against the backdrop of Russia's 'Ukrainian Spring' and the continuing threat posed by radical Islamist groups in Africa and the Middle East. It also discusses the findings of an on-going hybrid threat project by ...

  1. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  2. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    Science.gov (United States)

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  3. Security in software-defined wireless sensor networks: threats, challenges and potential solutions

    CSIR Research Space (South Africa)

    Pritchard, SW

    2017-07-01

    Full Text Available have focused on low resource cryptography methods to secure the network [27] - [29], [33]. Cryptography methods are separated into symmetric cryptography and asymmetric cryptography. While symmetric cryptography solutions are preferred due to low... implementation cost and efficiency [5], they present many problems when managing large networks and attempts to improve this cryptography for WSNs [11] have resulted in the cost of resources. Symmetric cryptography is also difficult to implement in software...

  4. The National Youth Service Corps Programme and Growing Security Threat in Nigeria

    Directory of Open Access Journals (Sweden)

    Chukwuemeka Okafor

    2014-06-01

    Full Text Available The National Youth Service Corps (NYSC was established in 1973 after the Nigerian civil war to involve Nigerian university graduates below the age of thirty in nation building. Gradually, the scheme was opened-up for polytechnic graduates.  The article presents the objectives and deployment policy of the programme. It shows that the early phase of the programme recorded the problems of corruption, ghost corps members, accommodation, language barriers as well as hostile culture. However, the contemporary Nigerian society has been overtaken by the destructive wind of insecurity. The article reveals that the various waves of political violence in the country, including Boko Haram terrorism, hostage crises, and geographical threats have turned into a collection of overwhelming menace to the programme, thereby leading to massive agitation for itabrogation. The article recommends for multiple series of reforms in order to protect the lives of many Nigerian graduates that are building the nation through this admirable development programme.

  5. Understanding the nature and threats of drug trafficking to national and regional security in West Africa

    Directory of Open Access Journals (Sweden)

    Kwesi Aning

    2014-02-01

    Full Text Available Several West African states are threatened by increasingly powerful transnational organised criminal networks. Yet, scholarly work on the nature, characteristics and strength of these groups and how their activities threaten states remains sparse, leading to misunderstandings and inadequate appreciation of the precise nature of the threats they pose to West Africa. This paper seeks to fill these lacunae in our knowledge. It focuses on the nexus between drugs, crime and terrorism. It argues that, the financial spin-offs from criminal activities contribute to the development of opportunistic relationships between criminals and extremist groups that threatens West Africa’s fragile states. The analyses are based on evidence from several West African states, but employ the ongoing crisis in the Sahel, particularly Mali, as an empirical case, to demonstrate how ‘profitable collusion’ among different actors permits hollow states to become edifices that allows corruption, criminality and impunity to flourish.

  6. Soil erosion, climate change and global food security: challenges and strategies.

    Science.gov (United States)

    Rhodes, Christopher J

    2014-01-01

    An overview is presented of the determined degree of global land degradation (principally occurring through soil erosion), with some consideration of its possible impact on global food security. Most determinations of the extent of land degradation (e.g. GLASOD) have been made on the basis of "expert judgement" and perceptions, as opposed to direct measurements of this multifactorial phenomenon. More recently, remote sensing measurements have been made which indicate that while some regions of the Earth are "browning" others are "greening". The latter effect is thought to be due to fertilisation of the growth of biomass by increasing levels of atmospheric CO2, and indeed the total amount of global biomass was observed to increase by 3.8% during the years 1981-2003. Nonetheless, 24% of the Earth's surface had occasioned some degree of degradation in the same time period. It appears that while long-term trends in NDVI (normalised difference vegetation index) derivatives are only broad indicators of land degradation, taken as a proxy, the NDVI/NPP (net primary productivity) trend is able to yield a benchmark that is globally consistent and to illuminate regions in which biologically significant changes are occurring. Thus, attention may be directed to where investigation and action at the ground level is required, i.e. to potential "hot spots" of land degradation and/or erosion. The severity of land degradation through soil erosion, and an according catastrophic threat to the survival of humanity may in part have been overstated, although the rising human population will impose inexorable demands for what the soil can provide. However the present system of industrialised agriculture would not be possible without plentiful provisions of cheap crude oil and natural gas to supply fuels, pesticides, herbicides and fertilisers. It is only on the basis of these inputs that it has been possible for the human population to rise above 7 billion. Hence, if the cheap oil and gas

  7. Arsenic contamination in food chain: Thread to global food security

    Science.gov (United States)

    Kashyap, C. A.

    2016-12-01

    The supply of good quality food is a necessity for economic and social health of urban and rural population. Over the last several decades groundwater contamination in developing countries has assumed dangerous levels as a result millions of people are at risk. This is so particularly with respect to arsenic that has registered high concentration in groundwater in countries like India and Bangladesh. The arsenic content in groundwater varies from 10 to 780 µg/L, which is far above the levels for drinking water standards prescribed by World Health Organization (WHO). Currently arsenic has entered in food chain due to irrigation with arsenic contaminated water. In the present study reports the arsenic contamination in groundwater that is being used for irrigating paddy in Manipur and West Bengal. The arsenic content in irrigation water is 475 µg/L and 780 µg/L in Manipur and West Bengal, respectively. In order to assess the effect of such waters on the rice crop, we collected rice plant from Manipur and determined the arsenic content in roots, stem, and grain. The arsenic content in grain varies from 110 to 190 mg/kg while the limit of arsenic intake by humans is 10 mg/kg (WHO). This problem is not confine to the area, it spread global level, and rice being cultivated in these regions is export to the other countries like USA, Middle East and Europe and will be thread to global food security.

  8. Historical evolution of human anthrax from occupational disease to potentially global threat as bioweapon.

    Science.gov (United States)

    D'Amelio, Enrico; Gentile, Bernardina; Lista, Florigio; D'Amelio, Raffaele

    2015-12-01

    Anthrax is caused by Bacillus anthracis, which can naturally infect livestock, wildlife and occupationally exposed humans. However, for its resistance due to spore formation, ease of dissemination, persistence in the environment and high virulence, B. anthracis has been considered the most serious bioterrorism agent for a long time. During the last century anthrax evolved from limited natural disease to potentially global threat if used as bioweapon. Several factors may mitigate the consequences of an anthrax attack, including 1. the capability to promptly recognize and manage the illness and its public health consequences; 2. the limitation of secondary contamination risk through an appropriate decontamination; and 3. the evolution of genotyping methods (for microbes characterization at high resolution level) that can influence the course and/or focus of investigations, impacting the response of the government to an attack. A PubMed search has been done using the key words “bioterrorism anthrax”. Over one thousand papers have been screened and the most significant examined to present a comprehensive literature review in order to discuss the current knowledge and strategies in preparedness for a possible deliberate release of B. anthracis spores and to indicate the most current and complete documents in which to deepen. The comprehensive analysis of the two most relevant unnatural anthrax release events, Sverdlovsk in the former Soviet Union (1979) and the contaminated letters in the USA (2001), shows that inhalational anthrax may easily and cheaply be spread resulting in serious consequences. The damage caused by an anthrax attack can be limited if public health organization, first responders, researchers and investigators will be able to promptly manage anthrax cases and use new technologies for decontamination methods and in forensic microbiology.

  9. Hydrological threats to riparian wetlands of international importance – a global quantitative and qualitative analysis

    Directory of Open Access Journals (Sweden)

    C. Schneider

    2017-06-01

    Full Text Available Riparian wetlands have been disappearing at an accelerating rate. Their ecological integrity as well as their vital ecosystem services for humankind depend on regular patterns of inundation and drying provided by natural flow regimes. However, river hydrology has been altered worldwide. Dams cause less variable flow regimes and water abstractions decrease the amount of flow so that ecologically important flood pulses are often reduced. Given growing population pressure and projected climate change, immediate action is required. However, the implementation of counteractive measures is often a complex task. This study develops a screening tool for assessing hydrological threats to riparian wetlands on global scales. The approach is exemplified on 93 Ramsar sites, many of which are located in transboundary basins. First, the WaterGAP3 hydrological modeling framework is used to quantitatively compare current and future modified flow regimes to reference flow conditions. In our simulations current water resource management seriously impairs riparian wetland inundation at 29 % of the analyzed sites. A further 8 % experience significantly reduced flood pulses. In the future, eastern Europe, western Asia, as well as central South America could be hotspots of further flow modifications due to climate change. Second, a qualitative analysis of the 93 sites determined potential impact on overbank flows resulting from planned or proposed dam construction projects. They take place in one-third of the upstream areas and are likely to impair especially wetlands located in South America, Asia, and the Balkan Peninsula. Third, based on the existing legal/institutional framework and water resource availability upstream, further qualitative analysis evaluated the capacity to preserve overbank flows given future streamflow changes due to dam construction and climate change. Results indicate hotspots of vulnerability exist, especially in northern Africa and the

  10. Safeguards and security by design (SSBD) for the domestic threat. Theft and sabotage

    International Nuclear Information System (INIS)

    DeMuth, Scott; Mullen, Mark; Pan, Paul

    2011-01-01

    In recent years, the Safeguards by Design (SBD) concept has received significant interest with respect to international (IAEA) safeguards objectives. However, less attention has been focused on the equally important topic of domestic (or national) Safeguards and Security by Design (SSBD), which addresses domestic requirements for material control and accounting (MC and A) and for physical protection, such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful uses to nuclear explosives purposes, domestic material control and accounting (MC and A) and physical protection are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE), and more specifically its Materials Protection, Accounting, and Control Technologies (MPACT) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts for international safeguards sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA. This paper identifies the key domestic safeguards and security requirements (i.e., MC and A and physical protection) and explains how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems. (author)

  11. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    International Nuclear Information System (INIS)

    Demuth, Scott F.; Mullen, Mark

    2011-01-01

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC and A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC and A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  12. The global partnership: its achievements, missed opportunities and potential to address future threats from the spread of CBRN materials and expertise - 59335

    International Nuclear Information System (INIS)

    Heyes, Alan; Bowen, Wyn; Chalmers, Hugh

    2012-01-01

    Document available in abstract form only. Full text of publication follows: In 2002, the G8 launched the Global Partnership (GP) against the Spread of Weapons and Materials of Mass Destruction. The partnerships budget was placed at $20 billion over 10 years, and it was supported by some 23 countries and the European Union (EU).Though it has had little public recognition, the partnership has been one of the G8's most successful initiatives and has led to many benefits, including improved international security and addressing a sizeable proportion of the Cold War nuclear and chemical weapons arsenal in the Former Soviet Union. Its future, however, remains undecided, as its funding is set to expire in less than two years. In 2009 and 2010 Kings College London with generous funding support from the US John D. and Catherine T. MacArthur Foundation, carried out a detailed evaluation of the achievements and benefits of the GP to date, its failings and lost opportunities, and potential future direction. Our findings indicate that the partnership has aided security in the Former Soviet Union and had a significant number of wider benefits with the potential to continue to do the same on a broader geographic level in future. As such, it is a valuable tool to assist the international community to work together to address global threats relating to chemical, biological, radiological and nuclear materials and related expertise and the G8 should take steps to renew its funding. (authors)

  13. The Insider Threat Security Architecture: An Integrated, Inseparable, and Uninterrupted Self-Protection Autonomic Framework

    Science.gov (United States)

    Jabbour, Ghassan

    2010-01-01

    The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…

  14. The Phenomenon of Ukrainian Poverty in the Context of Threats to National Security

    Directory of Open Access Journals (Sweden)

    Hrinenko Аndrei Yu.

    2018-03-01

    Full Text Available Poverty is one of the unresolved problems among the socio-economic components in Ukraine. According to recent researches, the majority of the population of our country is beyond the limit of poverty. Experts from both Ukraine and the international organizations, including the UN, have different estimates of extent of poverty in Ukraine, citing different methods of calculation. However, whatever estimates be given to this social phenomenon, all experts agree on one thing: poverty in Ukraine is aggravated and covers the wider population of the country. The phenomenon of Ukrainian poverty is that for more than a quarter of a century inequality in the income of the population is growing, the price of labor is falling, and, paradoxically, the Government contributes to the growth of poverty by its regulation and deregulation of the economy, financial and social spheres. Therefore, the greatest threat to conducting reforms, ensuring the economic growth, to the entire national economy today, is the exorbitant poverty, which not only provides for the increase in labor migration, but leads to the total emigration of skilled workers, who are highly valued by employers of the near and far abroad countries. And yet, despite the significant economic potential, available resources, Ukraine remains one of the poorest countries in Europe.

  15. Diplomatic advantages and threats in global health program selection, design, delivery and implementation: development and application of the Kevany Riposte.

    Science.gov (United States)

    Kevany, Sebastian

    2015-05-27

    Global health programs, as supported by organizations such as the Global Fund to Fight AIDS, Tuberculosis and Malaria and the President's Emergency Plan for AIDS Relief (PEPFAR), stand to make significant contributions to international medical outcomes. Traditional systems of monitoring and evaluation, however, fail to capture downstream, indirect, or collateral advantages (and threats) of intervention selection, design, and implementation from broader donor perspectives, including those of the diplomatic and foreign policy communities, which these programs also generate. This paper describes the development a new métier under which assessment systems designed to consider the diplomatic value of global health initiatives are described and applied based on previously-identified "Top Ten" criteria. The "Kevany Riposte" and the "K-Score" were conceptualized based on a retrospective and collective assessment of the author's participation in the design, implementation and delivery of a range of global health interventions related to the HIV/AIDS epidemic. Responses and associated scores reframe intervention worth or value in terms of global health diplomacy criteria such as "adaptability", "interdependence", "training," and "neutrality". Response options ranged from "highly advantageous" to "significant potential threat". Global health initiatives under review were found to generate significant advantages from the diplomatic perspective. These included (1) intervention visibility and associations with donor altruism and prestige, (2) development of international non-health collaborations and partnerships, (3) adaptability and responsiveness of service delivery to local needs, and (4) advancement of broader strategic goals of the international community. Corresponding threats included (1) an absence of formal training of project staff on broader political and international relations roles and responsibilities, (2) challenges to recipient cultural and religious practices

  16. Monitoring Global Food Security with New Remote Sensing Products and Tools

    Science.gov (United States)

    Budde, M. E.; Rowland, J.; Senay, G. B.; Funk, C. C.; Husak, G. J.; Magadzire, T.; Verdin, J. P.

    2012-12-01

    Global agriculture monitoring is a crucial aspect of monitoring food security in the developing world. The Famine Early Warning Systems Network (FEWS NET) has a long history of using remote sensing and crop modeling to address food security threats in the form of drought, floods, pests, and climate change. In recent years, it has become apparent that FEWS NET requires the ability to apply monitoring and modeling frameworks at a global scale to assess potential impacts of foreign production and markets on food security at regional, national, and local levels. Scientists at the U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center and the University of California Santa Barbara (UCSB) Climate Hazards Group have provided new and improved data products as well as visualization and analysis tools in support of the increased mandate for remote monitoring. We present our monitoring products for measuring actual evapotranspiration (ETa), normalized difference vegetation index (NDVI) in a near-real-time mode, and satellite-based rainfall estimates and derivatives. USGS FEWS NET has implemented a Simplified Surface Energy Balance (SSEB) model to produce operational ETa anomalies for Africa and Central Asia. During the growing season, ETa anomalies express surplus or deficit crop water use, which is directly related to crop condition and biomass. We present current operational products and provide supporting validation of the SSEB model. The expedited Moderate Resolution Imaging Spectroradiometer (eMODIS) production system provides FEWS NET with an improved NDVI dataset for crop and rangeland monitoring. eMODIS NDVI provides a reliable data stream with a relatively high spatial resolution (250-m) and short latency period (less than 12 hours) which allows for better operational vegetation monitoring. We provide an overview of these data and cite specific applications for crop monitoring. FEWS NET uses satellite rainfall estimates as inputs for

  17. Opaque Communities: A Framework for Assessing Potential Homeland Security Threats from Voids on the Map

    Science.gov (United States)

    2014-09-01

    and the amount of undiscovered clandestine activity mounts.39 Although this rubric is interchangeable between actors, it does not adequately...public assistance. The FLDS twin communities at Short Creek exhibit the highest global prevalence of fumarase deficiency, a rare genetic disorder that...Physician Finds Rare Disease in FLDS Kids; Genetic Disorder: About 20 Cases Have Been Discovered in 15 Years in Two Polygamous Towns; Rare Disorder Not

  18. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    Science.gov (United States)

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  19. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope......Protected areas are amongst the most important conservation responses to halt the loss of biodiversity and cover more than 12.7% of the terrestrial surface of earth. Likewise, protected areas are an important political instrument and a key component of the Convention for Biological Diversity (CBD......); seeking to protect at least 17% of the terrestrial surface and 10% of the coastal and marine areas by 2020. Protected areas are expected to deliver on many different objectives covering biodiversity, climate change mitigation, local livelihood, and cultural & esthetic values. Within each...

  20. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    Directory of Open Access Journals (Sweden)

    Mohamed S. Abdalzaher

    2016-06-01

    Full Text Available We present a study of using game theory for protecting wireless sensor networks (WSNs from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  1. Incorporating Global Information Security and Assurance in I.S. Education

    Science.gov (United States)

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  2. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  3. Construction of Structure of Indicators of Efficiency of Counteraction to Threats of Information Safety in Interests of the Estimation of Security of Information Processes in Computer Systems

    Directory of Open Access Journals (Sweden)

    A. P. Kurilo

    2010-06-01

    Full Text Available The theorem of system of indicators for an estimation of the security of information processes in the computer systems is formulated and proved. A number of the signs is proved, allowing to consider set of the indicators of efficiency of counteraction to the threats of information safety of the computer systems as the system.

  4. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  5. The First International Conference on Global Food Security – A Synthesis

    NARCIS (Netherlands)

    Ittersum, van M.K.; Giller, K.E.

    2014-01-01

    Improving food security is difficult. There are many reasons why hunger and malnutrition persist, not least because deep social inequities and conflicts often dominate. Equally many approaches are needed to deal with this global problem. In the case of global food security, improvements can depend

  6. The Globalization of Higher Education as a Societal and Cultural Security Problem

    Science.gov (United States)

    Samier, Eugenie A.

    2015-01-01

    In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…

  7. PERSPECTIVE: Climate change, biofuels, and global food security

    Science.gov (United States)

    Cassman, Kenneth G.

    2007-03-01

    There is a new urgency to improve the accuracy of predicting climate change impact on crop yields because the balance between food supply and demand is shifting abruptly from surplus to deficit. This reversal is being driven by a rapid rise in petroleum prices and, in response, a massive global expansion of biofuel production from maize, oilseed, and sugar crops. Soon the price of these commodities will be determined by their value as feedstock for biofuel rather than their importance as human food or livestock feed [1]. The expectation that petroleum prices will remain high and supportive government policies in several major crop producing countries are providing strong momentum for continued expansion of biofuel production capacity and the associated pressures on global food supply. Farmers in countries that account for a majority of the world's biofuel crop production will enjoy the promise of markedly higher commodity prices and incomesNote1. In contrast, urban and rural poor in food-importing countries will pay much higher prices for basic food staples and there will be less grain available for humanitarian aid. For example, the developing countries of Africa import about 10 MMt of maize each year; another 3 5 MMt of cereal grains are provided as humanitarian aid (figure 1). In a world where more than 800 million are already undernourished and the demand for crop commodities may soon exceed supply, alleviating hunger will no longer be solely a matter of poverty alleviation and more equitable food distribution, which has been the situation for the past thirty years. Instead, food security will also depend on accelerating the rate of gain in crop yields and food production capacity at both local and global scales. Maize imports and cereal donations as humanitarian aid to the developing countries of Africa Figure 1. Maize imports (yellow bar) and cereal donations as humanitarian aid to the developing countries of Africa, 2001 2003. MMT = million metric tons. Data

  8. Computer-Mediated Security Threats into the Web 2.0 Society

    Directory of Open Access Journals (Sweden)

    Bogdan Nadolu

    2016-03-01

    Full Text Available This paper is focused on a contemporary very complex and controversial issue related to the ICT using: should the Internet be censured, or not? The promise of the 4 of A – Anyone to be able to send Anything, Anywhere, Anytime is almost achieved. Into the digital universe we can find plenty of useful information for positive or negative actions. The global info-sphere has developed a distinct chapter of dark and deep web, where the tracking of information and users is blocked, and thus contents over the laws limits can be easily accessed. 

  9. Global Food Security Index Studies and Satellite Information

    Science.gov (United States)

    Medina, T. A.; Ganti-Agrawal, S.; Joshi, D.; Lakhankar, T.

    2017-12-01

    Food yield is equal to the total crop harvest per unit cultivated area. During the elapsed time of germination and frequent harvesting, both human and climate related effects determine a country's' contribution towards global food security. Each country across the globe's annual income per capita was collected to then determine nine countries for further studies. For a location to be chosen, its income per capita needed to be considered poor, uprising or wealthy. Both physical land cover and regional climate helped categorize potential parameters thought to be studied. Once selected, Normalized Difference Vegetation Index (NDVI) data was collected for Ethiopia, Liberia, Indonesia, United States, Norway, Russia, Kuwait and Saudi Arabia over the recent 16 years for approximately every 16 days starting from early in the year 2000. Software languages such as Geographic Information System (GIS), MatLab and Excel were used to determine how population size, income and deforestation directly determines agricultural yields. Because of high maintenance requirements for large harvests when forest areas are cleared, they often have a reduction in soil quality, requiring fertilizer use to produce sufficient crop yields. Total area and vegetation index of each country is to be studied, to determine crop and deforestation percentages. To determine how deforestation impacts future income and crop yield predictions of each country studied. By using NDVI results a parameter is to be potentially found that will help define an index, to create an equation that will determine a country's annual income and ability to provide for their families and themselves.

  10. Global Inventory of Methane Hydrate: How Large is the Threat? (Invited)

    Science.gov (United States)

    Buffett, B. A.; Frederick, J. M.

    2010-12-01

    Methane hydrate is a dark horse in the science of climate change. The volume of methane sequestered in marine sediments is large enough to pose a potential threat, yet the expected contribution to future warming is not known. Part of the uncertainty lies in the poorly understood details of methane release from hydrate. Slow, diffusive loss of methane probably results in oxidation by sulfate and precipitation to CaCO3 in the sediments, with little effect on climate. Conversely, a direct release of methane into the atmosphere is liable to have strong and immediate consequences. Progress in narrowing the possibilities requires a better understanding of the mechanisms responsible for methane release. Improvements are also needed in our estimates of the hydrate inventory, as this sets a limit on the possible response. Several recent estimates of the hydrate inventory have been constructed using mechanistic models. Many of the model parameters (e.g. sedimentation rate and sea floor temperature) can be estimated globally, while others (e.g. vertical fluid flow) are not well known. Available observations can be used to estimate the poorly known parameters, but it is reasonable to question whether the results from a limited number of sites are representative of other locations. Fluid flow is a case in point because most hydrate locations are associated with upward flow. On the other hand, simple models of sediment compaction predict downward flow relative to the sea floor, which acts to impede hydrate formation. A variety of mechanisms can produce upward flow, including time-dependent sedimentation, seafloor topography, subsurface fractures, dehydration of clay minerals and gradual burial of methane hydrate below the stability zone. Each of these mechanisms makes specific predictions for the magnitude of flow and the proportion of sea floor that is likely to be affected. We assess the role of fluid flow on the present-day inventory and show that the current estimates for

  11. Freedom and Security — Responses to the Threat of International Terrorism

    Science.gov (United States)

    Tinnefeld, Marie-Theres

    The September 11 attacs have led to a number of changes in the legislative framework of the EU member states. Governments intended to react quickly, powerfully and with high public visibility reactions in public to justify the power of technology in the interests of national security. The new goal is to search terrorist activity in the ocean of telecommunications data retained by communications providers and accessed by intelligence authorities. EU member states have to put in place a national data retention law by March 2009. In Germany, the most recent problem is the question of the legality of the secret online-surveillance and search of IT-Sytems, especially concerning of individual’s PCs. The German Federal Constitutional Court has held, that the area of governmental authority for intervention must be limited by the constitutional protection of human dignity and fundamental rights like information privacy, telecommunications secrecy and respect for the home. In February 2008 the highest German Court created a new human right of confidentially and integrity of IT-Systems. The decision has to be understood as a reaction to the widespread use of invisible information technology by legal authorities and their secret and comprehensive surveillance of the citizens.

  12. Changes in Arable Land Demand for Food in India and China: A Potential Threat to Food Security

    Directory of Open Access Journals (Sweden)

    Reshmita Nath

    2015-04-01

    Full Text Available India and China are two similar developing countries with huge populations, rapid economic growth and limited natural resources, therefore facing the massive pressure of ensuring food security. In this paper, we will discuss the food security situations in these two countries by studying the historical changes of food supply-demand balance with the concept of agricultural land requirements for food (LRF from 1963–2009. LRF of a country is a function of population, per capita consumption/diet, cropping yield and cropping intensity. We have attempted to discuss and compare our results in a framework which links consumption of different groups of food items to diet patterns; then, to the total land requirement for food in a scenario when population is growing rapidly and diet diversification and urbanization due to economic reform impose excessive pressure on food security of both countries. We also elaborate on the role of technology dissemination and critically analyze the achievements and drawbacks of government policies to ensure food self-sufficiency and food security of nations. Our results show that the total LRF increases approximately by 42% and 40%, whereas per capita LRF decreases significantly by about 48% and 30% from 1963–2009, for India and China, respectively. Furthermore, our studies reveal that population growth dominates most of the increase in total LRF for India; whereas diet pattern change induced by income growth drives the major increase in LRF for China. Therefore, sustainable management of agricultural land resource is an urgent need both for India and China as there will be demand for more food to meet the diet requirement for the entire population. We also demonstrate the role of India and China in future global food security programs and the challenges to implement the new land reform policies domestically.

  13. Climate change: A threat towards achieving ‘Sustainable Development Goal number two’ (end hunger, achieve food security and improved nutrition and promote sustainable agriculture in South Africa

    Directory of Open Access Journals (Sweden)

    Shingirai S. Mugambiwa

    2017-02-01

    Full Text Available This article aims to assess the impacts of climate change towards the achievement of Sustainable Development Goal number two (SDG 2 as well as examining the poverty alleviation strategies by subsistence farmers in South Africa. Widespread hunger and poverty continue to be among the most life-threatening problems confronting mankind. Available statistics show that global poverty remains a serious challenge around the world. Across the globe, one in five people lives on less than $1 a day and one in seven suffers from chronic hunger. Similarly, the developing world is adversely affected by poverty and hunger. In the sub-Saharan Africa, research has revealed a higher prevalence of hunger, malnutrition, poverty and food insecurity. SDG 2 focuses more on eliminating hunger and promoting sustainable agriculture. The study employed an exploratory design and a qualitative method. Snowball sampling was used in selecting relevant sources which led the researchers to other research work on the same field through keywords and reference lists. The researchers employed discourse analysis to analyse data. The study discovered that there are numerous potential effects climate change could have on agriculture. It affects crop growth and quality and livestock health. Farming practices could also be affected as well as animals that could be raised in particular climatic areas. The impact of climate change as well as the susceptibility of poor communities is very immense. The article concludes that climate change reduces access to drinking water, negatively affects the health of people and poses a serious threat to food security.

  14. THE CYBER THREAT AND THE PROBLEM OF INFORMATION SECURITY - A critical analysis of the concepts of cyber-power and cyber-space

    Directory of Open Access Journals (Sweden)

    Sebastian SÂRBU

    2017-06-01

    Full Text Available In this paper we approached from a researcher’s angle and analyzed the concepts of cyber-space, cyber-power from the security school perspective, from that of the international organizations, and from the civil society point of view. Therefore we referred to the documents and the international initiatives concerning the security of data transfer in the context of the current threats against cybernetic security on the one hand, and its interpretation as a threat to the values, rights and democratic freedoms of the civil society, on the other. The risk society is defined both through the grid of political sociology, of the Copenhagen school, as a key element of reference in this case, as well as through the necessity to build a safe cyber space, here being scrutinized in a value-based antithesis between terror and democracy / freedom of speech.

  15. Intelligence, Global Terrorism and Higher Education: Neutralising Threats or Alienating Allies?

    Science.gov (United States)

    Saeed, Tania; Johnson, David

    2016-01-01

    The British Counter-Terrorism and Security Act 2015 appears to have drawn universities into the security apparatus of the state. Academics and administrators have been compelled to comply with measures aimed at monitoring the activities of mostly Islamic student societies. While it is not inconceivable that universities are exploited as sites for…

  16. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  17. Importance of rapid testing to combat the global threat of bird flu.

    NARCIS (Netherlands)

    Meijer, A.

    2006-01-01

    One of the important outcomes of the recently held meeting of the World Heatlh Organization (EHO), the Food and Agriculture Organization (FAO) of the United Nations, the World Organization of Animal Heath (OIE) and the World Bank in Genevan November 7- 9, 2005, on the threat of avian inluenza

  18. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability

    NARCIS (Netherlands)

    Lu, Y.; Yuan, J.; Lu, X.; Su, Chao; Zhang, Y.; Wang, C.; Cao, X.; Li, Q.; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, S.R.; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-01-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients,

  19. Globalization and environmental challenges. Reconceptualizing security in the 21{sup st} century

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Mexico City (MX). Centro Regional de Investigaciones Multidisciplinarias (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dunay, Pal [Geneva Centre for Security Policy (Switzerland); Chadha Behera, Navnita [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Kameri-Mbote, Patricia [Nairobi Univ. (Kenya), Dept. of Private Law; Liotta, P.H. (eds.) [Salve Regina Univ., Newport, RI (United States). Pell Center for International Relations and Public Policy

    2008-07-01

    Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this comprehensive new work on global security thinking, 91 authors from five continents and many disciplines, from science and practice, assess the worldwide reassessment of the meaning of security triggered by the end of the Cold War and globalization, as well as the multifarious impacts of global environmental change in the early 21st century. Chapters address the theoretical, philosophical, ethical and religious and spatial context of security. They analyze the relationship between security, peace, development and environment. The authors move on to review the rethinking of security in international law, economics and political science, as well as in the key political, military and economic milieux. The book also examines the environmental security dimension and the adaptation of the institutional security concepts of the UN, EU and NATO, and analyzes the effect of change on regional security. Finally, it posits alternative security futures and draws conclusions for future research and action. (orig.)

  20. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  1. China's mineral resources security under economic globalization

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Y. [China University of Mining and Technology, Xuzhou (China). College of Environment and Spatial Informatics

    2002-10-01

    The concept and intention of mineral resources security are introduced. From the insurance and leverage that mineral resources has on China's socio-economic development, the strength of support, the opportunity and challenge imposed by globalised economy, the effect of mineral resource development on the safety of the eco-environment, the author analyses the basic situation and existing problem of the mineral resources security in China; summarizes the current research situation of mineral resources security and the main tactics which are used to ensure mineral resources security in the developed countries; presents the essence of mineral resources security, the basic principles of research and the problems focused; and points out the research areas and goals that should be strengthened urgently. 15 refs.

  2. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  3. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  4. Transforming Gender and Food Security in the Global South | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-09-29

    Sep 29, 2016 ... It investigates how food security and gender inequity are conceptualized within ... underlying social, cultural, and economic causes of gender inequality. Taken together, these combined approaches enable women and men to ...

  5. Threat of plastic pollution to seabirds is global, pervasive, and increasing

    OpenAIRE

    Wilcox, C; Van Sebille, E; Hardesty, BD

    2015-01-01

    Plastic pollution in the ocean is a rapidly emerging global environmental concern, with high concentrations (up to 580,000 pieces per km2) and a global distribution, driven by exponentially increasing production. Seabirds are particularly vulnerable to this type of pollution and are widely observed to ingest floating plastic. We used a mixture of literature surveys, oceanographic modeling, and ecological models to predict the risk of plastic ingestion to 186 seabird species globally. Impacts ...

  6. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Department of Defense Information Network (DODIN): A Study of Current Cyber Threats and Best Practices for Network Security

    Science.gov (United States)

    2016-06-10

    DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best

  8. Energy Security Threats

    Science.gov (United States)

    2011-06-01

    accident in the  U.S. in 1979,  the  disaster  at  Chernobyl  in Ukraine in 1986, and the ongoing crisis  at  the  Fukushima  nuclear  generator  in  Japan...and Natural  Disasters  ................................................................ 43 5. Conclusions...is  that  gas hydrates  are  extremely difficult  to  extract without  risking  environmental  disasters .  The  principle  risk  is  that  the

  9. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  10. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    National Research Council Canada - National Science Library

    Hubenko, Jr, Victor P

    2008-01-01

    With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration...

  11. Global food and fibre security threatened by current inefficiencies in fungal identification

    NARCIS (Netherlands)

    Crous, Pedro W.; Groenewald, Johannes Z.; Slippers, Bernard; Wingfield, Michael J.

    2016-01-01

    Fungal pathogens severely impact global food and fibre crop security. Fungal species that cause plant diseases have mostly been recognized based on their morphology. In general, morphological descriptions remain disconnected from crucially important knowledge such as mating types, host specificity,

  12. Coral reefs: threats and conservation in an era of global change.

    Science.gov (United States)

    Riegl, Bernhard; Bruckner, Andy; Coles, Steve L; Renaud, Philip; Dodge, Richard E

    2009-04-01

    Coral reefs are iconic, threatened ecosystems that have been in existence for approximately 500 million years, yet their continued ecological persistence seems doubtful at present. Anthropogenic modification of chemical and physical atmospheric dynamics that cause coral death by bleaching and newly emergent diseases due to increased heat and irradiation, as well as decline in calcification caused by ocean acidification due to increased CO(2), are the most important large-scale threats. On more local scales, overfishing and destructive fisheries, coastal construction, nutrient enrichment, increased runoff and sedimentation, and the introduction of nonindigenous invasive species have caused phase shifts away from corals. Already approximately 20% of the world's reefs are lost and approximately 26% are under imminent threat. Conservation science of coral reefs is well advanced, but its practical application has often been lagging. Societal priorites, economic pressures, and legal/administrative systems of many countries are more prone to destroy rather than conserve coral-reef ecosystems. Nevertheless, many examples of successful conservation exist from the national level to community-enforced local action. When effectively managed, protected areas have contributed to regeneration of coral reefs and stocks of associated marine resources. Local communities often support coral-reef conservation in order to raise income potential associated with tourism and/or improved resource levels. Coral reefs create an annual income in S-Florida alone of over $4 billion. Thus, no conflict between development, societal welfare, and coral-reef conservation needs to exist. Despite growing threats, it is not too late for decisive action to protect and save these economically and ecologically high-value ecosystems. Conservation science plays a critical role in designing effective strategies.

  13. Global analysis of threat status reveals higher extinction risk in tropical than in temperate bird sister species

    Directory of Open Access Journals (Sweden)

    Reif Jiří

    2016-06-01

    Full Text Available Given increasing pressures upon biodiversity, identification of species’ traits related to elevated extinction risk is useful for more efficient allocation of limited resources for nature conservation. Despite its need, such a global analysis was lacking in the case of birds. Therefore, we performed this exercise for avian sister species using information about their global extinction risk from IUCN Red List. We focused on 113 pairs of sister species, each containing a threatened and an unthreatened species to factor out the effects of common evolutionary history on the revealed relationship. We collected data on five traits with expected relationships to species’ extinction risk based on previous studies performed at regional or national levels: breeding habitat (recognizing forest, grassland, wetland and oceanic species, latitudinal range position (temperate and tropics species, migration strategy (migratory and resident species, diet (carnivorous, insectivorous, herbivorous and omnivorous species and body mass. We related the extinction risk using IUCN threat level categories to species’ traits using generalised linear mixed effects models expecting lower risk for forest, temperate, omnivorous and smaller-bodied species. Our expectation was confirmed only in the case of latitudinal range position, as we revealed higher threat level for tropical than for temperate species. This relationship was robust to different methods of threat level expression and cannot be explained by a simple association of high bird species richness with the tropical zone. Instead, it seems that tropical species are more threatened because of their intrinsic characteristics such as slow life histories, adaptations to stable environments and small geographic ranges. These characteristics are obviously disadvantageous in conditions of current human-induced environmental perturbations. Moreover, given the absence of habitat effects, our study indicates that such

  14. Protecting the source. Securing nuclear material and strong radiation sources. New threats of terrorism are prompting the need for swift action to better secure nuclear material and strong radiation sources. Are measures already in place enough? The Stanford-Salzburg initiative suggests not

    International Nuclear Information System (INIS)

    Steinhausler, F.; Bunn, G.

    2003-01-01

    At a time of growing concern over threats of terrorism, the security of nuclear and radioactive material is an urgent and serious issue. Working with a range of partners, the IAEA has put into place a multi-faceted Action Plan to help countries upgrade their capabilities. But more needs to be done to counter new types of threats. One particular area that needs to be strengthened is the physical protection of nuclear and radioactive material. The attacks of 11 September 2001 opened our eyes to i he urgent need to strengthen national physical protection (PP) practices for nuclear and other radioactive material. The principle that highly radioactive material will protect itself does not apply to the newest generation of terrorists. Existing PP systems were not designed to deal with the threat of suicidal terrorists commanding the numbers, skills, training, and resources available to those who carried out the attacks in the US. Moreover, because there are no mandatory international standards for domestic PP systems for nuclear or radioactive material, protection measures vary greatly from country to country. The IAEA recommended standards (Inference/225/Rev. 4) were not designed with the new terrorist threats in mind and national practices often fall short of even these recommendations. The result is inadequate protection against the new form of terrorism. Few argue the point that national physical protection practices for nuclear and other radioactive material need to be strengthened. This article summarizes a Stanford-Salzburg plan developed by experts from Stanford University's Center for International Security and Cooperation, (USA) and revised at the EU-Physical Protection NUMAT Conference in September 2002 in Salzburg, Austria. It includes six recommended elements to consider in addition to what the IAEA is now doing to improve PP practices around the world: Establish a global list of physical protection priorities; Create a multilateral security cooperation

  15. Emergence and Spread of New Races of Wheat Stem Rust Fungus: Continued Threat to Food Security and Prospects of Genetic Control.

    Science.gov (United States)

    Singh, Ravi P; Hodson, David P; Jin, Yue; Lagudah, Evans S; Ayliffe, Michael A; Bhavani, Sridhar; Rouse, Matthew N; Pretorius, Zacharias A; Szabo, Les J; Huerta-Espino, Julio; Basnet, Bhoja R; Lan, Caixia; Hovmøller, Mogens S

    2015-07-01

    Race Ug99 (TTKSK) of Puccinia graminis f. sp. tritici, detected in Uganda in 1998, has been recognized as a serious threat to food security because it possesses combined virulence to a large number of resistance genes found in current widely grown wheat (Triticum aestivum) varieties and germplasm, leading to its potential for rapid spread and evolution. Since its initial detection, variants of the Ug99 lineage of stem rust have been discovered in Eastern and Southern African countries, Yemen, Iran, and Egypt. To date, eight races belonging to the Ug99 lineage are known. Increased pathogen monitoring activities have led to the identification of other races in Africa and Asia with additional virulence to commercially important resistance genes. This has led to localized but severe stem rust epidemics becoming common once again in East Africa due to the breakdown of race-specific resistance gene SrTmp, which was deployed recently in the 'Digalu' and 'Robin' varieties in Ethiopia and Kenya, respectively. Enhanced research in the last decade under the umbrella of the Borlaug Global Rust Initiative has identified various race-specific resistance genes that can be utilized, preferably in combinations, to develop resistant varieties. Research and development of improved wheat germplasm with complex adult plant resistance (APR) based on multiple slow-rusting genes has also progressed. Once only the Sr2 gene was known to confer slow rusting APR; now, four more genes-Sr55, Sr56, Sr57, and Sr58-have been characterized and additional quantitative trait loci identified. Cloning of some rust resistance genes opens new perspectives on rust control in the future through the development of multiple resistance gene cassettes. However, at present, disease-surveillance-based chemical control, large-scale deployment of new varieties with multiple race-specific genes or adequate levels of APR, and reducing the cultivation of susceptible varieties in rust hot-spot areas remains the best

  16. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  17. Global change, urban livelihoods and food security; presentation

    CSIR Research Space (South Africa)

    Murambadoro, M

    2012-02-01

    Full Text Available Food security research and policy have focused more on the rural poor where the incidence and depth of poverty is more pronounced. Urban livelihoods are based on cash income and many people in urban areas are employed in the informal sector which...

  18. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  19. Transforming Gender and Food Security in the Global South | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    29 sept. 2016 ... Jemimah Njuki is a senior program officer in the Agriculture and Food Security program at the International Development Research Centre (IDRC), based in Nairobi, Kenya. John R. Parkins is a professor in the Department of Resource Economics and Environmental Sociology, University of Alberta, Canada ...

  20. Evaluating the Security of the Global Containerized Supply Chain

    National Research Council Canada - National Science Library

    Willis, Henry H; Ortiz, David S

    2004-01-01

    The global supply chain is the network of suppliers, manufacturing centers, warehouses, distribution centers, and retail outlets that transforms raw materials into finished products and delivers them to consumers...

  1. HIV/AIDS and its implications – a global threat that medicine alone cannot cure

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Liljestrand, Jerker; Barnett, Anthony

    2006-01-01

    with HIV/AIDS. There are some 4.1 million new cases every year, and though the recent rapid expansion of antiretroviral treatment will prolong the lives of millions, there is no immediate prospect of a vaccine or cure. Thus, though still at an early stage, the pandemic is often described as ‘a long......-wave event’, with ramifications that will persist for decades. In this article, we review the relationship between HIV/AIDS and development, social stability and security. After considering the societal implications of HIV/AIDS control – with special attention to gender issues, human rights...

  2. Economic optimization of a global strategy to address the pandemic threat.

    Science.gov (United States)

    Pike, Jamison; Bogich, Tiffany; Elwood, Sarah; Finnoff, David C; Daszak, Peter

    2014-12-30

    Emerging pandemics threaten global health and economies and are increasing in frequency. Globally coordinated strategies to combat pandemics, similar to current strategies that address climate change, are largely adaptive, in that they attempt to reduce the impact of a pathogen after it has emerged. However, like climate change, mitigation strategies have been developed that include programs to reduce the underlying drivers of pandemics, particularly animal-to-human disease transmission. Here, we use real options economic modeling of current globally coordinated adaptation strategies for pandemic prevention. We show that they would be optimally implemented within 27 y to reduce the annual rise of emerging infectious disease events by 50% at an estimated one-time cost of approximately $343.7 billion. We then analyze World Bank data on multilateral "One Health" pandemic mitigation programs. We find that, because most pandemics have animal origins, mitigation is a more cost-effective policy than business-as-usual adaptation programs, saving between $344.0.7 billion and $360.3 billion over the next 100 y if implemented today. We conclude that globally coordinated pandemic prevention policies need to be enacted urgently to be optimally effective and that strategies to mitigate pandemics by reducing the impact of their underlying drivers are likely to be more effective than business as usual.

  3. The 800 Pound Gorilla: The Threat and Taming of Global Climate Change

    Science.gov (United States)

    Hansen, Jim

    2008-01-01

    This article provides two case studies that examine the current and future consequences of continued global warming at the current business-as-usual pace and at a decreased (new alternative forms of energy) level. Cause and effect relationships, such as the varying levels of CO[subscript 2] (carbon dioxide) emissions and the effect it has on…

  4. Economic optimization of a global strategy to address the pandemic threat

    Science.gov (United States)

    Pike, Jamison; Bogich, Tiffany; Elwood, Sarah; Finnoff, David C.; Daszak, Peter

    2014-01-01

    Emerging pandemics threaten global health and economies and are increasing in frequency. Globally coordinated strategies to combat pandemics, similar to current strategies that address climate change, are largely adaptive, in that they attempt to reduce the impact of a pathogen after it has emerged. However, like climate change, mitigation strategies have been developed that include programs to reduce the underlying drivers of pandemics, particularly animal-to-human disease transmission. Here, we use real options economic modeling of current globally coordinated adaptation strategies for pandemic prevention. We show that they would be optimally implemented within 27 y to reduce the annual rise of emerging infectious disease events by 50% at an estimated one-time cost of approximately $343.7 billion. We then analyze World Bank data on multilateral “One Health” pandemic mitigation programs. We find that, because most pandemics have animal origins, mitigation is a more cost-effective policy than business-as-usual adaptation programs, saving between $344.0.7 billion and $360.3 billion over the next 100 y if implemented today. We conclude that globally coordinated pandemic prevention policies need to be enacted urgently to be optimally effective and that strategies to mitigate pandemics by reducing the impact of their underlying drivers are likely to be more effective than business as usual. PMID:25512538

  5. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies

    Science.gov (United States)

    Mackey, Tim K.; Nayyar, Gaurvika

    2016-01-01

    Background Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. Sources of data A review was conducted of the English literature with search terms ‘online pharmacies’, ‘Internet pharmacies’, ‘cyber pharmacies’, ‘rogue pharmacies’, and ‘e-pharmacies’ using PubMed, JSTOR, and Google Scholar from 1999–2005. Areas of agreement Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Areas of controversy Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Growing points Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. Areas timely for developing research There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. PMID:27151957

  6. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies.

    Science.gov (United States)

    Mackey, Tim K; Nayyar, Gaurvika

    2016-06-01

    Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. A review was conducted of the English literature with search terms 'online pharmacies', 'Internet pharmacies', 'cyber pharmacies', 'rogue pharmacies', and 'e-pharmacies' using PubMed, JSTOR, and Google Scholar from 1999-2005. Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. Drylands face potential threat under 2 °C global warming target

    Science.gov (United States)

    Huang, Jianping; Yu, Haipeng; Dai, Aiguo; Wei, Yun; Kang, Litai

    2017-06-01

    The Paris Agreement aims to limit global mean surface warming to less than 2 °C relative to pre-industrial levels. However, we show this target is acceptable only for humid lands, whereas drylands will bear greater warming risks. Over the past century, surface warming over global drylands (1.2-1.3 °C) has been 20-40% higher than that over humid lands (0.8-1.0 °C), while anthropogenic CO2 emissions generated from drylands (~230 Gt) have been only ~30% of those generated from humid lands (~750 Gt). For the twenty-first century, warming of 3.2-4.0 °C (2.4-2.6 °C) over drylands (humid lands) could occur when global warming reaches 2.0 °C, indicating ~44% more warming over drylands than humid lands. Decreased maize yields and runoff, increased long-lasting drought and more favourable conditions for malaria transmission are greatest over drylands if global warming were to rise from 1.5 °C to 2.0 °C. Our analyses indicate that ~38% of the world's population living in drylands would suffer the effects of climate change due to emissions primarily from humid lands. If the 1.5 °C warming limit were attained, the mean warming over drylands could be within 3.0 °C therefore it is necessary to keep global warming within 1.5 °C to prevent disastrous effects over drylands.

  8. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  9. Forest Distribution on Small Isolated Hills and Implications on Woody Plant Distribution under Threats of Global Warming

    Directory of Open Access Journals (Sweden)

    Chi-Cheng Liao

    2012-09-01

    Full Text Available Treelines have been found to be lower in small isolated hilltops, but the specific dynamics behind this unique phenomenon are unknown. This study investigates the distribution patterns of woody plants in Yangmingshan National Park (YMSNP, Northern Taiwan in search of the limitation mechanisms unique to small isolated hills, and to evaluate potential threats under global warming. Forests distributed between 200 to 900 m above sea level (ASL. Remnant forest fragments between 400 and 900 m ASL, have the highest species richness, and should be protected to ensure future forest recovery from the former extensive artificial disturbance. The lower boundary is threatened by urban and agricultural development. The lack of native woody species in these low elevation zones may cause a gap susceptible to invasive species. A consistent forest line at 100 m below mountain tops regardless of elevation suggests a topography-induced instead of an elevation-related limiting mechanism. Therefore, upward-shift of forests, caused by global warming, might be limited at 100 m below hilltops in small isolated hills because of topography-related factors. The spatial range of woody plants along the altitudinal gradient, thus, is likely to become narrower under the combined pressures of global warming, limited elevation, exposure-related stress, and artificial disturbance. Management priorities for forest recovery are suggested to include preservation of remnant forest fragments, increasing forest connectivity, and increasing seedling establishment in the grasslands.

  10. The Global Infectious Disease Threat and Its Implications for the United States

    Science.gov (United States)

    2000-01-01

    100,000 cases in 1997, it still comprises two- thirds of the global cholera burden. TB is a growing problem regionwide, especially in Brazil, Peru ...deficiency anemia 39 15 Protein-energy malnutrition 37 16 War 8 17 Self-inflicted injuries 14 19 Violence 12 28 HIV 10 33 Trachea, bronchus, and lung cancers...dollars in lost revenue. • Cholera in Peru . The outbreak of cholera in 1991 cost the Peruvian fishing industry an estimated $775 million in lost tourism

  11. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael Conrad [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pshakin, Gennady [Obninsk Institute of Physics and Power Engineering (Russian Federation)

    2015-02-23

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  12. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    International Nuclear Information System (INIS)

    Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad; Pshakin, Gennady

    2015-01-01

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  13. The perils of payoff: corruption as a threat to global biodiversity.

    Science.gov (United States)

    Laurance, William F

    2004-08-01

    Corruption is a worldwide phenomenon, particularly in many developing countries, which contain a large proportion of global biodiversity. Most alarming, from a biodiversity-conservation perspective, is the frequent corruption of government officials who manage valuable natural resources, such as timber, oil and precious minerals. A recent study by Joyotee Smith and colleagues describes rampant corruption in the timber industry of Indonesia, and shifts in the prevalence of different types of corruption as the country has become destabilized politically. By placing corruption into a conceptual framework, Smith et al. provide important insights into how developing nations and their natural resources can be besieged by corruption.

  14. Bioseguridad in Mexico: Pursuing Security between Local and Global Biologies.

    Science.gov (United States)

    Wanderer, Emily Mannix

    2017-09-01

    In the aftermath of the 2009 outbreak of H1N1 influenza, scientists in Mexico sought to develop bioseguridad, that is, to protect biological life in Mexico by safely conducting research on infectious disease. Drawing on ethnographic research in laboratories and with scientists in Mexico, I look at how scientists make claims about local differences in regulations, infrastructure, bodies, and culture. The scientists working with infectious microbes sought to establish how different microbial ecologies, human immune systems, and political and regulatory systems made the risks of research different in Mexico from other countries. In developing bioseguridad, the idea of globalized biology that animates many public health projects was undermined as scientists attended to the elements of place that affected human health and safety. Scientists argued for the importance of local biologies, generating tension with global public health projects and regulations premised on the universality of biology. © 2016 by the American Anthropological Association.

  15. Guidelines and recommendations for regional approaches to disarmament within the context of global security

    International Nuclear Information System (INIS)

    Mason, P.

    1994-01-01

    Guidelines and recommendations for regional approaches to disarmament within the context of global security provide both a conceptual framework within which to pursue arms control in South Asia and a variety of concrete mechanisms or tools to carry out the task. However, they cannot operate independently of a broader process of political accommodation, which might be named as 'cooperative security building'. That process, however embryonic, is under way across Asia Pacific region

  16. Financial security of the state in terms of globalization processes escalation

    Directory of Open Access Journals (Sweden)

    Svitlana Tkalenko

    2013-02-01

    Full Text Available The article provides review of the globalization and global integration processes impact on the financial sector formation characterized by an increase in financial flows with the lead role played by transnational corporations and transnational banks. The globalization study has been already reflected by numerous scientific publications and various issues of reputable international academic journals describing the process as irreversible and objective along with demonstrating globalization merits and demerits, etc. In the 21st century, globalization is an issue discussed by everyone: ranging from presidents, prime ministers and members of parliament supposed to solve problems of any scale taking into consideration the global development phenomenon, to ordinary citizens. Today, globalization has obviously become a major trend of the modern world development, which is why issues implying sound development assurance become pressing for each country. The article dwells upon the main component of economic security — the financial one (Ukraine case study. Thus, we are engaged in studying the global development trend in terms of assuring security of the state under conditions of financial flows globalization and existence of global integration processes.

  17. GLOBALIZATION AND TRADE LIBERALIZATION: “A THREAT OR AN OPPORTUNITY”?

    Directory of Open Access Journals (Sweden)

    Andrei-Stefan Enghiş

    2006-07-01

    Full Text Available The present paper attempts to evaluate the global economic system through the perspective of neoliberalism, which advocates for the continuous liberalization of trade and the progressive opening of the markets in different economic sectors. Seeking to observe the neoliberal vision on the world economy, the study relies on two speeches delivered by the former European Union’s Trade Commissioner, Pascal Lamy in a time span of four years, between 2000 and 2004, a period marked by two important WTO Ministerial Conferences: the Doha 2001 WTO Ministerial Conference and the Cancun 2003 WTO Ministerial Conference. Nonetheless, in order to provide a balanced analysis of the world economic system, the study provides a brief introspection into the other theoretical vision, alterglobalism, which advocates for a different understanding of the relations between trade liberalization, state intervention in the economy and the reduction of the existent economic disparities. The analysis is divided into three sections: the first section portrays the two antithetical visions, neoliberalism and alterglobalism, while the second one focuses exclusively on the person of Pascal Lamy and on the speeches that represent the core of this study. The third section consists in a comparative analysis of the two divergent economic perspectives, trying to identify the main opposing points, as well as those points on which the two economic perspectives may converge. The conclusion looks closely at the relations between globalization and trade liberalization and the criticism brought about by alterglobalism, the archrival of neoliberalism and trade liberalization. It also considers the relation between the two neoliberal speeches of the former EU Trade Commissioner, attempting to identify potential links or divergent attitudes between the two.

  18. Acidovorax citrulli: generating basic and applied knowledge to tackle a global threat to the cucurbit industry.

    Science.gov (United States)

    Burdman, Saul; Walcott, Ron

    2012-10-01

    Acidovorax citrulli is the causal agent of bacterial fruit blotch (BFB) of cucurbit plants. In recent years, the disease has spread to many parts of the world, mainly via the inadvertent distribution of contaminated commercial seeds. Because of the costly lawsuits filed by growers against seed companies and the lack of efficient management methods, BFB represents a serious threat to the cucurbit industry, and primarily to watermelons and melons. Despite the economic importance of the disease, little is known about the basic aspects of A. citrulli pathogenesis. Nevertheless, the release of the genome of one A. citrulli strain, as well as the optimization of molecular manipulation and inoculation methods, has prompted basic studies and allowed advances towards an understanding of A. citrulli pathogenicity. In this article, we summarize the current knowledge about this important pathogen, with emphasis on its epidemiology and the factors involved in its pathogenicity and virulence. Bacteria; Betaproteobacteria; order Burkholderiales; family C omamonadaceae; genus Acidovorax; species citrulli. Gram-negative, strictly aerobic, rod-shaped; average dimensions of 0.5 μm × 1.7 μm; motile by means of an ~5.0-μm-long polar flagellum; colonies on King's medium B are round, smooth, transparent and nonpigmented; optimal temperatures for growth around 27-30 °C; induces a hypersensitive response on nonhost tobacco and tomato leaves. Acidovorax citrulli strains are pathogenic to various species of the Cucurbitaceae family, including watermelon, melon, squash, pumpkin and cucumber. Significant economic losses have been reported in watermelon and melon. Watermelon and melon seedlings and fruits are highly susceptible to A. citrulli. Typical seedling symptoms include water-soaked lesions on cotyledons that are often adjacent to the veins and later become necrotic, lesions on the hypocotyl, and seedling collapse and death. On watermelon fruits, symptoms begin as small

  19. Russian spent marine fuel as a global security risk

    International Nuclear Information System (INIS)

    Gussgard, K.; Reistad, O.

    2001-01-01

    Russian marine fuel is a trans-national security concern. This paper focuses on specific technical properties of Russian marine nuclear fuel especially relevant for evaluating different aspects on nuclear proliferation, in addition to risks associated with regional environmental degradation and illegal diversion of radiological substances. Russian fresh fuel for marine reactors has been involved in several significant cases of illicit trafficking of special nuclear materials. The amount and quality of nuclear materials in Russian spent marine fuel give also reason for concern. Not less than 200 marine reactor cores are ready for having their spent fuel unloaded and preliminary stored on shore in the Far East and North West of Russia, and large amounts of spent naval fuel have been stored at Russian military bases for decades. In order to assess the security risks associated with Russian spent marine fuel, this paper discusses the material attractiveness of spent fuel from all types of Russian marine reactors. The calculations are based on a model of a light water moderated Russian icebreaker reactor. The computer tool HELIOS, used for modelling the reactor and the reactor operations, has been extensively qualified by comparisons with experimental data and international benchmark problems for reactor physics codes as well as through feedback from applications. Some of these benchmarks and studies include fuel enrichments up to 90% in Russian marine reactors. Several fuel data cases are discussed in the paper, focusing especially on: 1) early fuel designs with low initial enrichment; 2) more modern fuel designs used in third and fourth generation of Russian submarines probably with intermediate enriched fuel; and 3) marine fuel with initial enrichment levels close to weapons-grade material. In each case the fuel has been burned until k eff has reached below 1. Case 1) has been evaluated, the calculations made as basis for this paper have concentrated on fuel with

  20. G8 Global Partnership: Germany's contribution to strengthening international security

    International Nuclear Information System (INIS)

    Pfaffernoschke, A.

    2013-01-01

    This series of slides presents the German contribution to the G8 Global partnership whose aim is to support specific cooperation projects to address non-proliferation, disarmament, counter-terrorism and nuclear safety issues. 4 priorities have been identified: -) destruction of chemical weapons, -) dismantlement of decommissioned nuclear submarines, -) disposition of fissile materials, and -) employment of former weapon scientists. Today there are 23 donor countries and 2 official recipient countries (Russian Federation and Ukraine). Since the beginning Germany's activities in the G8 Global partnership have focused on chemical weapon destruction (340 million euros), dismantlement of nuclear submarines (600 million euros) and physical protection of nuclear materials (170 million euros). In the Gorny project (1995-2005) German provided the incinerator for the thermal treatment of liquid and solid residues and the equipment for destruction by hydrolysis. Germany's contribution to the following projects: -) the Kambarka project (2003-2007) for the destruction of lewisite, -) the Pochep project (2007-2010) for the destruction of munition containing nerve agents, and -) the Sajda-Bay project for the construction of a long-term storage site for reactor sections of decommissioned submarines, are detailed

  1. Ebola Viral Disease in West Africa: A Threat to Global Health, Economy and Political Stability

    Science.gov (United States)

    Mohammed, Ibrahim; Saidu, Yauba

    2016-01-01

    The West African sub-continent is currently experiencing its first, and ironically, the largest and longest Ebola viral diseases (EVD) outbreak ever documented in modern medical history. The current outbreak is significant in several ways, including longevity, magnitude of morbidity and mortality, occurrence outside the traditional niches, rapid spread and potential of becoming a global health tragedy. The authors provided explicit insights into the current and historical background, drivers of the epidemic, societal impacts, status of vaccines and drugs development and proffered recommendations to halt and prevent future occurrences. The authors reviewed mainly five databases and a hand search of key relevant literature. We reviewed 51 articles that were relevant up until the 18th of August 2014. The authors supplemented the search with reference list of relevant articles and grey literature as well as relevant Internet websites. Article searches were limited to those published either in English or French. There are strong indications that the EVD may have been triggered by increased human activities and encroachment into the forest ecosystem spurred by increasing population and poverty-driven forest-dependent local economy. Containment efforts are being hampered by weak and fragile health systems, including public health surveillance and weak governance, certain socio-anthropological factors, fast travels (improved transport systems) and globalization. The societal impacts of the EBV outbreak are grave, including economic shutdown, weakening of socio-political systems, psychological distress, and unprecedented consumption of scarce health resources. The research and development (R&D) pipeline for product against EBV seems grossly insufficient. The outbreak of Ebola and the seeming difficulty to contain the epidemic is simply a reflection of the weak health system, poor surveillance and emergency preparedness/response, poverty and disconnect between the government

  2. Ebola viral disease in West Africa: a threat to global health, economy and political stability

    Directory of Open Access Journals (Sweden)

    Semeeh Akinwale Omoleke

    2016-08-01

    Full Text Available The West African sub-continent is currently experiencing its first, and ironically, the largest and longest Ebola viral diseases (EVD outbreak ever documented in modern medical history. The current outbreak is significant in several ways, including longevity, magnitude of morbidity and mortality, occurrence outside the traditional niches, rapid spread and potential of becoming a global health tragedy. The authors provided explicit insights into the current and historical background, drivers of the epidemic, societal impacts, status of vaccines and drugs development and proffered recommendations to halt and prevent future occurrences. The authors reviewed mainly five databases and a hand search of key relevant literature. We reviewed 51 articles that were relevant up until the 18th of August 2014. The authors supplemented the search with reference list of relevant articles and grey literature as well as relevant Internet websites. Article searches were limited to those published either in English or French. There are strong indications that the EVD may have been triggered by increased human activities and encroachment into the forest ecosystem spurred by increasing population and povertydriven forest-dependent local economy. Containment efforts are being hampered by weak and fragile health systems, including public health surveillance and weak governance, certain socio-anthropological factors, fast travels (improved transport systems and globalization. The societal impacts of the EBV outbreak are grave, including economic shutdown, weakening of socio-political systems, psychological distress, and unprecedented consumption of scarce health resources. The research and development (R&D pipeline for product against EBV seems grossly insufficient. The outbreak of Ebola and the seeming difficulty to contain the epidemic is simply a reflection of the weak health system, poor surveillance and emergency preparedness/ response, poverty and disconnect

  3. Ebola Viral Disease in West Africa: A Threat to Global Health, Economy and Political Stability.

    Science.gov (United States)

    Omoleke, Semeeh Akinwale; Mohammed, Ibrahim; Saidu, Yauba

    2016-08-17

    The West African sub-continent is currently experiencing its first, and ironically, the largest and longest Ebola viral diseases (EVD) outbreak ever documented in modern medical history. The current outbreak is significant in several ways, including longevity, magnitude of morbidity and mortality, occurrence outside the traditional niches, rapid spread and potential of becoming a global health tragedy. The authors provided explicit insights into the current and historical background, drivers of the epidemic, societal impacts, status of vaccines and drugs development and proffered recommendations to halt and prevent future occurrences. The authors reviewed mainly five databases and a hand search of key relevant literature. We reviewed 51 articles that were relevant up until the 18 th of August 2014. The authors supplemented the search with reference list of relevant articles and grey literature as well as relevant Internet websites. Article searches were limited to those published either in English or French. There are strong indications that the EVD may have been triggered by increased human activities and encroachment into the forest ecosystem spurred by increasing population and poverty-driven forest-dependent local economy. Containment efforts are being hampered by weak and fragile health systems, including public health surveillance and weak governance, certain socio-anthropological factors, fast travels (improved transport systems) and globalization. The societal impacts of the EBV outbreak are grave, including economic shutdown, weakening of socio-political systems, psychological distress, and unprecedented consumption of scarce health resources. The research and development (R&D) pipeline for product against EBV seems grossly insufficient. The outbreak of Ebola and the seeming difficulty to contain the epidemic is simply a reflection of the weak health system, poor surveillance and emergency preparedness/response, poverty and disconnect between the

  4. [Biological security confronting bioterrorism].

    Science.gov (United States)

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  5. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  6. Gender and climate change in the Indian Hindu-Kush Himalayas: global threats, local vulnerabilities

    Science.gov (United States)

    Ogra, M. V.; Badola, R.

    2014-11-01

    Global climate change has numerous implications for members of mountain communities who feel the impacts in both physical and social dimensions. In the Western Himalayas of India, a majority of residents maintain a livelihood strategy that includes a combination of subsistence or small-scale agriculture, seasonal pastoral migration, male out-migration, and localized natural resource extraction. Particularly under conditions of heavy male outmigration, but throughout the region, mountain women play a key role in providing labor and knowledge related to the management of local natural resources, yet often lack authority in related political and economic decision-making processes. This gap has important implications for addressing the impacts of climate change: while warming temperatures, irregular patterns of precipitation and snowmelt, and changing biological systems present challenges to the viability of these traditional livelihood portfolios throughout the region, mountain women increasingly face new challenges in their roles as household managers that have not adequately been emphasized in larger scale planning for climate change adaptation and mitigation. These challenges are complex in nature, and are shaped not only by gender issues but also interacting factors such as class, caste, ethnicity, and age (among others). In this paper, we review the main arguments behind the discursive gender/climate change nexus, discuss the implications for gendered vulnerabilities and transformation of adaptive capacities in the region, and suggest ways that researchers and policymakers seeking to promote "climate justice" can benefit from the incorporation of gender-based perspectives and frameworks.

  7. The overseas acquisitions and equity oil shares of Chinese national oil companies: A threat to the West but a boost to China's energy security?

    International Nuclear Information System (INIS)

    Zhang Zhongxiang

    2012-01-01

    This paper argues that both China and the Western countries need to de-politicize China's global quest for energy security. The Western politicians need to recognize that their rhetoric in relation to China's efforts to secure energy supplies overseas has done nothing but intensify China's fear that they might seek to deny China's access to the oil it needs for the development. China needs to reconsider its stance of distrusting global oil markets and to recognize that the reliance on aggressive acquisitions of overseas oil fields and equity oil production has been of little help in strengthening its energy security. Given that China's energy security depends increasingly and deeply on the stability of global oil markets and reliable and growing oil supplies to the market, China shares with other major oil importing countries profound common interests in maintaining and strengthening the stability of global oil markets and reducing the chance of potential disruptions to oil supply and the resulting damaging oil price shocks.

  8. Human threats to sandy beaches: A meta-analysis of ghost crabs illustrates global anthropogenic impacts.

    Science.gov (United States)

    Schlacher, Thomas A.; Lucrezi, Serena; Connolly, Rod M.; Peterson, Charles H.; Gilby, Ben L.; Maslo, Brooke; Olds, Andrew D.; Walker, Simon J.; Leon, Javier X.; Huijbers, Chantal M.; Weston, Michael A.; Turra, Alexander; Hyndes, Glenn A.; Holt, Rebecca A.; Schoeman, David S.

    2016-02-01

    Beach and coastal dune systems are increasingly subjected to a broad range of anthropogenic pressures that on many shorelines require significant conservation and mitigation interventions. But these interventions require reliable data on the severity and frequency of adverse ecological impacts. Such evidence is often obtained by measuring the response of 'indicator species'. Ghost crabs are the largest invertebrates inhabiting tropical and subtropical sandy shores and are frequently used to assess human impacts on ocean beaches. Here we present the first global meta-analysis of these impacts, and analyse the design properties and metrics of studies using ghost-crabs in their assessment. This was complemented by a gap analysis to identify thematic areas of anthropogenic pressures on sandy beach ecosystems that are under-represented in the published literature. Our meta-analysis demonstrates a broad geographic reach, encompassing studies on shores of the Pacific, Indian, and Atlantic Oceans, as well as the South China Sea. It also reveals what are, arguably, two major limitations: i) the near-universal use of proxies (i.e. burrow counts to estimate abundance) at the cost of directly measuring biological traits and bio-markers in the organism itself; and ii) descriptive or correlative study designs that rarely extend beyond a simple 'compare and contrast approach', and hence fail to identify the mechanistic cause(s) of observed contrasts. Evidence for a historically narrow range of assessed pressures (i.e., chiefly urbanisation, vehicles, beach nourishment, and recreation) is juxtaposed with rich opportunities for the broader integration of ghost crabs as a model taxon in studies of disturbance and impact assessments on ocean beaches. Tangible advances will most likely occur where ghost crabs provide foci for experiments that test specific hypotheses associated with effects of chemical, light and acoustic pollution, as well as the consequences of climate change (e

  9. Intrastate conflict in oil producing states: A threat to global oil supply?

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter, E-mail: peter.toft@ec.europa.eu [Institute for Energy, Joint Research Centre of the European Commission, Westerduinweg 3, 1755 ZG Petten (Netherlands)

    2011-11-15

    In this paper I investigate how often and how much outbreaks of intrastate conflict in oil producing states translates into oil supply shortfalls. The Libyan conflict that broke out in February 2011 highlighted the fear that intrastate conflict in oil producing states may imply shortfalls and ensuing volatile global oil prices. I argue, however, that it is far from certain that shortfalls following conflict outbreak will occur, since both sides in a conflict face incentives simultaneously to protect and maintain oil installations and to strike and destroy these. Based on a quantitative analysis of 39 intrastate wars in oil producing countries (1965-2007) I conclude that outbreak of conflict does not translate into production decline with any certainty. In fact, likelihoods are less than 50% for reductions to occur. In many cases growing production actually followed conflict outbreak. I conclude by investigating four characteristics of intrastate conflict that may explain when oil production is at risk during conflict: (1) proximity of oil producing fields to key battle zones, (2) duration of conflict, (3) separatism and the location of oil in separatist territory, and (4) the relative size of oil production. While the first three factors did not prove important, oil producer size could be significant. But further research is needed to establish this with greater certainty. - Highlights: > Oil shortfall during intrastate conflict is not a given. > Statistical analysis of 39 intrastate conflicts in oil producing countries since 1965. > Examination of four characteristics of intrastate conflict in oil producing countries. > Marginal significance related to large producers and production shortfall.

  10. Intrastate conflict in oil producing states: A threat to global oil supply?

    International Nuclear Information System (INIS)

    Toft, Peter

    2011-01-01

    In this paper I investigate how often and how much outbreaks of intrastate conflict in oil producing states translates into oil supply shortfalls. The Libyan conflict that broke out in February 2011 highlighted the fear that intrastate conflict in oil producing states may imply shortfalls and ensuing volatile global oil prices. I argue, however, that it is far from certain that shortfalls following conflict outbreak will occur, since both sides in a conflict face incentives simultaneously to protect and maintain oil installations and to strike and destroy these. Based on a quantitative analysis of 39 intrastate wars in oil producing countries (1965-2007) I conclude that outbreak of conflict does not translate into production decline with any certainty. In fact, likelihoods are less than 50% for reductions to occur. In many cases growing production actually followed conflict outbreak. I conclude by investigating four characteristics of intrastate conflict that may explain when oil production is at risk during conflict: (1) proximity of oil producing fields to key battle zones, (2) duration of conflict, (3) separatism and the location of oil in separatist territory, and (4) the relative size of oil production. While the first three factors did not prove important, oil producer size could be significant. But further research is needed to establish this with greater certainty. - Highlights: → Oil shortfall during intrastate conflict is not a given. → Statistical analysis of 39 intrastate conflicts in oil producing countries since 1965. → Examination of four characteristics of intrastate conflict in oil producing countries. → Marginal significance related to large producers and production shortfall.

  11. WMD Proliferation, Globalization, and International Security: Whither the Nexus and National Security?

    Science.gov (United States)

    2006-07-01

    group Aum Shinrikyo on the Tokyo subway system, which resulted in 10 deaths, is regarded by many as the dawn of the era of modern WMD terrorism...organizations have become truly global in character. Al Qaeda, for example, is franchising operations around the world either directly or indirectly

  12. The evolution, etiology and eventualities of the global health security regime.

    Science.gov (United States)

    Hoffman, Steven J

    2010-11-01

    Attention to global health security governance is more important now than ever before. Scientists predict that a possible influenza pandemic could affect 1.5 billion people, cause up to 150 million deaths and leave US$3 trillion in economic damages. A public health emergency in one country is now only hours away from affecting many others. Using regime analysis from political science, the principles, norms, rules and decision-making procedures by which states govern health security are examined in the historical context of their punctuated evolution. This methodology illuminates the catalytic agents of change, distributional consequences and possible future orders that can help to better inform progress in this area. Four periods of global health security governance are identified. The first is characterized by unilateral quarantine regulations (1377-1851), the second by multiple sanitary conferences (1851-92), the third by several international sanitary conventions and international health organizations (1892-1946) and the fourth by the hegemonic leadership of the World Health Organization (1946-????). This final regime, like others before it, is challenged by globalization (e.g. limitations of the new International Health Regulations), changing diplomacy (e.g. proliferation of global health security organizations), new tools (e.g. global health law, human rights and health diplomacy) and shock-activated vulnerabilities (e.g. bioterrorism and avian/swine influenza). This understanding, in turn, allows us to appreciate the impact of this evolving regime on class, race and gender, as well as to consider four possible future configurations of power, including greater authority for the World Health Organization, a concert of powers, developing countries and civil society organizations. This regime analysis allows us to understand the evolution, etiology and eventualities of the global health security regime, which is essential for national and international health

  13. Food security for Africa: an urgent global challenge

    Directory of Open Access Journals (Sweden)

    Sasson Albert

    2012-04-01

    Full Text Available Abstract In 2012, food insecurity is still a major global concern as 1 billion people are suffering from starvation, under-, and malnutrition, and the Food and Agriculture Organization of the United Nations (FAO has concluded that we are still far from reaching millennium development goal (MDG number 1: to halve extreme poverty and hunger by 2015. In sub-Saharan Africa, the number of people suffering from hunger is estimated at 239 million, and this figure could increase in the near future. There are many examples of food insecurity in sub-Saharan Africa, some of them having reached catastrophic dimensions, for example, in the Horn of Africa or southern Madagascar. Food insecurity is not just about insufficient food production, availability, and intake, it is also about the poor quality or nutritional value of the food. The detrimental situation of women and children is particularly serious, as well as the situation among female teenagers, who receive less food than their male counterparts in the same households. Soaring food prices and food riots are among the many symptoms of the prevailing food crisis and insecurity. Climate change and weather vagaries, present and forecast, are generally compounding food insecurity and drastically changing farming activities, as diagnosed by the Consultative Group on International Agricultural Research (CGIAR in June 2011. The key cause of food insecurity is inadequate food production. Since the global food crisis of 2007–2008, there has been an increasing awareness throughout the world that we must produce more and better food; and we should not be derailed from this goal, despite some relief brought by the good cereal harvests in 2011–2012. This is particularly true in sub-Saharan Africa, which needs and wants to make its own green revolution. The African challenge indeed is key to mitigating food insecurity in the world. Commitments were made by the heads of states and governments of the African Union

  14. The institutional dimension of the European Union’s combat transnational crime, as one of the main threats to European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the role of the leading institutions of European Union in the fight with transnational crime. It was determined that the problem of transnational crime occupies one of the central places in the field of European security. This is due to the fact that the overall level of crime in Europe in recent years has increased several times compared with the beginning of the XXI century. It was found that today transnational crime is becoming a serious obstacle on the way of building stability and sustainable development. It is nothing less than terrorism, illegal immigration affects the state of European security, creating the new center of a danger in Europe. It is proved that each institution has its own specific of struggle, but the unifying factor is that all of them are working on the same thing – the elimination of the threat in order to increase the level of security in Europe in general and in EU in particular. Substantiated the thesis that it is important to further developing of close and constructive cooperation between the main European institutions, as well as mutual exchange of information and data regarding the recent changes and the manifestations of transnational crime. This will give an opportunity to strengthen the European security system, as well as implement common practical methods of counteraction. It was determined that the actualization of the practical component in the framework of EU institutional dimension in the future will contribute to strengthening European.

  15. Satellite Imagery Analysis for Automated Global Food Security Forecasting

    Science.gov (United States)

    Moody, D.; Brumby, S. P.; Chartrand, R.; Keisler, R.; Mathis, M.; Beneke, C. M.; Nicholaeff, D.; Skillman, S.; Warren, M. S.; Poehnelt, J.

    2017-12-01

    The recent computing performance revolution has driven improvements in sensor, communication, and storage technology. Multi-decadal remote sensing datasets at the petabyte scale are now available in commercial clouds, with new satellite constellations generating petabytes/year of daily high-resolution global coverage imagery. Cloud computing and storage, combined with recent advances in machine learning, are enabling understanding of the world at a scale and at a level of detail never before feasible. We present results from an ongoing effort to develop satellite imagery analysis tools that aggregate temporal, spatial, and spectral information and that can scale with the high-rate and dimensionality of imagery being collected. We focus on the problem of monitoring food crop productivity across the Middle East and North Africa, and show how an analysis-ready, multi-sensor data platform enables quick prototyping of satellite imagery analysis algorithms, from land use/land cover classification and natural resource mapping, to yearly and monthly vegetative health change trends at the structural field level.

  16. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    Each day approximately 6,800 members of the private security workforce are deployed across Kansas City to provide protection services at venues, many of which have been identified as being critical...

  17. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    ... between private security and the KCPD. To empower this resource as a terrorism prevention force multiplier the development of a web based virtual knowledge sharing initiative was explored in this study as a solution to provide "one stop...

  18. Advances in chemical sensing technologies for VOCs in breath for security/threat assessment, illicit drug detection, and human trafficking activity.

    Science.gov (United States)

    Giannoukos, S; Agapiou, A; Taylor, S

    2018-01-17

    On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.

  19. Global Energy Security and Its Geopolitical Impediments: The Case of the Caspian Region

    NARCIS (Netherlands)

    Amineh, M.P.; Houweling, H.

    2007-01-01

    This article discusses the global geopolitics of energy security in the post-Cold War environment. Energy companies headquartered in western countries have long history of accessing energy resources beyond borders through invasion of the host by their home state, followed by domination and the

  20. Transnational legal assemblages and global security law: topologies and temporalities of the list

    NARCIS (Netherlands)

    Sullivan, G.

    2014-01-01

    This article examines the UN 1267 Al-Qaida sanctions regime as a technique of global security listing and form of transnational law with distinct legal ordering processes. Conventional literatures frame these sanctions in formalist terms, flattening their complexity. Understanding their qualities

  1. Counterintelligence Screening Needed lo Reduce Security Threat That Unscreened Local National Linguists Pose to U.S. Forces (REDACTED)

    Science.gov (United States)

    2012-12-07

    Logistics Civil Augmentation Program MEP Mission Essential Personnel MFR Memorandum for Record OCI Organizational Conflict of Interest OCONUS Outside...reports would draw conclusions and recollllllel1dations on the retention, hir.ing, or threat posed by the LNs. MEP would send thjl MFRs to tlie...office responsible for issning badges on the local installations if the MFRs had no negative CI infonnation. If the MFRs had CI exploitable information

  2. Promoting nuclear security: What the IAEA is doing. The Agency is implementing a comprehensive programme aimed at stemming the threat of nuclear terrorism

    International Nuclear Information System (INIS)

    2003-01-01

    The threat to public safety and security posed by some form of nuclear terrorism is not new. But in the wake of recent highly organized terrorist attacks in Kenya, Tanzania, the US, Indonesia, Saudi Arabia, Morocco and numerous other nations, the international community has come to recognize that new and stronger measures must be taken to protect against and prepare for a diverse range of terrorist scenarios. Given the multiplicity of targets and scenarios for terrorists, States must consider a comprehensive approach to combating nuclear terrorism. Among the key priorities: Adequate physical protection of all nuclear materials, radioactive materials and facilities plus transport systems; Proper regulatory control of nuclear and radioactive material; Effective detection and interdiction of illicit trafficking in nuclear and radioactive materials; Integration of nuclear safety and security systems for maximum benefits; and Readiness for implementing emergency response plans. The IAEA is assisting its Member States with these challenges in many ways. Through well-established activities, the Agency has been heavily involved in providing assistance and technical support to States in all these areas. The IAEA has established several advisory services to help Member States to assess the effectiveness and the need for improvement of their national physical oversight systems. The IAEA provides peer reviews in related areas such as regulatory or control infrastructures, and also supplies expert technical advice on the required upgrades. Several of these specialized services aim directly at protecting against terrorist threats. The International Nuclear Security Advisory Service is a new initiative that is providing specialized services promoting enhanced nuclear security. The International SSAC Advisory Service (ISSAS) is another new initiative providing advice to Member States in strengthening their SSAC. The IAEA also offers the EPREV (Emergency Preparedness REView

  3. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist.

    Science.gov (United States)

    Perera, Frederica

    2017-12-23

    Fossil-fuel combustion by-products are the world's most significant threat to children's health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO₂), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases-all of which may be "seeded" in utero and affect health and functioning immediately and over the life course. By impairing children's health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the neurodevelopmental

  4. Impact of lengthening open water season on food security in Alaska coastal communities: Global impacts may outweigh local "frontline" effects

    Science.gov (United States)

    Rolph, R.; Mahoney, A. R.

    2015-12-01

    Using ice concentration data from the Alaska Sea Ice Atlas from 1953-2013 for selected communities in Alaska, we find a consistent trend toward later freeze up and earlier breakup, leading a lengthened open water period. Such changes are often considered to bring a variety of "frontline" local impacts to Arctic coastal communities such as increased rates of coastal erosion. However, direct consequences of these changes to local food security (e.g. through impacts on subsistence activities and marine transport of goods) may be outweighed at least in the short term by the effects of large scale Arctic sea ice change coupled with global oil markets. For example, a later freeze-up might delay local hunters' transition from boats to snow-machines, but whether this trend will affect hunting success, especially in the next few years, is uncertain. Likewise, the magnitude of change in open water season length is unlikely to be sufficient to increase the frequency with which communities are served by barges. However, an expanding open water season throughout the Arctic has implications for the global economy, which can have indirect effects on local communities. In the Chukchi and Beaufort Seas, where rapid sea ice change has been accompanied by increased interest in oil and gas development, the U.S. Bureau of Ocean Energy Management currently requires drilling operations to cease 38 days prior to freeze up. Taking this into account, the lengthening open water season has effectively extended the drilling season for oil companies by 184% since the 1950s. If oil development goes ahead, local communities will likely experience a range of indirect impacts on food security due to increased vessel traffic and demand on infrastructure coupled with changes in local economies and employment opportunities. Increased likelihood of an oil spill in coastal waters also poses a significant threat to local food security. Thus, while Arctic coastal communities are already experiencing

  5. Nuclear Security and the Way Forward

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2013-01-01

    Nuclear security has always been taken seriously. There is ample evidence that traditional deterrence does not necessarily obstruct those with malicious intent, who can also operate across borders. This understanding of the threat has highlighted the need to adopt a vigorous approach to protecting nuclear materials, associated facilities and activities in order to strengthen nuclear security worldwide. States recognize that there is a credible threat of nuclear or other radioactive material falling into the wrong hands and that this threat is global. An international legal framework for nuclear security, national nuclear security infrastructures, and the IAEA's leading role are some of the building blocks of an effective international nuclear security framework that contributes to effectively addressing this threat

  6. Global citizenship is key to securing global health: the role of higher education.

    Science.gov (United States)

    Stoner, Lee; Perry, Lane; Wadsworth, Daniel; Stoner, Krystina R; Tarrant, Michael A

    2014-07-01

    Despite growing public awareness, health systems are struggling under the escalating burden of non-communicable diseases. While personal responsibility is crucial, alone it is insufficient. We argue that one must place themselves within the broader/global context to begin to truly understand the health implications of personal choices. Global citizenship competency has become an integral part of the higher education discourse; this discourse can and should be extended to include global health. A global citizen is someone who is (1) aware of global issues, (2) socially responsible, and (3) civically engaged. From this perspective, personal health is not solely an individual, self-serving act; rather, the consequences of our lifestyle choices and behaviors have far-reaching implications. This paper will argue that, through consciously identifying global health within the constructs of global citizenship, institutions of higher education can play an instrumental role in fostering civically engaged students capable of driving social change. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Helen H [Los Alamos National Laboratory

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  8. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  9. The Influence of Globalization on the Change and Convergence of Social Security Transfer: An Empirical Analysis for OECD Counties

    Directory of Open Access Journals (Sweden)

    Jinyoung Hwang

    2007-12-01

    Full Text Available Using a cross-section of OECD countries, this paper examines the relationship between globalization and the change and convergence of social security transfer. Globalization has arguably had a profound impact on the use of social protection in states, since it is normally accompanied with increases in income inequality, polarization, and unemployment. In addition, globalization may lead to socio- economic policy harmonization across countries. The empirical results show that there exists a significant and positive relationship between social security transfer in GDP and the globalization index based on political, economic, and social integrations. Also, we found the convergence phenomenon of social security transfer in OECD countries, applying the traditional methodology of convergence and convergence. Therefore, there is evidence in OECD countries that globalization indirectly affects the convergence of social security transfer in addition to direct relation to social security transfer in GDP.

  10. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  11. Maize lethal necrosis (MLN), an emerging threat to maize-based food security in sub-Saharan Africa

    Science.gov (United States)

    In sub-Saharan Africa, maize is a staple food and key determinant of food security for smallholder farming communities. Pest and disease outbreaks are key constraints to maize productivity. In September 2011, a serious disease outbreak, later diagnosed as maize lethal necrosis (MLN), was reported on...

  12. Water dependency and water exploitation at global scale as indicators of water security

    Science.gov (United States)

    De Roo, A. P. J.; Beck, H.; Burek, P.; Bernard, B.

    2015-12-01

    A water dependency index has been developed indicating the dependency of water consumption from upstream sources of water, sometimes across (multiple) national border. This index is calculated at global scale using the 0.1 global LISFLOOD hydrological modelling system forced by WFDEI meteorological data for the timeframe 1979-2012. The global LISFLOOD model simulates the most important hydrological processes, as well as water abstraction and consumption from various sectors, and flood routing, at daily scale, with sub-timesteps for routing and subgrid parameterization related to elevation and landuse. The model contains also options for water allocation, to allow preferences of water use for particular sectors in water scarce periods. LISFLOOD is also used for the Global Flood Awareness System (GloFAS), the European Flood Awareness System (EFAS), continental scale climate change impact studies on floods and droughts. The water dependency indicator is calculated on a monthly basis, and various annual and multiannual indicators are derived from it. In this study, the indicator will be compared against water security areas known from other studies. Other indicators calculated are the Water Exploitation Index (WEI+), which is a commonly use water security indicator in Europe, and freshwater resources per capita indicators at regional, national and river basin scale. Several climate scnearios are run to indicate future trends in water security.

  13. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  14. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  15. Promoting Economic Security through Information Technology ...

    African Journals Online (AJOL)

    The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have sprang up in many parts of ...

  16. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist

    Science.gov (United States)

    Perera, Frederica

    2017-01-01

    Fossil-fuel combustion by-products are the world’s most significant threat to children’s health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO2), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases—all of which may be “seeded“ in utero and affect health and functioning immediately and over the life course. By impairing children’s health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the

  17. Nuclear Security Education in “non-Nuclear” Countries – Inseparable Component of Global Nuclear Security Scheme. Example of Montenegro

    International Nuclear Information System (INIS)

    Jovanovic, S.

    2014-01-01

    Global regime of nuclear security cannot be complete and functional if all countries are not involved; • Apart from the fact that developed nuclear countries are crucial in this sense (and determining the system), due attention should be paid to small, developing, “nonnuclear” ones; • Small problems in big countries are often big problems in small countries – so it is with HRD in nuclear related fields; • Everything is based on competence, with education being fundamental for building it up; • To that aim, the role of universities is of utmost importance, while networking is another corner stone; • Experience of Montenegro, perhaps exemplary in the above context, is discussed. (author)

  18. RECENT THREATS TO CLOUD COMPUTING DATA AND ITS PREVENTION MEASURES

    OpenAIRE

    Rahul Neware*

    2017-01-01

    As the cloud computing is expanding day by day due to its benefits like Cost, Speed Global Scale, Productivity, Performance, Reliability etc. Everyone, like Business vendors, governments etc are using the cloud computing to grow fast. Although Cloud Computing has above mentioned and other benefits but security of cloud is problems and due to this security problem adoption of cloud computing is not growing. This paper gives information about recent threats to the cloud computing data and its p...

  19. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  20. Global Hotspots of Conflict Risk between Food Security and Biodiversity Conservation

    OpenAIRE

    Molotoks, Amy; Dawson, Terence Peter

    2017-01-01

    The global challenges of food security and biodiversity are rarely addressed together, though recently there has been an increasing awareness that the two issues are closely related. The majority of land available for agriculture is already used for food production, but despite the productivity gains, one in nine people worldwide are classified as food insecure. There is an increasing risk that addressing food insecurity through methods such as agricultural expansion orintensification could l...

  1. The NPT regime, present and future global security: an American view

    International Nuclear Information System (INIS)

    Thompson, Sam.

    1987-01-01

    Although not perfect, an international non-proliferation regime as set out by the IAEA and Non-Proliferation Treaty is in existence. The history of the involvement of the United States in the development of this regime is mentioned as a background to explaining the current approach of the Reagan Administration to non-proliferation. Trends and challenges which may affect future global security are then identified and discussed. The author is optimistic about the future. (U.K.)

  2. Energy Security and Economics of Indian Biofuel Strategy in a Global Context

    OpenAIRE

    Gunatilake, Herath; Roland-Holst, David; Sugiyarto, Guntur; Baka, Jenn

    2011-01-01

    The emergence of biofuel as a renewable energy source offers opportunities for climate change mitigation and greater energy security for many countries. At the same time, biofuel represents the possibility of substitution between energy and food. For developing countries like India, which imports over 75% of its crude oil, fossil fuels pose two risks - global warming pollution and negative economic impacts of oil price hikes. This paper examines India's options for managing energy price risk ...

  3. THE FACTOR OF ENERGY-INFORMATION SECURITY IN THE FRAMEWORK OF GLOBAL CIVILIZATION-RELATED CHANGES

    OpenAIRE

    Alexey Viktorovich SUHORUKHIH

    2015-01-01

    The paper examined the grounds having involved global social and cultural changes, and emphasized the precedence taken by an energy-information component to the geopolitical dynamics of the civilization continuum. The study emphasized the relevance of new facets in social and cultural insight urged to respond to challenges of direct mental hazards emerging over the world, and requirement of energy-information security the civilization has sought for, assumed to be the framework for considerin...

  4. Achieving sustainable irrigation water withdrawals: global impacts on food security and land use

    Science.gov (United States)

    Liu, Jing; Hertel, Thomas W.; Lammers, Richard B.; Prusevich, Alexander; Baldos, Uris Lantz C.; Grogan, Danielle S.; Frolking, Steve

    2017-10-01

    Unsustainable water use challenges the capacity of water resources to ensure food security and continued growth of the economy. Adaptation policies targeting future water security can easily overlook its interaction with other sustainability metrics and unanticipated local responses to the larger-scale policy interventions. Using a global partial equilibrium grid-resolving model SIMPLE-G, and coupling it with the global Water Balance Model, we simulate the consequences of reducing unsustainable irrigation for food security, land use change, and terrestrial carbon. A variety of future (2050) scenarios are considered that interact irrigation productivity with two policy interventions— inter-basin water transfers and international commodity market integration. We find that pursuing sustainable irrigation may erode other development and environmental goals due to higher food prices and cropland expansion. This results in over 800 000 more undernourished people and 0.87 GtC additional emissions. Faster total factor productivity growth in irrigated sectors will encourage more aggressive irrigation water use in the basins where irrigation vulnerability is expected to be reduced by inter-basin water transfer. By allowing for a systematic comparison of these alternative adaptations to future irrigation vulnerability, the global gridded modeling approach offers unique insights into the multiscale nature of the water scarcity challenge.

  5. Security, insecurity and health.

    Science.gov (United States)

    Coupland, Robin

    2007-03-01

    An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecurity is a massive global health issue. The foreign policies of donor governments should incorporate recognition that documentation, analysis and publication of data describing the impact of insecurity on people's health can lead to the creation of policies to enhance people's security.

  6. Threat Analysis : Work Package 1.2 - Expert Group on the security and resilience of Communication networks and Information systems for Smart Grids

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    In order to be aware of the various threats that are relevant to Smart Grids, the team designed an all hazards threat taxonomy taking into account threats that may harm Smart Grid stakeholders. The analysis and weighting of these threats makes it easier to determine how measures can be taken in

  7. Desovereignization of national state, economy and security in terms of globalization

    Directory of Open Access Journals (Sweden)

    Rakić Mile M.

    2014-01-01

    Full Text Available In current modern age of worldwide processes of globalization and globalism a process of desovereigntization of national state and economy has become a general process. Therefore national state has been faced with numerous challenges and it has been in a permanent state of crisis. Within the process of globalization most often rich enclaves of national states make attempts to integrate themselves into neoliberal capitalist system, while poor and backward enclaves become abandoned and so national states become disintegrated. First of all it is necessary to search for causes of ethno-religious conflicts and a national separatism in the field of economy. Within the globalization environment it happened that old entities, national state, national economy and national security gained totally new meanings. By using a method of comparative analysis of document contents and consitutional and political practice alike it is possible to reach conclusion that a great number of modern national states, including the Republic of Serbia among them, have found themselves in the state of permanent crisis, and the state crisis implies, before anything else, the crisis of state sovereignty. The state gets destroyed both from inside and outside in different ways. By using a quality method it is confirmed that within a state there comes an overstepping of constitutional regulations which encompass, before else, the issues of national economy and national security, and it is achieved in particular by seizure of economic sovereignty.

  8. The Fukushima nuclear accident and its effect on global energy security

    International Nuclear Information System (INIS)

    Hayashi, Masatsugu; Hughes, Larry

    2013-01-01

    The March 2011 nuclear accident at the Fukushima Daiichi nuclear power station affected both short- and long-term energy-security in Japan, resulting in crisis-driven, ad hoc energy policy and, because of the decision to shutter all nuclear reactors, increased the country’s demand for fossil fuels, primarily natural gas. However, the effects of the accident on energy security were not restricted to Japan; for example, the worldwide availability and affordability of liquefied natural gas were affected by Japan’s increased demand; while the accident itself resulted in the loss of public acceptability of nuclear power and led countries, such as Germany and Italy, to immediately shut down some of the nuclear reactors or abandon plans to build new ones. This paper examines some of the short-term effects on global energy security following the accident at Fukushima, focusing on the main replacement fuel, liquefied natural gas. It shows, amongst other things, that the accident increased investment in liquefied natural gas projects around the world. The paper shows that despite Fukushima contributing to nuclear power’s loss of acceptability in most developed countries, it is still seen as an essential way of improving energy security in many countries and, despite what its critics may say, will probably continue to be used as a significant source of low-carbon electricity. - Highlights: ► Japan’s demands for fossil fuels raised the price of LNG and low-sulfur crudes. ► The accident affected the global price of uranium and producer share prices. ► The accident accelerated foreign-direct investment in LNG projects worldwide. ► The change in public perception toward nuclear power was relatively limited. ► A radical shift in global nuclear policy seems to be unrealistic after Fukushima

  9. Global Food Security-support data at 30 m (GFSAD30)

    Science.gov (United States)

    Thenkabail, P. S.

    2013-12-01

    Monitoring global croplands (GCs) is imperative for ensuring sustainable water and food security to the people of the world in the Twenty-first Century. However, the currently available cropland products suffer from major limitations such as: (1) Absence of precise spatial location of the cropped areas; (b) Coarse resolution nature of the map products with significant uncertainties in areas, locations, and detail; (b) Uncertainties in differentiating irrigated areas from rainfed areas; (c) Absence of crop types and cropping intensities; and (e) Absence of a dedicated webdata portal for the dissemination of cropland products. Therefore, our project aims to close these gaps through a Global Food Security-support data at 30 m (GFSAD30) with 4 distinct products: 1. Cropland extentarea, 2. Crop types with focus on 8 crops that occupy 70% of the global cropland areas, 3. Irrigated versus rainfed, and 4. Cropping intensities: single, double, triple, and continuous cropping. The above 4 products will be generated for GFSAD for nominal year 2010 (GFSAD2010) based on Landsat 30m Global Land Survey 2010 (GLS2010) fused with Moderate Resolution Imaging Spectroradiometer (MODIS) 250m NDVI monthly maximum value composites (MVC) of 2009-2011 data, and suite of secondary data (e.g., long-term precipitation, temperature, GDEM elevation). GFSAD30 will be produced using three mature cropland mapping algorithms (CMAs): 1. Spectral matching techniques; 2. A cropland classification algorithm (ACCA) that is rule-based; and 3. Hierarchical segmentation (HSeg) algorithm. Funded by NASA MEaSUREs, GFSAD30 will make significant contributions to Earth System Data Records (ESDRs), Group on Earth Observations (GEO) Agriculture and Water Societal Beneficial Areas (GEO Ag. SBAs), GEO Global Agricultural Monitoring Initiative (GEO GLAM), and the recent 'Big Data' initiative by the White House. The project has the support of USGS Working Group on Global Croplands (https://powellcenter.usgs.gov/globalcroplandwater/).

  10. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  11. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  12. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  13. ICT security curriculum or how to respond to current global challenges

    Directory of Open Access Journals (Sweden)

    Marian Silviu Poboroniuc

    2017-01-01

    Full Text Available The paper presents some results obtained through the implementation of the Erasmus LLP “SALEIE” (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions. The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and Information Engineering (EIE education within Europe, especially in relation to modern global technical challenges and to provide higher education models in a few EIE fields in accordance with these challenges. One of the outcomes of the project was a new ICT (Information and Computer Technology Security curriculum for bachelor and master levels. The research methodology comprised such stages as: identifying the most important current global challenges, conducting a survey related to existing EIE programs in order to establish the top-level criteria for an EIE curriculum, analyzing the results of the survey, obtaining the industry feedback related to technical and non-technical skills required for the specific field, and proposing a new curriculum for ICT Security programmes to respond to the modern technical challenges and to meet the needs of the industry, students, academics and graduates. As future work we will focus on stakeholder assessment in the EIE field and, based on the resulting feedback, on improving the ICT Security curriculum.

  14. Rising food costs & global food security: Key issues & relevance for India

    Science.gov (United States)

    Gustafson, Daniel J.

    2013-01-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers’ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all. PMID:24135190

  15. Rising food costs & global food security: Key issues & relevance for India

    Directory of Open Access Journals (Sweden)

    Daniel J Gustafson

    2013-01-01

    Full Text Available Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers′ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country′s reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  16. Rising food costs & global food security: key issues & relevance for India.

    Science.gov (United States)

    Gustafson, Daniel J

    2013-09-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers' incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  17. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  18. Assessing the Biological Threat Posed by Suicide Bombers

    Science.gov (United States)

    2016-02-01

    the test by about 350’, it is clear some aerosol particles “ surfed ” the shockwave from the blast and were carried a distance upwind. Had the sampling...projectiles implantation in victims of suicide bombings and implications for health and emergency care provideres: the 7/7 experience, Ann R Coll Surg Engl...Ebola in East Africa and Implications for Global Health and Security, Global Policy 2013. (8) Ustun, C.; Ozgurler, O., Ebola: A Significant Threat as

  19. Quantifying the impact of weather extremes on global food security: A spatial bio-economic approach

    Directory of Open Access Journals (Sweden)

    Sika Gbegbelegbe

    2014-08-01

    Full Text Available This study uses a spatial bio-economic modelling framework to estimate the impact of the 2012 weather extreme in the USA on food security in the developing world. The study also quantifies the potential effects of a similar weather extreme occurring in 2050 under climate change. The study results indicate that weather extremes that affect maize productivity in key grain baskets can negatively affect food security in vulnerable countries. The 2012 weather extreme which occurred in the USA reduced US and global maize production by 29% compared to trend; maize consumption in the country decreased by 5% only and this resulted in less surplus maize for exports from the largest maize exporter in the world. Global maize production decreased by 6% compared to trend. The decrease in global maize production coupled with a reduction in the volume of global maize exports worsened food insecurity in eastern Africa, the Caribbean and Central America and India. The effects of the weather extreme on global food security would be worse, if the latter were to occur under climate change in 2050, assuming no climate change adaptation worldwide over the years. In addition, the hardest-hit regions would remain the same, whether the weather extreme occurs in 2012 instead of 2050: Sub-Saharan Africa (SSA, South Asia and the Latin America and Caribbean (LAC region. However, sustained growth in per capita income across world economies between 2000 and 2050 would allow few countries in SSA and the LAC region to virtually eliminate hunger within their borders. In these countries, per capita income would be high enough by 2050 to completely offset the negative effect of the weather extreme. The study results are also consistent with USDA׳s estimates on US and global maize production and consumption in 2012 after the weather extreme. Some discrepancy is found on the volume of global maize trade; this implies that the bio-economic model likely overestimates the effect of the

  20. Global security: The need for a new beginning, 12 October 2007, New Delhi, Hindustan Times Leadership Summit

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    The search for security remains the overriding concern for many peoples and nations. But the definition of what constitutes security, and the strategies for attaining it, vary greatly. For billions of people, the quest is to 'secure' basic needs: food, water, shelter and health care - in other words, freedom from want. For others, it is to 'secure' other fundamental human rights: freedom of expression, freedom from oppression, freedom from fear. Even among States, security has different definitions. For some, it is the achievement of economic or military parity or superiority, for others the projection of power and influence, and for still others the resolution of grievances and disputes. If we look at the quest to secure basic needs, we are struck by the persistent inequity in the global distribution of wealth. If we look at the quest for other fundamental human rights, the picture is also grim in many regions, with problems ranging from religious intolerance and the lack of political freedom to systematic oppression and torture. Perhaps the most severe critique of our global progress in this area is reflected in our uneven approach to the sanctity of human life. If we look at the security of nation-States, our record is also poor, particularly as reflected in regional conflicts that have been allowed to fester for decades. The effort to curtail nuclear threats is still a work in progress. Consider the events of just the past few years. The war in Iraq over suspicions that nuclear and other weapons programmes had been revived. North Korea's withdrawal from the NPT and subsequent test of a nuclear weapon. Libya's relinquishment of a fledgling nuclear weapons programme. The discovery of A. Q. Khan's illicit nuclear procurement and distribution network. The still ongoing investigation of Iran's clandestine nuclear programme. And not least, a surge in the sophistication of extremist networks - underscoring the potential for nuclear and radiological terrorism. Add to