WorldWideScience

Sample records for homeland security science

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  3. Homeland Security Digital Library

    OpenAIRE

    Reneker, Maxine H.; Gassie, Lillian

    2003-01-01

    The Homeland Security Digital Library (HSDL) is the nation's premier collection of documents relating to homeland security policy, strategy and organizational management. The mission of the HSDL is to strengthen the national security of the United States by supporting local, state, territorial, tribal and federal analysis, debate, and decision-making needs and to assist academics of all disciplines in homeland defense and security-related research.

  4. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  5. Overview of Infrastructure Science and Analysis for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-07-21

    This presentation offers an analysis of infrastructure science with goals to provide third-party independent science based input into complex problems of national concern and to use scientific analysis to "turn down the noise" around complex problems.

  6. Department of Homeland Security

    Science.gov (United States)

    ... critical infrastructure sectors in the United States and globally. Nov 9 Press Release Acting Secretary Duke Meets ... Travel Alerts Get a Homeland Security Job Do Business with DHS Verify Employment Eligibility (E-Verify) Find ...

  7. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...

  8. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... provisions of the FACA. The committee addresses areas of interest and importance to the Under Secretary for... Address Homeland Security Challenges, Accelerating Innovation Through Systems Analysis, and Leveraging...

  9. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... accordance with the provisions of the FACA. The committee addresses areas of interest and importance to the... Address Homeland Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging...

  10. Homeland Security Master's Degrees Awarded

    OpenAIRE

    Center for Homeland Defense and Security

    2011-01-01

    Center for Homeland Defense and Security, PRESS RELEASES MONTEREY, Calif. – Twenty-nine professionals who work in the homeland security field were awarded master’s degrees March 25 at the Naval Postgraduate School Center for Homeland Defense and Security. The...

  11. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  12. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... SECURITY Homeland Security Information Network Advisory Committee AGENCY: Department of Homeland Security... Applicants for Appointment to Homeland Security Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network...

  13. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  14. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... engineering), and their depth of experience in applying these areas of science and technology to real- world... Financial Disclosure Reports (OGE Form 450). DHS may not release the reports or the information in them to...

  15. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    Energy Technology Data Exchange (ETDEWEB)

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  16. The National Homeland Security Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — The National Homeland Security Research Center advances our nation's security by providing scientific products and expertise to improve the ability to respond to and...

  17. 77 FR 26774 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-05-07

    ... recommendations for the consideration of the Secretary of the Department of ] Homeland Security on matters related..., receive observations and remarks from DHS senior leadership, and review and deliberate on recommendations... leadership on threats to our homeland security, border security, U.S. Coast Guard counterterrorism efforts...

  18. 75 FR 2880 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-01-19

    ... Security to aid in the creation and implementation of critical and actionable policies and capabilities... members, receive observations and remarks from DHS senior leadership, and review and deliberate... homeland security procedures and the capabilities of the Department of Homeland Security components. The...

  19. Team of Advisors: The Social Science of Advice in Homeland and National Security

    Science.gov (United States)

    2017-03-01

    advisors and executive decision makers, this thesis explores relevant literature in the fields of psychology , social science, political science, and...Wealth, and Happiness (New York: Penguin, 2009), 19. 14 Daniel Kahneman, Thinking, Fast and Slow (New York: Farrar, Straus and Giroux, 2011), 20. 15...Jennifer S. Lerner et al., “Emotion and Decision Making,” Annual Review of Psychology 66, no. 1 (2015): 813–814, doi:10.1146/annurev-psych-010213-115043

  20. Premier Homeland Security Educator Awards 32 Master's Degrees

    OpenAIRE

    Center for Homeland Defense and Security

    2012-01-01

    Center for Homeland Defense and Security, PRESS RELEASES MONTEREY, Calif. – Thirty-two homeland security professionals earned a Master of Arts in Security Studies March 30 from the Naval Postgraduate School Center for Homeland Defense and Security (CHDS). The...

  1. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2006-01-01

    .... In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists...

  2. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2007-01-01

    .... In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists...

  3. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  4. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    .... 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor...

  5. Solving homeland security's wicked problems: a design thinking approach

    OpenAIRE

    Wyckoff, Kristin L.

    2015-01-01

    Approved for public release; distribution is unlimited The Department of Homeland Security’s Science and Technology Directorate (DHS S&T) requires a consistent yet flexible approach to address wicked problems. A design-thinking methodology holds promise, as its tenets align with the diversity and complexity inherent within the homeland security environment. Design thinking emphasizes a human-centered and multidisciplinary approach to solution development. The research examined how design t...

  6. Homeland Security Affairs Journal, Volume V - 2009: Issue 2, May

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. May 2009. This issue of Homeland Security Affairs opens on a...

  7. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  8. Homeland Security Lessons for the United States

    National Research Council Canada - National Science Library

    Farr, Matthew

    2004-01-01

    ... world. The People's Republic of China and Singapore are the focus of this thesis in order to determine what if any homeland security policies developed by their governments could be used to better protect citizens of the United States. Several policies such as legislation, education and internal security measures were evaluated for the United States to institute. Each chosen policy is followed by a brief description of how these laws might come into being within the U.S. governmental system.

  9. Homeland Security. Management Challenges Facing Federal Leadership

    Science.gov (United States)

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  10. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... before these foreign workers and investors are required to convert into U.S. immigrant or nonimmigrant.... Cummings, Chief of Business and Foreign Workers Division, Department of Homeland Security, U.S. Citizenship... filed on behalf of alien workers subject to annual numerical limitations. This rule proposes an...

  11. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  12. Homeland Security Strategic Research Action Plan 2012 - 2016

    Science.gov (United States)

    EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.

  13. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    Science.gov (United States)

    2015-06-01

    Bruce Hoffman, in his 2002 article titled, “Rethinking Terrorism and Counterterrorism Since 9/11,” emphasizes that the sheer number of vulnerable...Homeland Security Granting Process,” 444. 64 Bruce Hoffman, “Rethinking Terrorism and Counterterrorism since 9/11,” Studies in Conflict and...126 Archer Company comprehensive position questionnaire, DOHS, May 2014, 5. 127 Dekalb County Office of Homeland Security, Dekalb County Police

  14. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    Science.gov (United States)

    2014-12-01

    House, HR70-14 ed., Homeland Security Database , November 1, 1955. 82 Ibid., iii. 83 Ibid., 33. 24...Tansley, “The Early History of Plant Biology in Britain,” JSTOR : Journal of Ecology, 35, December 1947. doi: http://www.jstor.org/stable/2256503. 303...Strategy, Panel Report to Nelson A. Rockefeller, Special Assistant to the President, White House, HR70-14 ed., Homeland Security Database , November

  15. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  16. Homeland Security Affairs Journal, Volume III - 2007: Issue 3, September

    OpenAIRE

    2007-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. September 2007. Six years after the attacks of 9/11, the pra...

  17. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  18. 78 FR 39301 - Committee name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-07-01

    ...: Homeland Security Academic Advisory Council AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Academic Advisory...-issued photo ID. Please use the main entrance on 14th Street, NW. For information on facilities or...

  19. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  20. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... SECURITY Committee Name: Homeland Security Information Network Advisory Committee (HSINAC) AGENCY... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network... Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the Homeland...

  1. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC) AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet on February 27th-28th, 2013 in Washington, DC. The...

  2. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-06-25

    ... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland... Security Academic Advisory Council (HSAAC) will meet on July 10, 2012 in Washington, DC. The meeting will... bring a Government-issued photo ID. Please use the main entrance on 14th Street NW. For information on...

  3. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-10-09

    ... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland... Security Academic Advisory Council (HSAAC) will meet on October 24, 2012 in Washington, DC. The meeting... Center must bring a Government-issued photo ID. Please use the main entrance on 14th Street, NW. For...

  4. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-03-04

    ... SECURITY Committee Name: Homeland Security Academic Advisory Council AGENCY: Department of Homeland... Security Academic Advisory Council (HSAAC) will meet on March 20, 2013 in Washington, DC. The meeting will... Center must bring a Government-issued photo ID. Please use the main entrance on 14th Street NW. For...

  5. Martin Continues His Homeland Security Profession with New UASI Position

    OpenAIRE

    Issvoran, Heather

    2014-01-01

    Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.

  6. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  7. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    efforts, and state government role in maritime homeland security. The resounding and underlying theme of the best practices cited by these port...security. The resounding and underlying theme of the best practices cited by these port areas is centered on collaborative efforts across federal...hope to reveal the important, smart , or best practices that these state and local agencies have implemented to develop maritime homeland security

  8. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  9. Managing Materials and Wastes for Homeland Security Incidents

    Science.gov (United States)

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  10. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    After more than seven years of funding through The Centers for Disease Control and Prevention, local public health agencies have made inconsistent progress in fulfilling their Homeland Security objectives...

  11. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    mixture of equal parts cooking oil , flour , and onion. As individual items, these ingredients possess distinct physical appearances and scents. When...region to region and is influenced by the experiences and interactions of the cook . Resilience in the context of homeland security is similar to a gumbo...into existing courses aids in the development of a resilience approach for the jurisdiction’s homeland security program. The proposed series of

  12. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... comments. Email: [email protected] . Include docket number in the subject line of the message. Fax: (202) 282... the purpose of receiving sensitive operational information from senior DHS leadership. The meeting... homeland from DHS Intelligence and Analysis and other senior leadership, and a briefing on threats at the...

  13. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... from the Sustainability and Efficiency Task Force, review and discuss the task forces' report, and... from senior DHS leadership on the following issues: The strategic implementation plan to counter... threats to the homeland from DHS Intelligence and Analysis and other senior leadership, and a briefing on...

  14. Federal-Tribal Government Collaboration in Homeland Security

    Science.gov (United States)

    2007-09-01

    for effective collaboration to close the strategic and tactical holes apparent between federal and state preparedness. These strategic and tactical... holes related to border security control, critical infrastructure protection, public health response, and other emergency response capabilities...identified as a point of need for effective homeland security actions, Kettl points out that without better collaboration between the state and local

  15. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    Robert W. Smith, “What is Homeland Security? Developing a Definition Grounded in the Curricula,” Journal of Public Affairs Education 11, no. 3 (August...national, economic, and homeland security. This process was originally developed by Glaser and Strauss as a way to inductively code and compare data at...Robert W. Smith, “What is Homeland Security? Developing a Definition Grounded in the Curricula,” Journal of Public Affairs Education 11, no. 3 (2005

  16. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  17. Homeland Security Intelligence: To What End

    Science.gov (United States)

    2010-09-01

    Cabinet and the desires and intents of Congress (Shelby, 2002). A common, yet key, meme for intelligence professionals with regard to “the Hill” is that...need but I know it when I get it. Henry Kissinger (1981, p. 252) Due to the distributed accountability for domestic security decisions spread

  18. Homeland Security Department: FY2009 Appropriations

    Science.gov (United States)

    2009-03-04

    occur in the USM, which is seeking $120 million for the planned consolidation of DHS executive program leadership on the West Campus of the Saint ...consolidation includes up to 4.5 million gross square feet of office space at the Saint Elizabeth’s site. Other areas of increased USM funding...realign 78 Prepared by Bart Elias, Specialist in Aviation Safety, Security, and Technology

  19. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Reliability Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW...

  20. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  1. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION..., Associate Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  2. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications...

  3. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting February 26, 2010. SUMMARY... Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street...

  4. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    chairman of the House Appropriations, Subcommittee on Homeland Security who said, “Without a comprehensive and current inventory of our Nation’s...are severely hampered.” 151 Such an inventory cannot be developed without active involvement from state and local officials and the private sector...Security, 2006. . National Infrastructure Pr . “National Protection and Programs Directorate – Office of Risk Managemen and Ana ———. National Strategy

  5. Emergency management and homeland security: Exploring the relationship.

    Science.gov (United States)

    Kahan, Jerome H

    2015-01-01

    In the years after the 9/11 tragedy, the United States continues to face risks from all forms of major disasters, from potentially dangerous terrorist attacks to catastrophic acts of nature. Professionals in the fields of emergency management and homeland security have responsibilities for ensuring that all levels of government, urban areas and communities, nongovernmental organizations, businesses, and individual citizens are prepared to deal with such hazards though actions that reduce risks to lives and property. Regrettably, the overall efficiency and effectiveness of the nation's ability to deal with disasters is unnecessarily challenged by the absence of a common understanding on how these fields are related in the workforce and educational arenas. Complicating matters further is the fact that neither of these fields has developed agreed definitions. In many ways, homeland security and emergency management have come to represent two different worlds and cultures. These conditions can have a deleterious effect on preparedness planning for public and private stakeholders across the nation when coordinated responses among federal, state, and local activities are essential for dealing with consequential hazards. This article demonstrates that the fields of emergency management and homeland security share many responsibilities but are not identical in scope or skills. It argues that emergency management should be considered a critical subset of the far broader and more strategic field of homeland security. From analytically based conclusions, it recommends five steps that be taken to bring these fields closer together to benefit more from their synergist relationship as well as from their individual contributions.

  6. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  7. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Science.gov (United States)

    2010-07-29

    ... SECURITY Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday, August... meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet from... Homeland Security Information Network Advisory Committee is to identify issues and provide to senior...

  8. A Department of Homeland Security Reserves (DHS-R): Simultaneously Protecting the Homeland While Alleviating the Increased DoD Role in Homeland Defense and Security

    National Research Council Canada - National Science Library

    Schulz, David V

    2007-01-01

    .... The Department of Homeland Security does not directly address a conceited volunteer effort; instead it provides limited support for volunteer initiatives like Citizen Corps, which can be improved by a more concerted nation-wide effort like a DHS-Reserve...

  9. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    Science.gov (United States)

    2012-12-01

    2012 Author: Christopher E. Hall Approved by: Erik Dahl Thesis Advisor Carolyn Halladay Second Reader Harold A...miscalculated by weather personnel. In the story of Harold Keith, a survivor of the storm, it accounts that the National Hurricane Bureau was well...Napolitano_The_system_worked .html Public Law 107–296, 6 US Code, “Homeland Security Act 2002:” https://www.hsdl.org/?view&did=614. Ridge, Tom and Larry Bloom

  10. Quantitative Risk Analysis for Homeland Security Resource Allocation

    Science.gov (United States)

    2006-12-01

    pork barrel” to protect the interests of their home states or districts. In light of this, the 9/11 Commission recommended that “homeland security...have touched other industries beyond finance. Molak breaks some of these down and offers six types of risk analysis: chemical risk analysis, cancer ...nuclear plant safety.179 The insurance industry also uses QRA to evaluate relationships between smokers and lung cancer .180 The same analysis can

  11. 77 FR 32033 - Wireless Telecommunications Bureau and Public Safety and Homeland Security Bureau Suspend...

    Science.gov (United States)

    2012-05-31

    ... COMMISSION 47 CFR Parts 22 and 90 Wireless Telecommunications Bureau and Public Safety and Homeland Security... Industrial/Business Pool applications; or Mr. Tracy Simmons of the Public Safety and Homeland Security Bureau... Telecommunications Bureau and Public Safety and Homeland Security Bureau released a Public Notice which suspended the...

  12. 75 FR 19559 - Public Safety and Homeland Security Bureau Seeks Informal Comment Regarding Revisions to the...

    Science.gov (United States)

    2010-04-15

    ...-296; DA 10-500] Public Safety and Homeland Security Bureau Seeks Informal Comment Regarding Revisions... Commission's (Commission) Public Safety and Homeland Security Bureau (PSHSB) seeks informal comment regarding...: Gregory M. Cooke, Associate Chief, Policy Division, Public Safety and Homeland Security Bureau, at (202...

  13. 75 FR 18857 - Privacy Act of 1974; Department of Homeland Security Citizenship and Immigration Services...

    Science.gov (United States)

    2010-04-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Citizenship and... Security system of records notice titled, ``Department of Homeland Security Citizenship and Immigration... efficient and secure processing of information to aid the Citizenship and Immigration Services Ombudsman in...

  14. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Undue influence upon Department of Homeland... Brokers § 111.34 Undue influence upon Department of Homeland Security employees. A broker must not influence or attempt to influence the conduct of any representative of the Department of Homeland Security...

  15. 76 FR 8758 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-002...

    Science.gov (United States)

    2011-02-15

    ... titled, ``Department of Homeland Security Federal Emergency Management Agency--002 Quality Assurance... Homeland Security, Washington, DC 20528. SUPPLEMENTARY INFORMATION: I. Background In accordance with the... employee/contractor quality assurance information is covered by the DHS/All--020 Department of Homeland...

  16. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS... Security Information Network Advisory Committee (HSINAC) will meet on Tuesday, June 25th, 2013 from 1 p.m...: http://www.dhs.gov/homeland-security-information-network-advisory-committee . There is a meeting room...

  17. Wireless sensors and sensor networks for homeland security applications.

    Science.gov (United States)

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  18. Test of radiation detectors used in homeland security applications.

    Science.gov (United States)

    Pibida, L; Minniti, R; O'Brien, M; Unterweger, M

    2005-05-01

    This work was performed as part of the National Institute of Standards and Technology (NIST) program to support the development of the new American National Standards Institute (ANSI) standards N42.32-2003 and N42.33-2003 for hand-held detectors, and personal electronic dosimeters, as well as to support the Office of Law Enforcement Standards (OLES) and the Department of Homeland Security (DHS) in testing these types of detectors for their use by first responders. These instruments are required to operate over a photon energy range of 60 keV to 1.33 MeV and over a wide range of air-kerma rates. The performance and response of various radiation detectors, purchased by the NIST, was recorded when placed in 60Co, 137Cs, and x-ray beams at different air-kerma rates. The measurements described in this report were performed at the NIST x-ray and gamma-ray radiation calibration facilities. The instruments' response (exposure or dose rate readings) shows strong energy dependence but almost no dependence to different air-kerma rates. The data here reported provide a benchmark in support of current protocols that are being developed for radiation detection instrumentation used in homeland security applications. A future plan is to test these devices, plus other commercially available detectors, against ANSI standards N42.32-2003 and N42.33-2003.

  19. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of cancellation of meeting. SUMMARY: The meeting of the Communications Security, Reliability, and...

  20. Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security: Volume 2 - A: Supporting Reports

    Science.gov (United States)

    2004-05-01

    SECURITY DoD should use its best capabilities including those at NSA to support, and benefit from, the Presidential-directed, DHS-led national...embarkation facilities) and should include the development of event scenarios and facility monitoring strategies (i.e., cost/ benefit analyses). In addition...but simple techniques for vaccination should be encouraged. In particular, probiotic approaches in which lactic acid bacteria present antigens in

  1. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... extends administrative Privacy Act protections to all individuals when systems of records maintain...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In...

  2. State and urban area homeland security strategy v3.0 : evolving strategic planning

    OpenAIRE

    Chen, Darren

    2006-01-01

    CHDS State/Local This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process, guidance and assistance, and strategy review in collaboration with state and local stakeholders. Federal, state, and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes. Comprehensive, enterprise-wide homeland security strategie...

  3. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  4. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... Homeland Security is issuing a Notice of Proposed Rulemaking concurrent with this system of records..., analyzes data as needed, and provides training. Additionally, DHS is issuing a Notice of Proposed Rulemaking (NPRM) concurrent with this system of records elsewhere in the Federal Register. This newly...

  5. An Interagency Command for Homeland Protection: Taking the Next Steps to Integrate Defense and Security at the Operational Level

    National Research Council Canada - National Science Library

    Sene, Darren E

    2005-01-01

    .... After four years, these new organizations are still wrestling with fundamental questions that require definitive answers in order to shape an effective homeland security and homeland defense solution...

  6. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In accordance with the Federal Advisory Committee Act, this notice...

  7. 75 FR 76465 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-12-08

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council Meeting AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In accordance with the Federal Advisory Committee Act, this...

  8. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-09-19

    ... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS...

  9. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS...

  10. State and Local Homeland Security Officials: Who Are They and What Do They Do?

    Science.gov (United States)

    2011-09-01

    enabling networked leadership (or ―meta-leadership‖) capabilities and collaborative communications; 2) creating and fostering the ― right ...Information, leadership, decisiveness, all in one room. In S. Hakim & E. Blackstone (Eds.), Safeguarding Homeland Security: Governors and mayors speak...framework for a secure homeland. Retrieved from http://www.dhs.gov/xabout/gc_1208534155450.shtm Environmental Protection Agency, Region V (2010

  11. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2010-11-15

    ...-0086] Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...-2182), Privacy Officer, National Protection and Programs Directorate, Department of Homeland Security... Privacy Act protections to all individuals where systems of records maintain information on U.S. citizens...

  12. A multisignal detection of hazardous materials for homeland security

    Directory of Open Access Journals (Sweden)

    Alamaniotis Miltiadis

    2009-01-01

    Full Text Available The detection of hazardous materials has been identified as one of the most urgent needs of homeland security, especially in scanning cargo containers at United States ports. To date, special nuclear materials have been detected using neutron or gamma interrogation, and recently the nuclear resonance fluorescence has been suggested. We show a new paradigm in detecting the materials of interest by a method that combines four signals (radiography/computer tomography, acoustic, muon scattering, and nuclear resonance fluorescence in cargos. The intelligent decision making software system is developed to support the following scenario: initially, radiography or the computer tomography scan is constructed to possibly mark the region(s of interest. The acoustic interrogation is utilized in synergy to obtain information regarding the ultrasonic velocity of the cargo interior. The superposition of the computer tomography and acoustic images narrows down the region(s of interest, and the intelligent system guides the detection to the next stage: no threat and finish, or proceed to the next interrogation. If the choice is the latter, knowing that high Z materials yield large scattering angle for muons, the muon scattering spectrum is used to detect the existence of such materials in the cargo. Additionally, the nuclear resonance fluorescence scan yields a spectrum that can be likened to the fingerprint of a material. The proposed algorithm is tested for detection of special nuclear materials in a comprehensive scenario.

  13. Improving the All-Hazards Homeland Security Enterprise Through the Use of an Emergency Management Intelligence Model

    Science.gov (United States)

    2013-09-01

    4 C. IMPACT ON CURRENT OPERATIONS ....................................................7 D. RESEARCH QUESTION...16 C. LITERATURE ON CURRENT STATUS OF EM-IC OPERATIONS ...17 1. Intelligence in the HSE ...Center HS Homeland Security HSE Homeland Security Enterprise HSPD Homeland Security Presidential Directive HUMINT Human Intelligence I & A DHS’s

  14. 78 FR 19442 - Public Safety and Homeland Security Bureau Seeks To Refresh the Record Regarding Options for...

    Science.gov (United States)

    2013-04-01

    ... COMMISSION 47 CFR Part 20 Public Safety and Homeland Security Bureau Seeks To Refresh the Record Regarding... Commission's (Commission) Public Safety and Homeland Security Bureau (PSHSB) seeks to refresh the record.... David S. Turetsky, Chief, Public Safety and Homeland Security Bureau. BILLING CODE 6712-01-P ...

  15. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Science.gov (United States)

    2012-08-30

    ... COMMISSION 47 CFR Part 90 Public Safety and Homeland Security Bureau Seeks Comment on Post- Reconfiguration... channel plans along the U.S.-Mexico border. The Public Safety and Homeland Security Bureau (Bureau), by... in May 2007, the Commission delegated authority to Public Safety and Homeland Security Bureau to...

  16. Homeland Security Department: FY2011 President’s Request for Appropriations

    Science.gov (United States)

    2010-04-15

    Flight Program. Reviews and evaluations of TSA’s in-line baggage screening system, the paperless boarding pass, TSA Worker Identification...Systems at airports. d. Fees include TWIC, HAZMAT, Registered Traveler, and Alien Flight School Checks. . Homeland Security Department: FY2011... School —Fee 4 4 Surface Transportation Security 110 138 Operations and Staffing 42 40 Security Inspectors 68 98 Transportation

  17. 6 CFR Appendix B to Part 5 - Public Reading Rooms of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Public Reading Rooms of the Department of... Department of Homeland Security maintain public reading rooms as follows: 1. Former components of the... Security) does not maintain a conventional public reading room. Records that are required to be in the...

  18. United States and Israeli Homeland Security: A Comparative Analysis of Emergency Preparedness Efforts

    National Research Council Canada - National Science Library

    Pockett, Consuella B

    2005-01-01

    This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland Security's Emergency Preparedness and Response directorate and the Israel Defense Forces Home Front Command...

  19. How to Prepare the National Guard’s Leadership for Successful Venture in Homeland Security

    Science.gov (United States)

    2009-09-01

    Homeland Defense and Security. This course was designed to provide the “knowledge required of the homeland security professional” (Supinski, Syllabus -NS...character of, esp . by formal schooling; teach;” or in simpler terms used by Admiral Art Cebrowski “you train for the known and educate for the... designed for the NG. The thought prompting this recommendation is that the military could then develop training programs to ready the NG units for these

  20. Groupthink: a significant threat to the homeland security of the United States

    OpenAIRE

    Ricciuti, James E.

    2014-01-01

    Approved for public release; distribution is unlimited The groupthink psychological phenomenon prevalent in the homeland security enterprise is a significant threat to the United States. Homeland security is vulnerable to groupthink because its leaders frequently share similar backgrounds, work histories, and world-views. This similarity minimizes the chance of outside perspectives being introduced to the decision-making process, which insulates leadership from external ideas. This researc...

  1. Domestic Intelligence and Homeland Security: Are We There Yet

    Science.gov (United States)

    2010-02-01

    well as operating systems and networks can bring the sharing enterprise to its knees . Common examples include over classifying information, or not...fatwa entitled Jihad against Jews and Crusaders World Islamic Front statement, 28 Feb 98. Endnotes 2 George W. Bush, National Strategy for Homeland

  2. Employing the Intelligence Cycle Process Model Within the Homeland Security Enterprise

    Science.gov (United States)

    2013-12-01

    Law Enforcement Intelligence Analyst ILP Intelligence-Led Policing IRTPA Intelligence Reform and Terrorism Prevention Act ISAC ...sectors Information Sharing and Analysis Centers ( ISAC ) considered operational organizations that collect, analyze, and share threat and vulnerability...national security concerns and homeland security threat issues. These ISACs178 are: the Communications ISAC ; the Electric Sector ISAC ; the Emergency

  3. Homeland Security Strategic Plan for the Non-Major Local Law Enforcement Agency

    Science.gov (United States)

    2011-09-01

    who vandalize the area with graffiti . Disorder issues plague many communities and are a nuisance to citizens, businesses, and the police. Disorder...degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2011...leaders should consider if their leadership ability will adequately meet the necessary skills in meeting these expectations. The threat of street level

  4. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... contact: Emily Andrew (703-235-2182), Privacy Officer, National Protection and Programs Directorate... policy, DHS extends administrative Privacy Act protections to all individuals where systems of records...

  5. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Science.gov (United States)

    2010-03-09

    ... United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records... Security/U.S. Immigration and Customs Enforcement system of records titled, ``Department of Homeland Security/U.S. Immigration and Customs Enforcement--011 Removable Alien Records System of Records'' renamed...

  6. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    44 David Thomas , “Clamping Down on Metal Theft,” Security, February 1, 2013, accessed August 15, 2015, http://www.safecommunitiesalgarve.com/wp...main service providers operating in the country: Enel, Edison , E. On, and Edipower.177 Each of the providers has been adversely affected by copper...jun/02/copper-theft-rise-across-us/307532/. Thomas , David. “Clamping Down on Metal Theft.” Security, February 1, 2013. Accessed August 15, 2015. http

  7. Southwest Hispanic Community -- The Absence of Homeland Security Threats

    Science.gov (United States)

    2012-12-01

    for terrorists is a given. Representative Lamar Smith recently wrote that the “9/11 terrorist attacks demonstrated a need to secure our borders and...1 Jack K. Riley, Border Security and the Terrorist Threat (Santa Monica, CA: Rand, 2006), 3. 2 Lamar ...From Attraction to Social Identity (London: Harvester Wheatsheaf, 1992); Michael A. Hogg, Deborah J. Terry, and Katherine M. White , “A Tale of Two

  8. Cybersecurity Lanes in the Road for the Department of Homeland Security

    Science.gov (United States)

    2016-06-01

    Executive Order FBI Federal Bureau of Investigation FNR Federal Network Resilience HSPD Homeland Security Presidential Directive IC...cybersecurity “lanes in the road” for DHS. This review includes sources from the government, academia , and private sector. Advances in technology...Director of research for the computer security training company, SysAdmin, Audit, Network , and Security Institute, says that the FBI has the best

  9. DHS Workshop -- Homeland Security: New Challenges for Decision Making Under Uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, R; Edmunds, T; Howarth, S

    2004-02-20

    A workshop addressing the decision-making challenges confronted by the United States Department of Homeland Security (DHS) in the face of large uncertainties, complex value systems, and multiple stakeholders was held November 13-14, 2003, in Washington, D.C. Forty-six participants drawn from the DHS, other government agencies, universities, national laboratories, and the private sector attended the workshop. The goals were: (1) to develop a common understanding of the range of decisions DHS program elements must make; (2) to review selected examples of decision processes and approaches used by other organizations for similarly complex problems; and (3) to recommend steps DHS can take to ensure high quality decision making. The workshop brought together diverse perspectives on decision making in the context of complex risks. Participants included those who must make decisions affecting homeland security, those who have faced risky decisions in other domains, and those who have developed theoretical and practical approaches to high quality decision-making. The workshop was sponsored by the Science & Technology (S&T) Directorate, but was intended to address issues of concern to the three DHS operating directorates as well as S&T. The purpose of this breadth was to identify areas in which S&T capabilities and resources could be valuable to DHS as a whole. The workshop consisted of three main segments: (1) Presentations by managers from DHS Directorates, reflecting the diverse nature of decision making across DHS; (2) Presentations on four alternative approaches used to address problems in both government (counter-terrorism R&D investment; identification of critical capabilities in bioterrorism) and the private sector (corporate strategy development; terrorism insurance); and (3) Breakout groups chartered to identify barriers and propose actions to address them, in each of five decision classes: (1) Portfolio management; (2) Grant allocation; (3) Critical one

  10. Homeland security R&D roadmapping : risk-based methodological options.

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  11. What type of state homeland security strategy should the state of New Jersey develop?

    OpenAIRE

    Rosell, Richard G.

    2007-01-01

    CHDS State/Local The State of New Jersey does not have a written homeland security strategy. This thesis argued that New Jersey should have a strategy. The author has reviewed the reasons why New Jersey does not have a state strategy. Based on preliminary work, any justifications are no longer supportable. Beyond that, the thesis described the elements that should be in that strategy. A by-product of the thesis was a homeland security strategy template that can be used by other states. As ...

  12. Redox Active Binary Logic Gate Circuit for Homeland Security.

    Science.gov (United States)

    Gaikwad, Pramod; Kadlag, Kavita; Nambiar, Manasa; Devendrachari, Mruthyunjayachari Chattanahalli; Aralekallu, Shambhulinga; Kottaichamy, Alagar Raja; Manzoor Bhat, Zahid; Thimmappa, Ravikumar; Shafi, Shahid Pottachola; Thotiyl, Musthafa Ottakam

    2017-08-01

    Bipolar junction transistors are at the frontiers of modern electronics owing to their discrete voltage regulated operational levels. Here we report a redox active binary logic gate (RLG) which can store a "0" and "1" with distinct operational levels, albeit without an external voltage stimuli. In the RLG, a shorted configuration of half-cell electrodes provided the logic low level and decoupled configuration relaxed the system to the logic high level due to self-charge injection into the redox active polymeric system. Galvanostatic intermittent titration and electrochemical quartz crystal microbalance studies indicate the kinetics of self-charge injection are quite faster and sustainable in polypyrrole based RLG, recovering more than 70% signal in just 14 s with minor signal reduction at the end of 10000 cycles. These remarkable properties of RLGs are extended to design a security sensor which can detect and count intruders in a locality with decent precision and switching speed.

  13. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records... accordance with the Privacy Act of 1974 the Department of Homeland Security U.S. Immigration and Customs.... Immigration and Customs Enforcement--011 Immigration and Enforcement Operational Records System of Records...

  14. 75 FR 9238 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-03-01

    ... Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records... accordance with the Privacy Act of 1974 the Department of Homeland Security U.S. Immigration and Customs.... Immigration and Customs Enforcement--011 Removable Alien Records System of Records, January 28, 2009, and...

  15. Homeland Security and Emergency Management Education: An Investigation into Workforce Needs

    Science.gov (United States)

    Carlson, Cameron D.

    2017-01-01

    The U.S. Department of Homeland Security (DHS) was created in the wake of the September 11th 2001 terrorist events. DHS's formation, the largest reorganization of a governmental agency in over 50 years, brought a new emphasis on the protection of the nation, its citizens and its infrastructure to government emergency management policy. Previously,…

  16. PRESERVING DRINKING WATER INTEGRITY IN OUR COMMUNITIES: HOMELAND SECURITY PRIORITIES OF THE ENVIRONMENTAL PROTECTION AGENCY

    Science.gov (United States)

    A book chapter published in a 3-volume textbook series by the U. S. Military Academy at West Point, Combating Terrorism Center. Book title: Homeland Security: Protecting America's Targets. The chapter is a review of background of water systems, impact of September 11, 2001, a...

  17. Combating Terrorism in the Philippines to Improve U.S. Homeland Security

    Science.gov (United States)

    2010-12-01

    State University, 2005 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND... Mercado Jr, Father Eliseo. “Time Runs Out for Arroyo Peace.” Union of Catholic Asian News. February 22, 2010. http://www.ucanews.com/2010/02/22

  18. 78 FR 14629 - 10th Anniversary of the United States Department of Homeland Security

    Science.gov (United States)

    2013-03-06

    ... Homeland Security By the President of the United States of America A Proclamation Ten years ago, when the.... While threats persist, America is better prepared to meet them, and we stand ready to overcome whatever..., DHS has worked to streamline our legal immigration system, stem the tide of illegal immigration, and...

  19. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... article or who use traditional and/or social media in real time to keep their audience situationally aware... Coordination and Planning--004 Publicly Available Social Media Monitoring and Situational Awareness Initiative... it proposes to establish a new Department of Homeland Security system of records titled, ``Department...

  20. Homeland security monitoring sensors and early warning relay and diagnostic system

    Science.gov (United States)

    Varadan, Vijay; Ruffin, Paul B.; Brantley, Christina; Edwards, Eugene

    2010-04-01

    This paper addresses the development of a wireless sensor system array for the detection and identification of bioterrorism agents and hazardous vapors and other gases with a realistic goal of "stick and forget sensing" especially attractive to homeland security needs. New and improved sensors are needed for many security applications with fast, reliable and sensitive detection and identification. Some of the most important tools in today's national security are biological and chemical agents' detection and identification. These devices need to be small and fast so that they can easily detect and identify any traces of hazardous materials. Biosensors are analytical devices which use biological interactions to provide either qualitative or quantitative results. Due to its ability to manipulate and organize matter and structures from atomic up to molecular scales, the nanotechnology is widely viewed as the most significant technological frontier which has to be explored in many areas including physical, chemical, electrical and biological sciences. Design and successful development of devices of the size of few nm to couple of hundreds of nm, nanotechnology has been heralded as most powerful technology as ever seen before. This has lead to the development of better materials, highly sensitive sensing systems and wide verity of nano-devices. This sensor array is based on Multi-walled Carbon Nanotube (MWCNT) as sensing element, which is synthesized and chemically bonded with different polymers for sensing different biological agents and gases. An array of these sensing elements with integrated ChemFET is connected to a low power wireless system for the real-time detection and identification. We have successfully demonstrated the detection and identification of various gases and chemicals using wireless setup.

  1. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  2. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... systems. CBP uses routers, firewall and intrusion detection systems to prevent unauthorized access to its... of Homeland Security/U.S. Customs and Border Protection--007 Border Crossing Information System of.... Customs and Border Protection system of records entitled the, ``Department of Homeland Security/U.S...

  3. 76 FR 53918 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Science.gov (United States)

    2011-08-30

    ...In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of records titled, ``Department of Homeland Security/Federal Emergency Management Agency--001 National Emergency Family Registry and Locator System of Records.'' This system of records allows the Department of Homeland Security/Federal Emergency Management Agency to collect and maintain records on adults displaced from their homes or pre-disaster location after a Presidentially-declared emergency or disaster. This system of records has been updated to include Law Enforcement Officials in categories of records, individuals, routine uses, and record source categories. This updated system will be included in the Department of Homeland Security's inventory of record systems.

  4. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  5. An Agent-Based Approach for Data Fusion in Homeland Security

    Directory of Open Access Journals (Sweden)

    Rafael de Solís Montes

    2013-09-01

    Full Text Available This article presents an agent-based solution for data fusion in Homeland Security. Communication technology has been developed very fast in the last decades. We can get lots of data in milliseconds. Our current problem is to process such amounts of data in order to provide useful information. We have to focus our effort on developing intelligent information systems able to handle big amounts of data extracting or revealing relations among data and able to produce information easily understandable for the human user. That is the case of data fusion in tactical operations, especially in the field of defense and Homeland security. Our research is focused on obtaining a Multi-agent system able to inference future enemy’s actions or behaviors from data received from heterogeneous sensors.

  6. Going Beyond the Water’s Edge: Improving Congressional Oversight for the Department of Homeland Security

    Science.gov (United States)

    2013-03-01

    Overwhelmed by Oversight.” 9 Shiffman and Hoffman, “The Department of Homeland Security,” 209. 3 with the health care debate, the committee failed...evaluate how programs are administered and how they perform; ferret out waste and fraud; determine whether programs have outlived their usefulness...committee for review and coordination on policy or to oversee basic government functions. Some are temporary, such as the Conference committees, which

  7. Formal Critiques and After Action Reports from Conventional Emergencies: Tools for Homeland Security Training and Education

    Science.gov (United States)

    2010-09-01

    education is adopted. Process values analysis ( Bardach , 2009, p. 31) is used to assess the opportunities available under the current and proposed...improvability of a policy are directly related to field implementation ( Bardach , 2009). The analysis of this criterion is done as a comparison between the... Bardach , 2009) into existing training and education programs helps to create a decentralized system for sustaining homeland security training and

  8. Myth, Metaphor, and Imagination: Framing Homeland Security as Art and Archetype

    Science.gov (United States)

    2013-03-01

    unprecedented, and this new vocabulary contributed to the overall sense of uncertainty and displacement. What is homeland security? What does it mean...autonomy, mastery , and purpose. He describes autonomy as the ability to determine choices of task, timing, technique, and team, and points out that...autonomy connotes not only independence but also interdependence, and works within a social environment. Mastery incorporates not only achieved levels

  9. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    Science.gov (United States)

    2009-03-01

    component of the research process, homeland security professionals were surveyed through the on-line tool, Survey Monkey . Participants were...funding have been non existent for local governments. All the funding has gone to the boys and their toys . Private Sector • We are a hospital, and...capabilities at the local level. • We appreciate the funds, but has it improved our level of preparedness, not really, we have a few more toys to play

  10. Unity of Command for Homeland Security: Title 32, Title 10, or a Combination.

    Science.gov (United States)

    2006-01-01

    costs paid by Federal funds Tort immunity IAW state law FTCAvii FTCAvii PCAviii Application No No Yes USERRAix No, IAW state law Yes Yes SSCRAx No...agents of the Requesting state for tort liability and immunity purposes. Specifically it states, “No Assisting State or its officers or employees...Guard for future missions. Homeland security missions within the United States involve Military Assistance to Civil Authorities ( MACA ) or Military

  11. Economics of Homeland Security: Carcass Disposal and the Design of Animal Disease Defense

    OpenAIRE

    Jin, Yanhong H.; Haung, Wei; McCarl, Bruce A.

    2005-01-01

    In an effort to bolster confidence and protect the nation the U.S. government through agencies like the Department of Homeland Security is identifying vulnerabilities and evolving strategies for protection. Agricultural food supply is one identified vulnerable area, and animal disease defense is one of the major concerns there under. Should an outbreak of animal disease occur, it is likely to have a mass slaughter and disposal of animal carcasses. The current existing policy, mainly including...

  12. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... From the Federal Register Online via the Government Publishing Office ] SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of...

  13. The U.S. Navy's Role in Executing the Maritime CONOPS for U.S. Homeland Security/Defense

    National Research Council Canada - National Science Library

    Young, Eric

    2002-01-01

    .... Homeland Security and Defense (HLS/D). The Navy's role in Maritime HLS/D is to support the Coast Guard, however, the Coast Guard does not have the resources available to combat this problem alone...

  14. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    Science.gov (United States)

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  15. Using resources of public health centers for education and professional societies to incorporate homeland security topics into public teacher continuing education.

    Science.gov (United States)

    McCarthy, Margaret E

    2003-08-01

    The Department of Education, the Association of Schools of Public Health, and national professional societies dedicated to teaching and dissemination of information for health and education in the public sector can form a clearinghouse on information and manpower on Homeland Security by affiliation with Centers for Public Health Preparedness (CPHP). The state licensed or regional societies can contribute further information and guidelines. In the HPS the Science Teacher Workshop (STW) and Public Education (PEC) Committees can assist a CPHP on radiation issues.

  16. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  17. Integrating public health and medical intelligence gathering into homeland security fusion centres.

    Science.gov (United States)

    Lenart, Brienne; Albanese, Joseph; Halstead, William; Schlegelmilch, Jeffrey; Paturas, James

    Homeland security fusion centres serve to gather, analyse and share threat-related information among all levels of governments and law enforcement agencies. In order to function effectively, fusion centres must employ people with the necessary competencies to understand the nature of the threat facing a community, discriminate between important information and irrelevant or merely interesting facts and apply domain knowledge to interpret the results to obviate or reduce the existing danger. Public health and medical sector personnel routinely gather, analyse and relay health-related inform-ation, including health security risks, associated with the detection of suspicious biological or chemical agents within a community to law enforcement agencies. This paper provides a rationale for the integration of public health and medical personnel in fusion centres and describes their role in assisting law enforcement agencies, public health organisations and the medical sector to respond to natural or intentional threats against local communities, states or the nation as a whole.

  18. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Madhavi Z [ORNL; Wullschleger, Stan D [ORNL; Vass, Arpad Alexander [ORNL; Martin, Rodger Carl [ORNL; Grissino-Mayer, Henri [ORNL

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  19. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    Science.gov (United States)

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  20. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    ... on improving security from the point of origin (including manufacturer, supplier, or vendor) through... national security, law enforcement, immigration, intelligence, or other homeland security functions. In..., in order to provide relevant information related to intelligence, counterintelligence, or...

  1. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... travelers, including those who present a lower security risk. The primary result of this change will be the... information for the risk-based analysis. \\9\\ Individuals who are a match to a watch list, however, are not.... For all other passengers, the passenger prescreening computer system will conduct risk-based analysis...

  2. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... transportation systems to ensure freedom of movement for people and commerce. To achieve this mission, TSA is..., phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs or... administrative body, when it is relevant or necessary to the litigation and one of the following is a party to...

  3. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ...). TSA's mission is to protect the nation's transportation systems to ensure freedom of movement for... court, adjudicative or administrative body, when it is necessary to the litigation and one of the... individual's name, Social Security number, or other assigned personal identifier. SAFEGUARDS: Records in this...

  4. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... movement for people and commerce. To achieve this mission, TSA is required to develop and adapt its... proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and... and statutes. Retrievability: Records are retrieved by name, Social security number or other assigned...

  5. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... protect the nation's transportation systems to ensure freedom of movement for people and commerce. To..., Social security number; pilot certificate information, including number and country of issuance; current..., before any court, adjudicative or administrative body, when it is necessary to the litigation and one of...

  6. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ... the nation's transportation systems to ensure freedom of movement for people and commerce. To achieve... conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is.... Retrievability: Records are retrieved by name, address, Social Security number, administrative action or legal...

  7. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Science.gov (United States)

    2010-04-13

    ... confidentiality of an information system of records has been compromised. Another routine use permits the release... was rated, prepared by TSA employees or contract psychologists; (e) Records regarding the TSA's final..., entities, and persons when: 1. DHS suspects or has confirmed that the security or confidentiality of...

  8. Intelligent maritime security system with sensor networks for coastal environmental and homeland security applications

    Science.gov (United States)

    Carapezza, Edward M.; Bucklin, Ann

    2007-10-01

    This paper proposes an innovative command and control system design and the use of low, cost distributed sensor networks for an intelligent maritime security system. This concept utilizes a network of small passive and active multi-phenomenological unattended sensors and shore based optical sensors to detect, classify, and track submerged threat objects approaching high value coastal assets, such as ports, harbors, residential, commercial, and military facilities and areas. The network of unattended, in-water sensors perform the initial detection, classification, and coarse tracking and then queues shore based optical laser radar sensors. These shore-based sensors perform a high resolution sector search to develop a precision track on the submerged threat objects. Potential threat objects include submarines, submerged barges, UUV's, swimmers carrying threat objects such as explosives, chemical, biological, radiological, and nuclear materials. Reliable systems with low false alarm rates (FAR) are proposed. Tens to hundreds of low cost passive sensors are proposed to be deployed conjunctively with several active acoustic and optical sensors in threat and facility dependant patterns to maximize the detection, tracking and classification of submerged threat objects.

  9. Critical Infrastructure Protection and Federal Statutory Authority for the Departments of Homeland Security and Defense to Perform Two Key Tasks

    Science.gov (United States)

    2017-04-13

    damage from EMP effects. 19 Key Task: Security—Physically Protecting and Securing Critical Infrastructure The electric grid attacks and Katrina...Critical Infrastructure Protection and Federal Statutory Authority for the Departments of Homeland Security and Defense to Perform Two Key Tasks A...and Defense to Perform Two Key Tasks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Patricia Ladnier 5d

  10. 76 FR 70739 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... Immigration Services-015 Electronic Immigration System- 2 Account and Case Management System of Records AGENCY... Immigration Services-015 Electronic Immigration System-2 Account and Case Management System of Records.'' This system of records will allow the Department of Homeland Security/U.S. Citizenship and Immigration...

  11. 76 FR 60070 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... Immigration Services 015 Electronic Immigration System- 2 Account and Case Management System of Records AGENCY... Immigration Services 015 Electronic Immigration System-2 Account and Case Management System of Records.'' This system of records will allow the Department of Homeland Security/U.S. Citizenship and Immigration...

  12. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-08

    ... civil rights and civil liberties issues, ensuring respect for civil rights and civil liberties in policy... race, ethnicity, or religion, by employees and officials of the Department of Homeland Security. The...; conditions of detention; treatment; due process; and watch list issues. As a result of the biennial review of...

  13. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ... liberties issues, ensuring respect for civil rights and civil liberties in policy decisions and... religion, by employees and officials of the Department of Homeland Security. The Department's civil rights...; treatment; due process; and watch list issues. As a result of the biennial review of this system, updates...

  14. Watermark: The Alumni Magazine of the Center for Homeland Defense and Security Center for Information Systems. Spring 2012

    OpenAIRE

    2012-01-01

    Watermark is published semiannually for the alumni of Center for Homeland Defense and Security (CHDS). Topics in this issue: CHDS Alum Invited to Conference at the White House; Tracy Frazzano Advances Active Shooter Strategies; APEX Conference 2012 : Terrorism, Budgets and Disasters...

  15. 78 FR 57402 - Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection-019 Air...

    Science.gov (United States)

    2013-09-18

    ... Reform and Immigrant Responsibility Act of 1996, Public Law 104-208; Presidential Directive 47/Homeland Security Presidential Directive 16 (NSPD-47/HSPD- 16); and DHS Delegation No. 7010.3 (May 11, 2006). DHS is... ] (including vehicle type, tail numbers, license plate numbers, etc.) and remarks by Detection Enforcement...

  16. 77 FR 47415 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2012-08-08

    ..., 110 Stat. 2105 (1996); Title IV, Subtitle A, of Illegal Immigration Reform and Immigrant... Immigration Services (USCIS)--004--Systematic Alien Verification for Entitlements (SAVE) Program System of..., ``Department of Homeland Security/United States Citizenship and Immigration Services--004-- Systematic Alien...

  17. 78 FR 7798 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-010...

    Science.gov (United States)

    2013-02-04

    .... Immigration and Customs Enforcement--010 Confidential and Other Sources of Information System of Records... general questions, please contact: Lyn Rahilly, Privacy Officer, Immigration and Customs Enforcement, (202... Congress. System of Records Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement...

  18. Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

    2009-06-17

    Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

  19. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    Energy Technology Data Exchange (ETDEWEB)

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  20. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ...In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to establish a new Department of Homeland Security system of records notice titled ``Department of Homeland Security/U.S Customs and Border Protection--003 Credit/Debit Card Data System of Records.'' This system allows U.S. Customs and Border Protection to collect, use, and maintain records related to any credit and debit card transactions with it has with individuals. Additionally, the Department of Homeland Security is issuing a Notice of Proposed Rulemaking to exempt this system of records from certain provisions of the Privacy Act, concurrent with this system of records elsewhere in the Federal Register. This newly established system will be included in the Department of Homeland Security's inventory of record systems.

  1. Science of Cyber-Security

    Science.gov (United States)

    2010-11-01

    Some people occu- pied other points on the Bohr -Pasteur-Edison spectrum, and some felt that there were many sciences of cyber-security, but that it... Radios Similar in concept, but with different vulnerabilities, are IP-based radios that organize themselves into ad hoc networks. The Army has worked on

  2. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... DHS operational decision making, DHS leadership, and participation in interagency operations. OPS... days a year, the NOC provides real-time situational awareness and monitoring of the homeland...

  3. Preserving Our Homeland: A Collaboration to Connect Science and Traditional Ecological Knowledge for Mashpee Wampanoag Youth

    Science.gov (United States)

    Gutierrez, B.; Fordham, M.; Lopes-Pocknett, R.; Wyman, K.; Stringer, C.; Green, G.; Tobey, Q.; Rassman, J.; Mills, E., Jr.

    2014-12-01

    Over the past three years, we have developed and implemented a collaborative summer science program for Mashpee Wampanoag youth that engages tribal elders, parents, educators, and local scientists to connect tribal youth with the ecology and geology of their traditional homelands. This collaboration, called Native Youth in Science: Preserving our Homeland (POH), involves the Mashpee Wampanoag Education and Natural Resource Departments, an experienced team of tribal elders and scientists from the U.S. Geological Survey's Woods Hole Coastal and Marine Science Center Waquoit Bay National Estuarine Research Reserve, U.S. Forest Service, and NOAA National Marine Fisheries. The team has developed and implemented a curriculum that stresses the ancestral relationships of Wampanoag people to their land. Through hands-on activities at locations of cultural significance, our efforts focus on presenting topics in environmental science from both western science and Wampanoag perspectives to 5th-8th grade students from the Wampanoag Tribe. Overarching themes focus on local land use history and its impact on traditional food sources such as shellfish and herring. Lessons typically address hydrology, water quality, fish and shellfish biology, botany, and local geology. To present these topics, scientists are paired with Wampanoag Tribe culture keepers to develop lessons that present science topics side-by-side with cultural knowledge. The primary goals of POH are to (a) connect and reinforce science concepts learned in conventional school settings for tribal youth; (b) demonstrate the use of science as a tool for understanding and preserving the ecosystems and homelands of the Mashpee Wampanoag Tribe; and (c) how indigenous traditional ecological knowledge (TEK) and western science complement each other. In the long-term, this program begins to prepare tribal students for more advanced programs supporting their pursuit of higher education.

  4. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  5. One Team, One Mission, Securing Our Homeland: U.S. U.S. Department of Homeland Security Strategic Plan, Fiscal Years 2008 - 2013

    National Research Council Canada - National Science Library

    Chertoff, Michael

    2008-01-01

    .... While the Department was created to secure our country against those who seek to disrupt the American way of life, our charter also includes preparation for and response to all hazards and disasters...

  6. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    the benefit of involving participants beyond the traditional coalitions and the need to seek innovative , non-traditional solutions to catastrophic...across the United States, and the foundation is nestled in the emergency management framework that evolved from our efforts to secure the homeland as a...American Review of Public Administration 38(3): 286–306. 54 Chenoweth E., & Clark S. (2009). All terrorism is local; Resources, nestled

  7. Development of an Autonomous Lidar Instrument for Use on a UAV Platform in Support of Homeland Security

    Science.gov (United States)

    McGill, Matthew; Famiglietti, Joe

    2005-01-01

    Researchers at NASA's Goddard Space Flight Center have developed an autonomous aerosol backscatter lidar instrument for use on the high-altitude ER-2 aircraft (for more information please visit http://cpl.gsfc.nasa.gov). Work is currently underway to transfer this instrument to a UAV platform such as Global Hawk. While the NASA applications are Earth science and satellite validation, there is clearly a Homeland Security application for such an instrument. One novel concept is to have a fleet of UAVs stationed around the country, each UAV having a payload including a lidar instrument. In the event of attack, the appropriate UAV(s) could be launched for purposes of, e.g., plume detection and tracking that are critical for decision support. While the existing lidar instrument is not directly capable of biological species discrimination, it is capable of plume tracking and thus can demonstrate to DHS the capabilities and utility of such instruments. Using NASA funding we will have an instrument ready to fly on Global Hawk by end of 2005. We would like to find partners, either within private industry or within DHS who would be willing to contribute aircraft access and flight hours for a demonstration flight. Longer-term partnerships to develop more advanced and more capable types of lidar instruments are also desirable. In this presentation we will detail the existing ER-2 lidar instrument and show measurement results, show the progress made on adapting to the Global Hawk platform, present concepts for DHS uses of such instruments, and openly pursue partnership opportunities.

  8. 77 FR 54835 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative [HSAR Case 2009-002...

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND..., amending section 3052.205-70, in the second column, the title of the clause ``Advertisements, Publicizing Awards, and Releases ( )'' is corrected to read ``Advertisements, Publicizing Awards, and Releases (SEP...

  9. Development of neutron/gamma generators and a polymer semiconductor detector for homeland security applications

    Science.gov (United States)

    King, Michael Joseph

    Instrumentation development is essential to the advancement and success of homeland security systems. Active interrogation techniques that scan luggage and cargo containers for shielded special nuclear materials or explosives hold great potential in halting further terrorist attacks. The development of more economical, compact and efficient source and radiation detection devices will facilitate scanning of all containers and luggage while maintaining high-throughput and low-false alarms Innovative ion sources were developed for two novel, specialized neutron generating devices and initial generator tests were performed. In addition, a low-energy acceleration gamma generator was developed and its performance characterized. Finally, an organic semiconductor was investigated for direct fast neutron detection. A main part of the thesis work was the development of ion sources, crucial components of the neutron/gamma generator development. The use of an externally-driven radio-frequency antenna allows the ion source to generate high beam currents with high, mono-atomic species fractions while maintaining low operating pressures, advantageous parameters for neutron generators. A dual "S" shaped induction antenna was developed to satisfy the high current and large extraction area requirements of the high-intensity neutron generator. The dual antenna arrangement generated a suitable current density of 28 mA/cm2 at practical RF power levels. The stringent requirements of the Pulsed Fast Neutron Transmission Spectroscopy neutron generator necessitated the development of a specialized ten window ion source of toroidal shape with a narrow neutron production target at its center. An innovative ten antenna arrangement with parallel capacitors was developed for driving the multi-antenna arrangement and uniform coupling of RF power to all ten antennas was achieved. To address the desire for low-impact, low-radiation dose active interrogation systems, research was performed on mono

  10. Fortress America: The Aesthetics of Homeland Security in the Public Realm

    Science.gov (United States)

    2017-09-01

    achievement of happiness itself. 70 Schneier, “ Psychology of Security,” 51. 71 Ibid., 54. 72...perceived threat of a terrorist attack in public spaces. Architecture has sociological, psychological , and cultural effects, as well as security impacts...open, attractive, and promote both physical and psychological security? This thesis is a starting point for broader awareness and discussion within

  11. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,

  12. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Science.gov (United States)

    2012-11-02

    ... expertise, drive innovation, engage in collective action, broaden investments to achieve shared goals, and..., and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring...

  13. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  14. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Science.gov (United States)

    2010-03-01

    ...) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the individual to the existence of an investigation in the form of a visa security review predicated on.... Disclosure of the accounting would therefore present a serious impediment to ICE's Visa Security Program...

  15. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    Science.gov (United States)

    2008-12-01

    organizational change and collaboration in the DHS immigration structure that was established in 2003. Effective organizational change is essential for an...benefit fraud to strengthen the security of the legal immigration system. This thesis identifies areas for USCIS regarding future organizational ... change and enhancements to collaboration with a homeland security partner such as ICE. It further identifies areas such as collaborative competencies

  16. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... the risk of compromising the information that is being stored. Access to the computer system... individuals who voluntarily submit information to the Transportation Security Administration for use by the... persons who pose a low risk to transportation security and therefore may be eligible for expedited...

  17. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... information to carry out national security, law enforcement, immigration, intelligence, or other functions... including phone numbers, e-mail addresses, and address; Physical description including height, weight, eye... information; Watch list information; Medical records; Financial information; Results of intelligence analysis...

  18. No Failure of Imagination: Examining Foundational Flaws in America’s Homeland Security Enterprise

    Science.gov (United States)

    2011-09-01

    Intercity Bus Security Grant Program IC Intelligence Community ID Identification Card ISAC Information Sharing and Analysis Centers MMRS...National Infrastructure Protection Center and the sector-specific Information Sharing and Analysis Centers ( ISAC ) that persist today (White House, 1998

  19. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... broadband networks; user applications; security and authentication features; and network evolution. A more... meeting over the Internet from the FCC's Web page at http://www.fcc.gov/live . Open captioning will be...

  20. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ..., Security and Authentication, and Network Evolution working groups. A more detailed agenda will be released... Commission will also provide audio and/or video coverage of the meeting over the Internet from the FCC's Web...

  1. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  2. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ...: Individual's name; Social Security number; Home mailing address; Home telephone number; ] Home email address... proceedings or in response to a subpoena from a court of competent jurisdiction. L. To the news media and the... confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS's officers...

  3. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    Science.gov (United States)

    2015-06-01

    68  3.  Catastrophic Evolution as Entropy Transfers among Cultures ....70  4.  Ontological ...Second Law of Thermodynamics,” in Handbook of Ecosystem Theories and Management, ed. Sven Eric Jorgensen and Felix Muller (135–160) (Boca Raton, FL: CRC...222 Catarina Kinnvall, “Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security. Political Psychology 25

  4. 78 FR 55657 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2013-09-11

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... of Investigation (FBI). The results will be used by TSA to decide if an individual poses a low risk... national security investigation or encounter records, or terrorist screening records. DHS needs these...

  5. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Science.gov (United States)

    2011-09-28

    ... governing the means by which the U.S. Government collects, maintains, uses, and disseminates individuals..., serial number, brand name, model, value, year, make, color, identifying characteristics, and/or... on paper in secure facilities in a locked drawer behind a locked door. The records are stored on...

  6. 77 FR 33605 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2012-06-07

    ... Security State, Local, and Regional Fusion Center Initiative PIA, December 11, 2008 (point 6) and whether..., Reporting, Analysis, and Fusion System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule. SUMMARY..., and Fusion System of Records'' from certain provisions of the Privacy Act. Specifically, the...

  7. Public Sector Unionization: Understanding the Rise in Membership Rates and Impact on Homeland Security

    Science.gov (United States)

    2011-12-01

    BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS ACLU American Civil Liberties Union AFGE American Federation of Government Employees AFL-CIO...7 Citing concerns of national security, President Bush announced his intent to invoke his authority under the Civil Service Reform Act of 1978 (5...ensued and continued unresolved until April 2011. In late 2002, TSOs at La Guardia Airport, Baltimore-Washington International Airport, Pittsburgh

  8. Management of the Severely Mentally Ill and Its Effects on Homeland Security

    Science.gov (United States)

    2011-09-01

    Patrick Miller Thesis Co-Advisor Harold A. Trinkunas, PhD Chair, Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT...need of immediate longer term care ( Bloom , Krishnan, & Lockey, 2008). This change in policy resulted in thousands of severely mentally ill persons...a 2002 letter to the Governor, California Justice Harold Shabo stated: These persons wander the streets hungry, homeless, and without hope. They

  9. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    Science.gov (United States)

    2017-06-01

    include the Aviation and Transportation Security Act that conducted background checks and screening of travelers and their luggage, as well as mandated...collection of cash contributions in mosques and public places as a practice of zakat.”161 Furthermore, Saudi Arabia has intensified control over...for the Islamic State to gain legitimacy. Therefore, the Islamic State, and Al Qaeda prior to it, targeted the Saudi soil and intensified their

  10. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    Science.gov (United States)

    2016-08-01

    Army War College is to produce graduates who are skilled critical thinkers and complex problem solvers. Concurrently, it is our duty to the U.S. Army...to also act as a “ think factory” for commanders and civilian leaders at the strategic level worldwide and routinely engage in discourse and debate...security policy formulation. iii v Strategic Studies Institute and U.S. Army War College Press INVESTIGATING THE BENEFITS AND DRAWBACKS OF REALIGNING

  11. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... added to permit sharing of information with the news media and the public, with the approval of the... the disclosure of the information or when disclosure is necessary to preserve confidence in the... name; Date and place of birth; Social security number; Citizenship; Access Control Pass or Credential...

  12. A preliminary investigation of the potential of phase contrast x-ray imaging in the field of homeland security

    Science.gov (United States)

    Olivo, A.; Chana, D.; Speller, R.

    2008-11-01

    A novel technique based on coded apertures which makes x-ray phase contrast imaging (XPCi) feasible with conventional sources has been recently developed at University College London. This technique is expected to enable for the first time real-world applications of XPCi in fields as diverse as medical, biological and scientific imaging, industrial inspections and security scans. This paper focuses on XPCi applications in homeland security. A simulation of coded-aperture XPCi, which was experimentally validated in a previous work, has been used to produce images of potential threat objects, and to quantitatively assess detail visibility improvements in terms of contrast and signal-to-noise ratio over conventional techniques based on absorption. Free-space propagation phase contrast images taken with synchrotron radiation (SR) are also presented. Although not directly related to the coded-aperture technique used in the simulation, these can be considered indicative of the image quality that would be made available through coded-aperture XPCi with conventional sources: previous studies have demonstrated that this technique provides image enhancements compatible with those obtained with free-space propagation phase contrast with SR. Substantial enhancements in image quality and improvement in detail detectability in cluttered environments are demonstrated in this way. The results presented in this study and the software used to generate them will provide the basis for the design and realization of a dedicated imaging prototype.

  13. Uses of GIS for Homeland Security and Emergency Management for Higher Education Institutions

    Science.gov (United States)

    Murchison, Stuart B.

    2010-01-01

    Geographic information systems (GIS) are a major component of the geospatial sciences, which are also composed of geostatistical analysis, remote sensing, and global positional satellite systems. These systems can be integrated into GIS for georeferencing, pattern analysis, visualization, and understanding spatial concepts that transcend…

  14. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, James [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Shedlock, Daniel [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Langeveld, Willem G.J. [Rapiscan Laboratories, Inc., Sunnyvale, CA 94085 (United States); Bharadwaj, Vinod [SLAC National Accelerator Lab., Menlo Park, CA (United States); Nosochkov, Yuri [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  15. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    .../USCG--014 Military Pay and Personnel System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of... records titled, ``Department of Homeland Security U.S. Coast Guard--014 Military Pay and Personnel System... collect and maintain records regarding pay and personnel. As a result of a biennial review of this system...

  16. Compact, rugged, and intuitive thermal imaging cameras for homeland security and law enforcement applications

    Science.gov (United States)

    Hanson, Charles M.

    2005-05-01

    Low cost, small size, low power uncooled thermal imaging sensors have completely changed the way the world views commercial law enforcement and military applications. Key applications include security, medical, automotive, power generation monitoring, manufacturing and process control, aerospace application, defense, environmental and resource monitoring, maintenance monitoring and night vision. Commercial applications also include law enforcement and military special operations. Each application drives a unique set of requirements that include similar fundamental infrared technologies. Recently, in the uncooled infrared camera and microbolometer detector areas, major strides have been made in the design and manufacture of personal military and law enforcement sensors. L-3 Communications Infrared Products (L-3 IP) is producing a family of new products based on the amorphous silicon microbolometer with low cost, low power, high volume, wafer-level vacuum packaged silicon focal plane array technologies. These bolometer systems contain no choppers or thermoelectric coolers, require no manual calibration, and use readily available commercial off-the-shelf components. One such successful product is the Thermal-Eye X100xp. Extensive market needs analysis for these small hand held sensors has been validated by the quick acceptability into the Law Enforcement and Military Segments. As well as this product has already been received, L-3 IP has developed a strategic roadmap to improve and enhance the features and function of this product to include upgrades such as the new 30-Hz, 30-μm pitch detector. This paper describes advances in bolometric focal plane arrays, optical and circuit card technologies while providing a glimpse into the future of micro hand held sensor growth. Also, technical barriers are addressed in light of constraints, lessons learned and boundary conditions. One conclusion is that the Thermal Eye Silicon Bolometer technology simultaneously drives weight

  17. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  18. A Guide to Directors of Homeland Security, Emergency Management, and Military Departments in the States and Territories of the United States

    Science.gov (United States)

    2007-12-01

    primary online sources: state codes and statutes; executive orders; and Web sites of the respective agencies. In instances where laws could not be...is deemed to refer to the Adjutant General. Source: http://www.leginfo.ca.gov/cgi-bin/displaycode?section= mvc &group=00001-01000& file=160-190...of Homeland Security); Department Web site, http://www.in.gov/dhs/3979.htm. Adjutant General Director: Major General R. Martin Umbarger Functions

  19. When Will We Ever Learn? The After Action Review, Lessons Learned and the Next Steps in Training and Educating the Homeland Security Enterprise for the 21st Century

    Science.gov (United States)

    2013-06-01

    the past is not exclusive to the U.S. Army or the U.S. homeland security enterprise. A precursor to the AAR was established at Boeing in 1969 when it...instituted Project Homework. This initiative was an attempt to compare the problem-ridden 737 and 747 plane programs with the 707 and 727 programs...techniques, and procedures necessary to effectively integrate KM into the operations of brigades, divisions, and corps.”77 This field manual represents the

  20. Theory to Practice: How Developing a K-12 Curriculum in Emergency Preparedness, Life Safety, or Homeland Security Can Lead to Resiliency

    Science.gov (United States)

    2012-09-01

    Many of the “ kids ” K-12 planning and preparedness information on the FEMA website has been developed by others, including private entities, and is...component in order to achieve resiliency within the United States due to the sheer numbers of children and teens within the current school systems...Ready.Gov.Ready.Kids. Retrieved on June 16, 2011, from http://www.ready.gov/ kids /parents/index.html United States Department of Homeland Security. (2011). Ready.Gov

  1. EVALUATION REPORT SCIENCE APPLICATIONS INTERNATIONAL CORPORATION S-CAD CHEMICAL AGENT DETECTION SYSTEM

    Science.gov (United States)

    The USEPA's National Homeland Security Research Center (NHSRC)Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle recently evaluated the performance of the Science Applications International Co...

  2. Hydrological sciences and water security: An overview

    Directory of Open Access Journals (Sweden)

    G. Young

    2015-04-01

    Full Text Available This paper provides an introduction to the concepts of water security including not only the risks to human wellbeing posed by floods and droughts, but also the threats of inadequate supply of water in both quantity and quality for food production, human health, energy and industrial production, and for the natural ecosystems on which life depends. The overall setting is one of constant change in all aspects of Earth systems. Hydrological systems (processes and regimes are changing, resulting from varying and changing precipitation and energy inputs, changes in surface covers, mining of groundwater resources, and storage and diversions by dams and infrastructures. Changes in social, political and economic conditions include population and demographic shifts, political realignments, changes in financial systems and in trade patterns. There is an urgent need to address hydrological and social changes simultaneously and in combination rather than as separate entities, and thus the need to develop the approach of ‘socio-hydrology’. All aspects of water security, including the responses of both UNESCO and the International Association of Hydrological Sciences (IAHS to the concepts of socio-hydrology, are examined in detailed papers within the volume titled Hydrological Sciences and Water Security: Past, Present and Future.

  3. An update on the OpenOrbiter I Mission and its paradigm's benefits for the defense, homeland security and intelligence communities

    Science.gov (United States)

    Straub, Jeremy

    2017-05-01

    The OpenOrbiter I spacecraft is the culmination of significant work on reducing the cost levels of a CubeSat-class spacecraft. By redesigning the spacecraft from the ground up, down to the component level, to use readily available electronic and physical components, the cost of CubeSat construction has been significantly reduced. This paper provides an overview of the OpenOrbiter I mission, to date. It then focuses on the benefits that can be provided by the lower-cost, low-risk spacecraft. The paper discusses the prospective utility of this mission paradigm for the defense, homeland security and intelligence communities.

  4. Accelerators for Discovery Science and Security applications

    Energy Technology Data Exchange (ETDEWEB)

    Todd, A.M.M., E-mail: alan_todd@mail.aesys.net; Bluem, H.P.; Jarvis, J.D.; Park, J.H.; Rathke, J.W.; Schultheiss, T.J.

    2015-05-01

    Several Advanced Energy Systems (AES) accelerator projects that span applications in Discovery Science and Security are described. The design and performance of the IR and THz free electron laser (FEL) at the Fritz-Haber-Institut der Max-Planck-Gesellschaft in Berlin that is now an operating user facility for physical chemistry research in molecular and cluster spectroscopy as well as surface science, is highlighted. The device was designed to meet challenging specifications, including a final energy adjustable in the range of 15–50 MeV, low longitudinal emittance (<50 keV-psec) and transverse emittance (<20 π mm-mrad), at more than 200 pC bunch charge with a micropulse repetition rate of 1 GHz and a macropulse length of up to 15 μs. Secondly, we will describe an ongoing effort to develop an ultrafast electron diffraction (UED) source that is scheduled for completion in 2015 with prototype testing taking place at the Brookhaven National Laboratory (BNL) Accelerator Test Facility (ATF). This tabletop X-band system will find application in time-resolved chemical imaging and as a resource for drug–cell interaction analysis. A third active area at AES is accelerators for security applications where we will cover some top-level aspects of THz and X-ray systems that are under development and in testing for stand-off and portal detection.

  5. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  6. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-03-13

    ... program focuses on improving security from the point of origin (including manufacturer, supplier, or... enforcement, and intelligence activities. These exemptions are needed to protect information relating to DHS...

  7. 77 FR 33683 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security, U.S. Customs...

    Science.gov (United States)

    2012-06-07

    ... accounting of disclosures could alert the subject of an investigation of an actual or potential criminal... preclude subjects from compromising an ongoing law enforcement, national security or fraud investigation... laws; investigations, inquiries, and proceedings there under; and national security and intelligence...

  8. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    Energy Technology Data Exchange (ETDEWEB)

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  9. 78 FR 60888 - Privacy Act of 1974; Department of Homeland Security/ALL-036 Board for Correction of Military...

    Science.gov (United States)

    2013-10-02

    ... Affairs (DVA) when the BCMR determines it has the need for an applicant's medical records possessed by the DVA. DHS requests medical records from DVA using an applicant's name and social security number. I. To...

  10. 77 FR 47419 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2012-08-08

    ... Industry Classification System (NAICS) Code Number of Employees Number of Sites Parent Company or Corporate... automated systems security and access policies. Strict controls have been imposed to minimize the risk of...

  11. 78 FR 52553 - Privacy Act of 1974; Department of Homeland Security/ALL-035 Common Entity Index Prototype System...

    Science.gov (United States)

    2013-08-23

    ..., or J-2 class of admission (collectively, F/M/J non-immigrants); (3) a proxy, parent or guardian of an... applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize...

  12. 78 FR 43893 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-07-22

    ...; Parent Company or Corporate Company; Name of Company Point of Contact; Phone Number; Fax Number; E-Mail... security and access policies. Strict controls have been imposed to minimize the risk of compromising the...

  13. 76 FR 49497 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-001 Criminal...

    Science.gov (United States)

    2011-08-10

    ... the examination of altered cellular telephones; certificates by owners of U.S. registered securities.... Arrest history forms are held permanently for transfer to the National Archives and Records...

  14. 76 FR 49494 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027...

    Science.gov (United States)

    2011-08-10

    ... name; Individual's home address; Date of birth; Social security number; Program of interest... analysis of and recordation of military force levels. J. To the news media and the public, with the... interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the...

  15. 76 FR 44451 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2011-07-26

    ... accounting would also permit the individual who is the subject of a record to impede the investigation, to... criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence... subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert...

  16. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... breached. The ``unnamed third party'' will be an entity under contract and subject to a non-disclosure agreement to provide services related to the security breach. The ``unnamed third party'' would only receive... access to the Federal government and unnamed third parties while keeping the data secret from the...

  17. 76 FR 60063 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... Immigration Services-014 Electronic Immigration System- 1 Temporary Accounts and Draft Benefit Requests System....S. Citizenship and Immigration Services-014 Electronic Immigration System-1 Temporary Accounts and... Security/U.S. Citizenship and Immigration Services to collect and maintain records on an individual as he...

  18. 78 FR 28761 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2013-05-16

    ... of forensic, intelligence, and investigative support services for ICE, DHS, and many other U.S. and... identification number), country of origin, region, authenticity of the document, information regarding the... know the information to carry out their national security, law enforcement, immigration, intelligence...

  19. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Science.gov (United States)

    2010-02-03

    ... governing the means by which the United States Government collects, maintains, uses and disseminates... marks such as tattoos, scars, etc; Height and weight; Eye and hair color; Biometric data; ] Home address... or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on...

  20. 78 FR 69983 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2013-11-22

    ... Alien File, information may be shared for immigration, law enforcement, and national security purposes... and law enforcement needs. Because of the nature of the immigration lifecycle, this information must....S. Citizenship and Immigration Services, Immigration and Customs Enforcement, Customs and Border...

  1. 77 FR 47411 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2012-08-08

    ... Security Directorate (FDNS). DHS through USCIS implements immigration law and policy through the processing...) of the INA, 8 U.S.C. 1103(a)(1), to administer the immigration laws (as defined in section 101(a)(17) of the INA). Authority to investigate alleged civil and criminal violations of the immigration laws...

  2. 75 FR 412 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-001...

    Science.gov (United States)

    2010-01-05

    ... termination information; transfer information; leave of absence information and study abroad; extensions... Law 107-56, USA PATRIOT Act; and Public Law 107-173, Enhanced Border Security and Visa Entry Reform... working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary...

  3. 76 FR 60059 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... a first-time Applicant does not formally submit a benefit request within 30 days of opening the... secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape... System; JUSTICE/FBI-002--FBI Central Records System; and JUSTICE/FBI-009--Fingerprint Identification...

  4. Rules And A Rubric Could Be Used To Assess The Openness Of A Homeland Security Enterprise Social Network

    Science.gov (United States)

    2016-12-01

    establish a culture of “need to share” securely while respecting civil rights and privacy. In February 2011, the DHS Office of Intelligence and Analysis...form have value although they are cumbersome and rely on the originator to want to share specific information. Effective intelligence efforts are...mutual interaction, the importance of connecting people to gather content, acceptance of cultural change over time, the value of role models, and

  5. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  6. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  7. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints.

    Science.gov (United States)

    Najeeb Al Hallak, Mohammed; McCurdy, Matt; Zouain, Nicolas; Hayes, Justin

    2009-08-28

    (153)Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate) and Samarium-153 [1]. (153)Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of (153)Sm-EDTMP leads to contamination with (154)Eu (Europium-154) [2]. A previous study only alluded to the retention of (154)Eu in the bones after receiving treatment with (153)Sm-EDTMP [2]. Activation of the alarm at security checkpoints after (153)Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received (153)Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA) activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing the American-Canadian border. We assume that the (154)Eu which remained in the patients' bones activated the sensors. METHODS: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received (153)Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. RESULTS: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of (154)Eu emissions. CONCLUSION: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of (154)Eu retained in patients who received (153)Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of (153)Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with (153)Sm-EDTMP at Roger Maris Cancer

  8. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  9. Protecting the Homeland Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II

    Science.gov (United States)

    2001-03-01

    until this is accomplished, computer crime investigators working cases with national security implications should be prohibited from using grand jury...permit sharing for national security purposes. Until this is accomplished, computer crime investigations working cases with national security implications

  10. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  11. Design Validation of a {sup 10}B{sub 4}C Coated RSP with Multi-layered structure for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Su Hyun; Kim, Jong Yul; Lee, Joo Hyun; Moon, Mung Kook [KAERI, Daejeon (Korea, Republic of); Lim, Chang Hwy [Korea Research Institute of Ships and Ocean Engineering, Daejeon (Korea, Republic of); Lim, Ki Seo [Myongji University, Yongin (Korea, Republic of)

    2016-05-15

    It is a national priority to prevent radiological threats including radiological terrorism and smuggling nuclear material and devices. For this purpose, many governments and relevant organizations have been exploiting radiation detection technology. Especially, radiation portal monitor (RPM) is a widely used type of radiation detectors when it comes to homeland security and commonly deployed at strategic sites like airports and ports. In the most cases, they could be divided into two types of primary screening and secondary screening. In the latter case, hand-held detectors are mainly used for a closer inspection. On the other hand, RPMs for the primary screening, our concern, are stationary mounted type and comprise gamma-ray detector and neutron detector in many cases. The expected performance of the design of a RSP(Radiation Sensor Panel) has been demonstrated. According to the results of the simulation, three RSPs should be needed to meet the criterion mentioned in subsection 2.1. The design still can be validated when taking into account that the geometrical acceptance will be increased since it has been planned that the RPM is going to installed with four RSPs.

  12. Biosensor Systems for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Bruckner-Lea, Cindy J.

    2004-05-30

    The detection of biological agents is important to minimize the effects of pathogens that can harm people, livestock, or plants. In addition to pathogens distributed by man, there is a need to detect natural outbreaks. Recent outbreaks of SARS, mad cow disease, pathogenic E. coli and Salmonella, as well as the discovery of letters filled with anthrax spores have highlighted the need for biosensor systems to aid in prevention, early warning, response, and recovery. Rapid detection can be used to prevent exposure; and detection on a longer timescale can be used to minimize exposure, define treatment, and determine whether contaminated areas are clean enough for reuse. The common types of biological agents of concern include bacteria, spores, and viruses (Figure 1). From a chemist’s point of view, pathogens are essentially complex packages of chemicals that are assembled into organized packages with somewhat predictable physical characteristics such as size and shape. Pathogen detection methods can be divided into three general approaches: selective detection methods for specific identification such as nucleic acid analysis and structural recognition, semi-selective methods for broad-spectrum detection (e.g. physical properties, metabolites, lipids), and function-based methods (e.g. effect of the pathogen on organisms, tissues, or cells). The requirements for biodetection systems depend upon the application. While detect to warn sensors may require rapid detection on the order one minute, detection times of many minutes or hours may be suitable for determining appropriate treatments or for forensic analysis. Of course ideal sensor systems will meet the needs of many applications, and will be sensitive, selective, rapid, and simultaneously detect all agents of concern. They will also be reliable with essentially no false negatives or false positives, small, easy to use, and low cost with minimal consumables.

  13. Homeland Security: A Selected Bibliography

    Science.gov (United States)

    2011-04-01

    Institute 136, no. 10 (October 2010): 46-50. ProQuest Myers, Laura L. "Eyes on the Border: Tests of Trouble Networking Plan Could Determine Its...handle.dtic.mil/100.2/ADA471305 Ridge, Thomas J. The Test of Our Times: America Under Siege–And How We Can Be Safe Again. New York: Dunne, 2009. 288pp...Conflict and Terrorism 33, no. 7 (July 2010): 618-651. InformaWorld Bosco , Paul. "DOE [Department of Energy]: Building a Sustainable Future." Military

  14. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  15. Water security in the Canadian Prairies: science and management challenges.

    Science.gov (United States)

    Wheater, Howard; Gober, Patricia

    2013-11-13

    In this paper, we discuss the multiple dimensions of water security and define a set of thematic challenges for science, policy and governance, based around cross-scale dynamics, complexity and uncertainty. A case study of the Saskatchewan River basin (SRB) in western Canada is presented, which encompasses many of the water-security challenges faced worldwide. A science agenda is defined based on the development of the SRB as a large-scale observatory to develop the underpinning science and social science needed to improve our understanding of water futures under societal and environmental change. We argue that non-stationarity poses profound challenges for existing science and that new integration of the natural sciences, engineering and social sciences is needed to address decision making under deep uncertainty. We suggest that vulnerability analysis can be combined with scenario-based modelling to address issues of water security and that knowledge translation should be coupled with place-based modelling, adaptive governance and social learning to address the complexity uncertainty and scale dynamics of contemporary water problems.

  16. Transnational architecting for homeland defense

    Science.gov (United States)

    O'Brien, Thomas W.

    2002-07-01

    The homeland security interests of a many nations are being increasingly threatened by the proliferation of weapons of mass destruction, drug trafficking, mass migration, global terrorism, environmental concerns, international crime and other global issues. This paper presents the case for development of such a transnational ballistic missile defense architecture for homeland defense and specifically addresses the architecture methodology and process, as well as the potential benefits and the top-level architecture trade issues that would have to be addressed if the community should decide to seriously pursue such an approach.

  17. 75 FR 53706 - Science and Technology (S&T) Directorate: Agency Information Collection Activities: Submission...

    Science.gov (United States)

    2010-09-01

    ...-53707] [FR Doc No: 2010-21786] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0072] Science and Technology (S&T) Directorate: Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS) Science and Technology TechSolutions Program...

  18. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  19. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  20. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  1. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  2. Information security: where computer science, economics and psychology meet.

    Science.gov (United States)

    Anderson, Ross; Moore, Tyler

    2009-07-13

    Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.

  3. Gerald L. Epstein, PhD: director, center for science, technology, and security policy, American Association for the Advancement of Science (AAAS). Interview by Madeline Drexler.

    Science.gov (United States)

    Epstein, Gerald L

    2009-12-01

    Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the

  4. New Science for a Secure and Sustainable Energy Future

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-12-01

    Over the past five years, the Department of Energy's Office of Basic Energy Sciences has engaged thousands of scientists around the world to study the current status, limiting factors and specific fundamental scientific bottlenecks blocking the widespread implementation of alternate energy technologies. The reports from the foundational BESAC workshop, the ten 'Basic Research Needs' workshops and the panel on Grand Challenge science detail the necessary research steps (http://www.sc.doe.gov/bes/reports/list.html). This report responds to a charge from the Director of the Office of Science to the Basic Energy Sciences Advisory Committee to conduct a study with two primary goals: (1) to assimilate the scientific research directions that emerged from these workshop reports into a comprehensive set of science themes, and (2) to identify the new implementation strategies and tools required to accomplish the science. From these efforts it becomes clear that the magnitude of the challenge is so immense that existing approaches - even with improvements from advanced engineering and improved technology based on known concepts - will not be enough to secure our energy future. Instead, meeting the challenge will require fundamental understanding and scientific breakthroughs in new materials and chemical processes to make possible new energy technologies and performance levels far beyond what is now possible.

  5. Secrecy and Physicists: Intersections of Science and National Security

    Science.gov (United States)

    Aftergood, Steven

    2010-02-01

    Physicists have been proponents as well as critics of government secrecy affecting their work. Enrico Fermi once wrote (in Physics Today) that ``Contrary to perhaps what is the most common belief about secrecy, secrecy was not started by generals, was not started by security officers, but was started by physicists.'' Yet Edward Teller, Frederick Seitz and others argued that secrecy in science and technology could profitably be reduced by 90% or more. Secrecy in physics is of course most pronounced in research related to nuclear weapons development. Though this is a longstanding concern it is still not a settled one. Disputes over nuclear weapons-related secrecy continue to resonate today as researchers and authors challenge the boundaries of official disclosure regarding the nuclear weapons enterprise. This paper will survey the current landscape of secrecy in science, and will discuss recent controversies involving publication of nuclear weapons physics, the infrastructure of nuclear research, and the prospects for secrecy reform. )

  6. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  7. 75 FR 33631 - Science and Technology (S&T) Directorate; Agency Information Collection Activities: Submission...

    Science.gov (United States)

    2010-06-14

    ... SECURITY Science and Technology (S&T) Directorate; Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS) Science and... Security's (DHS's) Science and Technology (S&T) Directorate to provide information, resources and...

  8. What Can History Teach Us A Comparative Historical Analysis On the Reserve Officer Training Corps and the Department of Homeland Security

    Science.gov (United States)

    2015-12-01

    department. One business and financing news source states: 127 “Cyber Security Overview...entrepreneurial sector discuss this tendency and how to combat it. One such work is The Lean Startup : How Today’s...innovation, creativity, and growth. I believe this is wrong. As startups grow, entrepreneurs can build organizations that learn how to balance the needs

  9. The wicked problem of information sharing in homeland security—a leadership perspective

    OpenAIRE

    McGhee, G.C. Sam

    2014-01-01

    CHDS State/Local This thesis is an autoenthnographic study exploring ineffective practices of American information sharing and intelligence in a post-9/11 world. It answers the questions: 1) What is there to learn about the relationship between homeland security information sharing, leadership doctrine, and personal experience?, and 2) How does complexity science influence this relationship? The study combined personal experience with a methodological framework that leverages complexity sc...

  10. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Wallace, Terry [Los Alamos National Laboratory

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  11. Homeland security planning: what victory gardens and Fidel Castro can teach us in preparing for food crises in the United States.

    Science.gov (United States)

    Endres, A Bryan; Endres, Jody M

    2009-01-01

    Two historical examples provide important insight into how federal government policies can integrate regional and local food systems to achieve food security during a time of acute crisis. During World War II, American home gardeners, through the federal government's Victory Garden program, supplied 40 percent of the nation's fresh produce, while simultaneously maintaining pre-war commodity production policies favoring large agricultural interests. The recent food crisis in Cuba, precipitated by the collapse of Soviet-bloc trade in the early 1990s, is another historical example that could inform U.S. policymakers on how to achieve food self-sufficiency through reemphasis on small farmers using sustainable practices supplemented with urban gardening. This article aims to ignite government action to strengthen and integrate regional and local food systems into federal food security planning so that citizens can be best prepared for a food emergency. The article first examines laws, regulations and policies put in place during World War II that employed regional and local food networks to satisfy a significant amount of civilian food supply needs. The article also looks at more recent Cuban efforts to achieve forced food self-reliance when, after the end of the Cold War, Soviet subsidies and preferential trading of energy and food supplies ceased almost overnight.

  12. Current fundamental science challenges in low temperature plasma science that impact energy security and international competitiveness

    Science.gov (United States)

    Hebner, Greg

    2010-11-01

    Products and consumer goods that utilize low temperature plasmas at some point in their creation touch and enrich our lives on almost a continuous basis. Examples are many but include the tremendous advances in microelectronics and the pervasive nature of the internet, advanced material coatings that increase the strength and reliability of products from turbine engines to potato chip bags, and the recent national emphasis on energy efficient lighting and compact fluorescent bulbs. Each of these products owes their contributions to energy security and international competiveness to fundamental research investments. However, it would be a mistake to believe that the great commercial success of these products implies a robust understanding of the complicated interactions inherent in plasma systems. Rather, current development of the next generation of low temperature plasma enabled products and processes is clearly exposing a new set of exciting scientific challenges that require leaps in fundamental understanding and interdisciplinary research teams. Emerging applications such as liquid-plasma systems to improve water quality and remediate hazardous chemicals, plasma-assisted combustion to increase energy efficiency and reduce emissions, and medical applications promise to improve our lives and the environment only if difficult science questions are solved. This talk will take a brief look back at the role of low temperature plasma science in enabling entirely new markets and then survey the next generation of emerging plasma applications. The emphasis will be on describing the key science questions and the opportunities for scientific cross cutting collaborations that underscore the need for increased outreach on the part of the plasma science community to improve visibility at the federal program level. This work is supported by the DOE, Office of Science for Fusion Energy Sciences, and Sandia National Laboratories, a multi-program laboratory managed and operated

  13. Experimental Physical Sciences Vitae 2017

    Energy Technology Data Exchange (ETDEWEB)

    Kippen, Karen Elizabeth [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Del Mauro, Diana [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Patterson, Eileen Frances [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Fronzak, Hannah Kristina [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Cruz, James Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kramer, Robert W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Martin, Genevieve [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Robinson, Richard Cecil [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Trujillo, Carlos Genaro [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Valdez, Sandra M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-01-18

    Frequently our most basic research experiments stimulate solutions for some of the most intractable national security problems, such as nuclear weapons stewardship, homeland security, intelligence and information analysis, and nuclear and alternative energy. This publication highlights our talented and creative staff who deliver solutions to these complex scientific and technological challenges by conducting cutting-edge multidisciplinary physical science research.

  14. Instilling a Culture of Accountability at the Department of Homeland Security (DHS): Leveraging the Government Performance and Results Modernization Act (GPRA-MA) of 2010

    Science.gov (United States)

    2013-09-01

    and professional landscape. Authors Ori Branfman and Rod A. Beckstrom in their book, The Starfish and the Spider , speak of the unstoppable power of...Four Levels to Improve Performance. 60 Ori Brafman and Rod A. Beckstrom, The Starfish and the Spider (New York: Portfolio, Penguin Group USA, 2006...standard checklist or paint palette seeking standard conditions to satisfy. This is strategic planning as science, or at least as recipe: a little here, a

  15. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  16. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    Science.gov (United States)

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  17. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip [ORNL; Bush, John [Battelle Memorial Institute; Bowerman, Biays [Brookhaven National Laboratory; Cespedes, Ernesto [Idaho National Laboratory; White, Timothy [Pacific Northwest National Laboratory

    2004-12-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.

  18. Survey Paper: Cryptography Is The Science Of Information Security

    OpenAIRE

    Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh

    2011-01-01

    Cryptography in the past was used in keeping military information, diplomatic correspondence secure andin protecting the national security. However, the use was limited. Nowadays, the range of cryptographyapplications have been expanded a lot in the modern area after the development of communicationmeans; cryptography is essentially required to ensure that data are protected against penetrations and toprevent espionage. Also, cryptography is a powerful mean in securing e-commerce. Cryptograph...

  19. The sense of security and the associated factors in shahrekord University of Medical Sciences

    Directory of Open Access Journals (Sweden)

    marziye raisi

    2014-02-01

    Full Text Available Introduction & Aims: The security is one of the basic needs of human and with the deterioration will be lost human comfort. The study was performed with purpose of determine the associated factors with sense of security in students of Shahrekord university of medical sciences.Methods: In this descriptive study, 200 students from Shahrekord University of medical sciences were studied simple random sampling. Data collection tool was a questionnaire that researcher made(a=0.81, including demographic characteristic and evaluation questions of security sense(in the 4 aspects. Data were analyzed by using the spss 16 software and significant level of test were considered (P<0.05.Results: 127 girl students (63.5% were and 73 boy (36.5%. Average age in girls was 22.47 ±2.47 and in boys was 21.82± 2.64. Sense of security in physical health and job security in girls lower than boys significantly. Between age and job security was significant relationship and negative. Except sense of security in interaction with others, other security aspects with semester were significant relationship and negative( P<0.001. Education level of father with a sense of emotional security and sense of security in interaction with others was significant relationship and direct(P<0.05. *Corresponding Author: Alidosti Masoumeh, MSc of Health Education, ShahreKord University of Medical Sciences, ShahreKord, Iran.Email: m_alidosti@hlth.mui.ac.airm

  20. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  1. 49 CFR 1542.201 - Security of the secured area.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section...

  2. The Submersible Threat to Maritime Homeland Security

    Science.gov (United States)

    2013-09-01

    research would be how the HSE could possibly utilize small submersibles to enhance HS through such activities as using remotely operated subs to conduct...1 C. RESEARCH QUESTION AND METHODOLOGY ...................................4 D. SIGNIFICANCE TO THE FIELD...Technology ...................................................66 C. RECOMMENDATIONS FOR FUTURE RESEARCH .............................68 D. CONCLUSION

  3. Comparative U.S.-Israeli Homeland Security

    Science.gov (United States)

    2006-06-01

    terrorist attack. Figure 1. Old City of Jerusalem from the Mount of Olives (Larsen) Israeli Experience Since declaring statehood on May 14, 1948...on more than simply finding a job and sending money home. The border is also porous for transshipment of illegal drugs and counterfeit or...firearms, and WMD; protecting against illegal fishing and destruction of marine resources, preventing and responding to accidental and intentional oil and

  4. 77 FR 64532 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-10-22

    ... p.m. EST on Thursday, November 8, 2012. Please be advised that the meeting is scheduled for one hour... CONTACT: William Smith at [email protected] or 202- 282-9445. SUPPLEMENTARY INFORMATION: Notice of this meeting... than 5:00 p.m. EST on November 5, 2012, to a staff member of the HSAC via email at [email protected] or via...

  5. 2008 Homeland Security Symposium and Exposition

    Science.gov (United States)

    2008-09-10

    use the Internet Cafe to check their e-mail and search the Internet. Brand your name with maximum exposure at this high traffic area. Benefits...Difference… Garden of Eden Power Alley Zon e o f C om pet itiv e B attl e Death Valley D i f f e r e n t i a t i o n Price Differentiation = (A+B)C/(D+E

  6. 2009 Homeland Security Symposium and Exhibition

    Science.gov (United States)

    2009-09-10

    electronified check, ACH or Draft • Opportunity for Merchant and Merchant employee collusion • Remote Deposit Collection (RDC) • eCommerce – a world of new...Containment Challenges • New Frontiers Convergence – Some Volatile Combinations •New Technology •Global Reach – without benefit of parity of law or...True value and impact is too often marginal in terms of tangible benefit  Lifetime is limited – “often dies on the vine” • Mutual Authentication

  7. Homeland Security Strategic Planning: Mission Area Analysis

    Science.gov (United States)

    2007-03-28

    material requiring further inspection—to include coordination with foreign governments (e.g., analyze passenger manifests, bills of lading , etc.)—for...reporting and notification system that provides rapid and accurate receipt of reports of disease outbreaks and other acute health events. Provide...monitoring and reviewing procedures for receipt , inventories, deployment, and disposal of donations. Provide community services. Offer legal and

  8. Homeland Security Department: FY2010 Appropriations

    Science.gov (United States)

    2009-12-14

    technology. While the TSA has abandoned the acquisition and operational utilization of trace detection portal ( puffer ) machines in favor WBI devices...of the public comments filed indicate that lobsterman may use LORAN-C to locate their traps when their buoys are lost, fishing trawlers use it to...re-locate certain fishing areas and to avoid objects that would interfere with their nets, charter boat and some recreational boaters still rely on it

  9. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    torture, but not to find ticking bombs; it is used “to punish political opponents, to intimidate their allies, or to cow a citizenry” (Amnesty...terrorists in the case of a “ ticking time bomb” scenario. Some people and groups, such as Amnesty International, take a strong position against...critical information. The classic scenario, recently articulated by Alan Dershowitz (2002), is a “ ticking time bomb,” in which a prisoner is known to

  10. European Approaches to Homeland Security and Counterterrorism

    Science.gov (United States)

    2006-07-24

    actual terrorist incident, a Cabinet-level emergency crisis management body — known as COBR (for the Cabinet Office briefing room in which it meets...is convened to coordinate the government’s immediate emergency response; COBR brings together the Prime Minister and other Cabinet ministers and... COBR , and the armed forces would have no jurisdiction outside of supporting the civil powers. The Ministry of Defense and the armed forces are also

  11. A Balanced Approach to Funding Homeland Security

    Science.gov (United States)

    2014-12-01

    BPHC Boston Public Health Commission BPU Bureau of Public Utilities BRIC Boston Regional Intelligence Center C consequence CDC Center for Disease...Regional Intelligence Center ( BRIC ), and the FBI/Joint Terrorism Task Force (JTTF).140 137 Ibid. 138 Ibid.. 7. 139 Ibid. 140 Lessons Learned from the

  12. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    attack and conducted in depth (albeit anonymous) interviews of several Russian Special Forces, or Spetsnaz , forces that stormed the school and...lacking. The 62-hour ordeal began at 8:45 A.M. and the Russian Special Forces, or Spetsnaz , were activated at 10:00 A.M., arriving in waves between 1...in that they are not specifically located within the army or navy, but throughout the country’s force ministries. The Spetsnaz can also perform

  13. A Homeland Security Net Assessment Needed Now!

    Science.gov (United States)

    2015-12-01

    Peace, 2013); and Michael D. Swaine, Mike M. Mochizuki, Michael L. Brown , Paul S. Giarra, Douglas H. Paal, Rachel Esplin Odell, Raymond Lu, Oliver... Judith Miller, “Bioterrorism’s Deadly Math,” City Journal 18, no. 4 (Autumn 2008): http://www.city-journal.org/2008/18_4_bioterrorism.html. 29. Forrest

  14. Homeland Security Behind the Redwood Curtain

    Science.gov (United States)

    2007-09-01

    the kind you can burn songs onto using your home computer. “I know that it’s illegal to copy music and all that but I want you to have this CD. I...generator at home because we lose power all winter. No one comes home with less than a half empty gas tank during the winter; we always top off before...coming up the hills. Our pantry is stocked with canned food. Next weekend we’re putting on the annual celebration in downtown Phillipsville, all two

  15. ETV - HOMELAND SECURITY EVALUATION OF CYANIDE DETECTORS

    Science.gov (United States)

    EPA's Environmental Technology Verification (ETV) Program was established in 1995 to objectively verify the performance of technologies that measure / monitor the quality of our environment, both for background or at suspected contamination site. The ETV program has established...

  16. Considerations for SOF in Domestic Homeland Security

    Science.gov (United States)

    2008-05-01

    agencies seeking to address the ‘ Waco ’ style compounds used by some hard-line organizations. Using SOF’s specific reconnaissance and surveillance...societies, and training in forensic and investigative functions, are permitted. Center for International Policy, “Just the Facts: A civilian’s

  17. 76 FR 34088 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-06-10

    ... participate in this HSAC teleconference via afore mentioned procedures. Each individual must provide his or... during the teleconference, contact Erika Nixon at the afore mentioned number (202) 447-3135. Dated: June...

  18. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    Our work is based on the review of documents and interviews conducted at more than two dozen federal departments and agencies, including central management agencies such as OMB, the general Services Administration (GSA...

  19. 75 FR 59278 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-09-27

    ... the purpose of receiving sensitive operational information from senior DHS leadership. The briefings... federal and law enforcement involvement. Members will learn about the potential capabilities and... these briefings, as well as the capabilities and vulnerabilities gleaned from the cyber exercise, is...

  20. The DOD Role in Homeland Security

    Science.gov (United States)

    2004-01-01

    A C K and A A R O N S C H O L E R Preparing for Hurricane Isabel . U .S . A ir Fo rc e (W illi am M . P la te , J r.) Report Documentation Page...local police and first response agencies. The Department of Defense is not prepared, will- ing, or in some cases constitutionally permitted to play that... II ) F–16 patrolling American skies, Noble Eagle. ■ H O M E L A N D S E C U R I T Y 40 JFQ / issue thirty-five advice, and limited decontamination

  1. Complacency: A Threat to Homeland Security

    Science.gov (United States)

    2014-06-01

    Nichols, 2002). Folk psychology has also been implicated in loftier endeavors, such as trying to make sense of Descartes ’ reasons for thinking...and others state, bears the hallmarks of the over-rationalist thinking that has dominated since the triumphs of Newton and Descartes (Rosenhead

  2. Homeland Security Department: FY2011 Appropriations

    Science.gov (United States)

    2010-08-27

    Safety Mission The oil spill from the drilling rig in the Gulf of Mexico has focused attention on the Coast Guard’s role in marine safety and...broad missions, criminal investigations and protection. Criminal investigation activities encompass financial crimes, identity theft, counterfeiting ...Lake and Chad C. Haddal. 107 S.Rept. 111-222, pp. 106-108. 108 Institute of Medicine and National Research Council, BioWatch and Public Health

  3. Homeland Security: Defending U.S. Airspace

    National Research Council Canada - National Science Library

    Bolkcom, Christopher

    2003-01-01

    The September 11th attacks have drawn attention to U.S. air defense. Protecting U.S. airspace may require improvements in detecting enemy aircraft and cruise missiles, making decisions on how to address these threats, and intercepting...

  4. COMPUTATIONAL SCIENCE CENTER

    Energy Technology Data Exchange (ETDEWEB)

    DAVENPORT,J.

    2004-11-01

    The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security.

  5. Business Administration and Computer Science Degrees: Earnings, Job Security, and Job Satisfaction

    Science.gov (United States)

    Mehta, Kamlesh; Uhlig, Ronald

    2017-01-01

    This paper examines the potential of business administration vs. computer science degrees in terms of earnings, job security, and job satisfaction. The paper focuses on earnings potential five years and ten years after the completion of business administration and computer science degrees. Moreover, the paper presents the income changes with…

  6. A computer science approach to managing security in health care.

    Science.gov (United States)

    Asirelli, P; Braccini, G; Caramella, D; Coco, A; Fabbrini, F

    2002-09-01

    The security of electronic medical information is very important for health care organisations, which have to ensure confidentiality, integrity and availability of the information provided. This paper will briefly outline the legal measures adopted by the European Community, Italy and the United States to regulate the use and disclosure of medical records. It will then go on to highlight how information technology can help to address these issues with special reference to the management of organisation policies. To this end, we will present a modelling example for the security policy of a radiological department.

  7. CSIR ScienceScope: An Energy-secure South Africa

    CSIR Research Space (South Africa)

    CSIR

    2009-06-01

    Full Text Available computing at the CHPC – the right thing to do 46 Recovering coal from slurries for more energy 48 Bolstering sustainability through energy-efficient wireless networks 50 The power of quantum dots 52 S C I E N C E S C O P E J U N E 2 0 0 9 4 SECURITY...

  8. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  9. Water security in one blue planet: twenty-first century policy challenges for science.

    Science.gov (United States)

    Grey, D; Garrick, D; Blackmore, D; Kelman, J; Muller, M; Sadoff, C

    2013-11-13

    Water-related risks threaten society at the local, national and global scales in our inter-connected and rapidly changing world. Most of the world's poor are deeply water insecure and face intolerable water-related risks associated with complex hydrology. Most of the world's wealthy face lower water-related risks and less complex hydrology. This inverse relationship between hydrological complexity and wealth contributes to a divided world. This must be addressed if global water security is to be achieved. Using a risk-based framework provides the potential to link the current policy-oriented discourse on water security to a new and rigorous science-based approach to the description, measurement, analysis and management of water security. To provide the basis for this science-based approach, we propose an encompassing definition rooted in risk science: water security is a tolerable level of water-related risk to society. Water security policy questions need to be framed so that science can marshal interdisciplinary data and evidence to identify solutions. We join a growing group of scientists in asserting a bold vision for science leadership, calling for a new and comprehensive understanding of the planet's water system and society's water needs.

  10. Wormuth: Work on Security, Defense 'Holistically'

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, PRESS RELEASES Concepts spawned at the Center for Homeland Defense and Security could be very valuable to government entities such as the Department of Defense as that agency expands its focus in...

  11. Science and Security Clash on Bird-Flu Papers

    Science.gov (United States)

    Fischman, Josh

    2012-01-01

    Censored papers on bird flu, which could help terrorists, have critics wondering if academic scientists can police their own work. The near-publication has brought out general critics of the federal panel, the National Science Advisory Board for Biosecurity, and the voluntary self-policing approach that it embraces instead of regulation. Members…

  12. Job Security at Isfahan University of Medical Sciences: Implications on Employees and Types of Contracts

    Science.gov (United States)

    Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte

    2013-01-01

    Introduction: Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). Method and materials: The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. Results: The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Discussion: Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS. PMID:23687464

  13. 77 FR 26641 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2012-05-04

    ... 4, 2012 Part III Department of Homeland Security Transportation Security Administration Aviation... Aviation Security Advisory Committee (ASAC) Meeting AGENCY: Transportation Security Administration, DHS... Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) on May...

  14. Impacts of Psychological Science on National Security Agencies Post-9/11

    Science.gov (United States)

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  15. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  16. After the Cold War: A New Calculus for Science and Security

    Science.gov (United States)

    Wallerstein, Mitchel

    2003-01-01

    Just more than twenty years ago, the author had the privilege of directing a National Academy of Sciences panel that issued a report entitled "Scientific Communication and National Security," known informally as the Corson Report, after Dale Corson, the panel's chair and president emeritus of Cornell University. Thus, for him, today's discussions…

  17. Science implementation of Forecast Mekong for food and environmental security

    Science.gov (United States)

    Turnipseed, D. Phil

    2012-01-01

    Forecast Mekong is a significant international thrust under the Delta Research and Global Observation Network (DRAGON) of the U.S. Geological Survey (USGS) and was launched in 2009 by the U.S. Department of State and the Foreign Ministers of Cambodia, Laos, Thailand, and Vietnam under U.S. Department of State Secretary Hillary R. Clinton's Lower Mekong Initiative to enhance U.S. engagement with countries of the Lower Mekong River Basin in the areas of environment, health, education, and infrastructure. Since 2009, the USGS has worked closely with the U.S. Department of State; personnel from Cambodia, Laos, Thailand, and Vietnam; nongovernmental organizations; and academia to collect and use research and data from the Lower Mekong River Basin to provide hands-on results that will help decisionmakers in future planning and design for restoration, conservation, and management efforts in the Lower Mekong River Basin. In 2012 Forecast Mekong is highlighting the increasing cooperation between the United States and Lower Mekong River Basin countries in the areas of food and environmental security. Under the DRAGON, Forecast Mekong continues work in interactive data integration, modeling, and visualization system by initiating three-dimensional bathymetry and river flow data along with a pilot study of fish distribution, population, and migratory patterns in the Lower Mekong River Basin. When fully developed by the USGS, in partnership with local governments and universities throughout the Mekong River region, Forecast Mekong will provide valuable planning tools to visualize the consequences of climate change and river management.

  18. The Use of Air Power for Maritime Homeland Defense

    Science.gov (United States)

    2006-12-01

    061102bolkcom.pdf (accessed 17 March 2006). 21 Ibid. 22 Ibid., 1. 23 George J. Tenet, “Worldwide Threat - Converging Dangers in a Post 9/11 World,” Testimony...available from https://wwwmil.nellis.af.mil/usafws/ default.htm (accessed 17 March 2006). 87 Group Captain B. C. Laite , Maritime Air Operations...D.C: National Security Council/Homeland Security Council, October 2005), 6. 30 and intercept dangers long before they threaten our homeland.”129

  19. FACE-IT. A Science Gateway for Food Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Montella, Raffaele [Univ. of Naples Federico II (Italy); Argonne National Lab. (ANL), Argonne, IL (United States); Univ. of Chicago, IL (United States); Kelly, David [Argonne National Lab. (ANL), Argonne, IL (United States); Univ. of Chicago, IL (United States); Xiong, Wei [Univ. of Florida, Gainesville, FL (United States); Brizius, Alison [Argonne National Lab. (ANL), Argonne, IL (United States); Univ. of Chicago, IL (United States); Elliott, Joshua [Argonne National Lab. (ANL), Argonne, IL (United States); Univ. of Chicago, IL (United States); Madduri, Ravi [Argonne National Lab. (ANL), Argonne, IL (United States); Univ. of Chicago, IL (United States); Maheshwari, Ketan [Argonne National Lab. (ANL), Argonne, IL (United States); Porter, Cheryl [Univ. of Florida, Gainesville, FL (United States); Vilter, Peter [Argonne National Lab. (ANL), Argonne, IL (United States); Wilde, Michael [Argonne National Lab. (ANL), Argonne, IL (United States); Univ. of Chicago, IL (United States); Zhang, Meng [Univ. of Florida, Gainesville, FL (United States); Foster, Ian [Argonne National Lab. (ANL), Argonne, IL (United States); Univ. of Chicago, IL (United States)

    2015-07-14

    Progress in sustainability science is hindered by challenges in creating and managing complex data acquisition, processing, simulation, post-processing, and intercomparison pipelines. To address these challenges, we developed the Framework to Advance Climate, Economic, and Impact Investigations with Information Technology (FACE-IT) for crop and climate impact assessments. This integrated data processing and simulation framework enables data ingest from geospatial archives; data regridding, aggregation, and other processing prior to simulation; large-scale climate impact simulations with agricultural and other models, leveraging high-performance and cloud computing; and post-processing to produce aggregated yields and ensemble variables needed for statistics, for model intercomparison, and to connect biophysical models to global and regional economic models. FACE-IT leverages the capabilities of the Globus Galaxies platform to enable the capture of workflows and outputs in well-defined, reusable, and comparable forms. We describe FACE-IT and applications within the Agricultural Model Intercomparison and Improvement Project and the Center for Robust Decision-making on Climate and Energy Policy.

  20. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    Science.gov (United States)

    2013-12-01

    Swan events.8 The events of 9/11, Hurricane Katrina, Super Storm Sandy, the Boston bombings , the near misses of Northwest Flight 253, and the bombing ...discusses how overconfidence bias stems from biased self-attribution, first identified by Daryl Bern . When our actions are confirmed by good events...events of 9/11, Hurricane Katrina, Super Storm Sandy, the Boston bombings , the near misses of Northwest Flight 253, and the bombing attempt on

  1. Science and Technology to Advance Regional Security in the Middle East and Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tompson, A F B; Richardson, J H; Ragaini, R C; Knapp, R B; Rosenberg, N D; Smith, D K; Ball, D Y

    2002-10-09

    This paper is concerned with the promotion and advancement of regional security in the Middle East and Central Asia through the development of bilateral and multilateral cooperation on targeted scientific and technical projects. It is widely recognized that increasing tensions and instability in many parts of the world emphasize--or reemphasize--a need to seek and promote regional security in these areas. At the Lawrence Livermore National Laboratory (LLNL), a national security research facility operated for the US Department of Energy, we are pursuing an effort to use science and technology as a ''low risk'' means of engagement in regions of strategic importance to the United States. In particular, we are developing collaborations and cooperative projects among (and between) national laboratory scientists in the US and our various counterparts in the countries of interest.

  2. The Nuclear Security Science and Policy Institute at Texas A&M University

    Directory of Open Access Journals (Sweden)

    Claudio A. Gariazzo

    2015-07-01

    Full Text Available The Nuclear Security Science and Policy Institute (NSSPI is a multidisciplinary organization at Texas A&M University and was the first U.S. academic institution focused on technical graduate education, research, and service related to the safeguarding of nuclear materials and the reduction of nuclear threats. NSSPI employs science, engineering, and policy expertise to: (1 conduct research and development to help detect, prevent, and reverse nuclear and radiological proliferation and guard against nuclear terrorism; (2 educate the next generation of nuclear security and nuclear nonproliferation leaders; (3 analyze the interrelationships between policy and technology in the field of nuclear security; and (4 serve as a public resource for knowledge and skills to reduce nuclear threats. Since 2006, over 31 Doctoral and 73 Master degrees were awarded through NSSPI-sponsored research. Forty-one of those degrees are Master of Science in Nuclear Engineering with a specialization in Nuclear Nonproliferation and 16 were Doctorate of Philosophy degrees with a specific focus on nuclear nonproliferation. Over 200 students from both technical and policy backgrounds have taken classes provided by NSSPI at Texas A&M. The model for creating safeguards and security experts, which has in large part been replicated worldwide, was established at Texas A&M by NSSPI faculty and staff. In addition to conventional classroom lectures, NSSPI faculty have provided practical experiences; advised students on valuable research projects that have contributed substantially to the overall nuclear nonproliferation, safeguards and security arenas; and engaged several similar academic and research institutes around the world in activities and research for the benefit of Texas A&M students. NSSPI has had an enormous impact on the nuclear nonproliferation workforce (across the international community in the past 8 years, and this paper is an attempt to summarize the activities

  3. Cyber Science and Security - An R&D Partnership at LLNL

    Energy Technology Data Exchange (ETDEWEB)

    Brase, J; Henson, V

    2011-03-11

    Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

  4. THE STATUS OF INFORMATION SECURITY COMPETENCE FORMEDNESS OF FUTURE COMPUTER SCIENCE TEACHERS

    Directory of Open Access Journals (Sweden)

    Vasyl P. Oleksiuk

    2017-12-01

    Full Text Available In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specificity of the future computer science teachers' study in the context of developing of their competences necessary for safe students’ activity in the computer networks and Internet. Particular attention is paid to the threats arising after introduction cloud technologies various service models into the educational process. The article focuses on methods and stages of the pedagogical investigation of correlation between the operational and reflective components of the professional competencies of future computer science teachers.

  5. POLITICAL SCIENCES AND THE SECURITY AND DEFENSE STUDIES. PRECISIONS AND PROJECTIONS

    Directory of Open Access Journals (Sweden)

    JUAN FUENTES VERA

    2018-02-01

    Full Text Available This article focus on political science as a matter of study in the programs of the National Academy for Political and Strategic Studies, in order to explain the reason of including this discipline, particularly in its relation with security and defense. It is focused on the object of study of political science, thus delivering precisions about the concept of politics among others related. It also emphasizes some aspects that have been important in this discipline, including some modern epistemological debates, and also open the scope of possibilities that today can be offered as matters of study in a world yielded to the dynamics of the globalization.

  6. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  7. New perspectives in ecosystem services science as instruments to understand environmental securities.

    Science.gov (United States)

    Villa, Ferdinando; Voigt, Brian; Erickson, Jon D

    2014-04-05

    As societal demand for food, water and other life-sustaining resources grows, the science of ecosystem services (ES) is seen as a promising tool to improve our understanding, and ultimately the management, of increasingly uncertain supplies of critical goods provided or supported by natural ecosystems. This promise, however, is tempered by a relatively primitive understanding of the complex systems supporting ES, which as a result are often quantified as static resources rather than as the dynamic expression of human-natural systems. This article attempts to pinpoint the minimum level of detail that ES science needs to achieve in order to usefully inform the debate on environmental securities, and discusses both the state of the art and recent methodological developments in ES in this light. We briefly review the field of ES accounting methods and list some desiderata that we deem necessary, reachable and relevant to address environmental securities through an improved science of ES. We then discuss a methodological innovation that, while only addressing these needs partially, can improve our understanding of ES dynamics in data-scarce situations. The methodology is illustrated and discussed through an application related to water security in the semi-arid landscape of the Great Ruaha river of Tanzania.

  8. Assessment of a Strategic Partnership Between the U.S. Department of Homeland Security Science and Technology Directorate and the U.S. Army Developmental Test Command

    Science.gov (United States)

    2011-05-01

    collaboration include explosive detection, chemical detection, survivability, nonlethal munitions, and robotics (International Test and Evaluation...savings found will likely become a permanent cut ( Maze , 2011). This focus on reducing overhead and focusing on force structure and upgrade is not...Quality Tools.” Quality Progress, 40 (7),18-22. Maze , R. (2011). “Money DoD Saves May Be Cut From Budget.” Air Force Times. Orszag, P. (2009). Open

  9. The Haptic Lines of Homeland

    Science.gov (United States)

    Dawson, P.; Takatsuka, M.

    2013-02-01

    This paper discusses the conceptual underpinnings, working processes and the tools used for preparing the scene files of a holographic art work which offers a subjective view point on the idea of homeland. The art work, Homeland, an optically formed fringe digital hologram, which is contextualized by the holographic maps used in situational awareness, indicates its subjectivity by strongly referencing the human body, particularly the lines of the palm of the hand. ... because the body belongs to the order of things as the world is universal flesh. Maurice Merleau-Ponty

  10. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public... Mangement Agency. (2009). Nebraska 2009 state homeland security strategy. Retrieved August 19, 2010, from http://www.nema.ne.gov/content/home_news/2009

  11. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  12. South African Homelands as Frontiers

    DEFF Research Database (Denmark)

    of frontier zones, the homelands emerge as areas in which the future of the South African postcolony is being renegotiated, contested and remade with hyper-real intensity. This is so because the many fault lines left over from apartheid (its loose ends, so to speak) – between white and black; between...

  13. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.

    Science.gov (United States)

    Proctor, Robert W; Chen, Jing

    2015-08-01

    The overarching goal is to convey the concept of science of security and the contributions that a scientifically based, human factors approach can make to this interdisciplinary field. Rather than a piecemeal approach to solving cybersecurity problems as they arise, the U.S. government is mounting a systematic effort to develop an approach grounded in science. Because humans play a central role in security measures, research on security-related decisions and actions grounded in principles of human information-processing and decision-making is crucial to this interdisciplinary effort. We describe the science of security and the role that human factors can play in it, and use two examples of research in cybersecurity--detection of phishing attacks and selection of mobile applications--to illustrate the contribution of a scientific, human factors approach. In these research areas, we show that systematic information-processing analyses of the decisions that users make and the actions they take provide a basis for integrating the human component of security science. Human factors specialists should utilize their foundation in the science of applied information processing and decision making to contribute to the science of cybersecurity. © 2015, Human Factors and Ergonomics Society.

  14. Water security - Nation state and international security implications

    Science.gov (United States)

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  15. COMPUTATIONAL SCIENCE CENTER

    Energy Technology Data Exchange (ETDEWEB)

    DAVENPORT, J.

    2005-11-01

    The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include, for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security. To achieve our goals we have established a close alliance with applied mathematicians and computer scientists at Stony Brook and Columbia Universities.

  16. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  17. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  18. Linking adaptation science to action to build food secure Pacific Island communities

    Directory of Open Access Journals (Sweden)

    C. Cvitanovic

    2016-01-01

    Full Text Available Climate change is a major threat to food security in Pacific Island countries, with declines in food production and increasing variability in food supplies already evident across the region. Such impacts have already led to observed consequences for human health, safety and economic prosperity. Enhancing the adaptive capacity of Pacific Island communities is one way to reduce vulnerability and is underpinned by the extent to which people can access, understand and use new knowledge to inform their decision-making processes. However, effective engagement of Pacific Island communities in climate adaption remains variable and is an ongoing and significant challenge. Here, we use a qualitative research approach to identify the impediments to engaging Pacific Island communities in the adaptations needed to safeguard food security. The main barriers include cultural differences between western science and cultural knowledge, a lack of trust among local communities and external scientists, inappropriate governance structures, and a lack of political and technical support. We identify the importance of adaptation science, local social networks, key actors (i.e., influential and trusted individuals, and relevant forms of knowledge exchange as being critical to overcoming these barriers. We also identify the importance of co-ordination with existing on-ground activities to effectively leverage, as opposed to duplicating, capacity.

  19. Application of military uncooled infrared sensors to homeland defense

    Science.gov (United States)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  20. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... Infrastructure Resilience Division, National Protection and Programs Directorate, Department of Homeland Security...

  1. 76 FR 17424 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-03-29

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... Communications System, National Protection and Programs Directorate, Department of Homeland Security, 245 Murray...

  2. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained an... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document...

  3. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-02-09

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee..., National Protection and Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail Stop...

  4. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will be meeting by... or write the Deputy Manager, National Communications System, Department of Homeland Security, 245...

  5. Aviation security : TSA has completed key activities associated with implementing secure flight, but additional actions are needed to mitigate risks.

    Science.gov (United States)

    2009-05-01

    To enhance aviation security, the Department of Homeland Securitys (DHS) Transportation Security Administration (TSA) developed a programknown as Secure Flightto assume from air carriers the function of matching passenger information against...

  6. History as the Architect of the Present: What Made Kashmir the Nucleus of South Asia Terrorism? India-Pakistan Conflict and Its Impact on U.S. Homeland Security

    Science.gov (United States)

    2012-03-01

    direct war, it engaged in a war of attrition in Kashmir by initially supporting irregulars and later jihadi militants. Fundamentalists in the Pakistani...them, no time to inspect Contested areas. The weather was frightfully hot, And a bout of dysentery kept him constantly on the trot, But in seven weeks... irregular warfare in South Asia as an instrument of its national security policy. This irregular warfare entangles not only India, but transudes to

  7. National Communications System: Ensuring Essential Communications for the Homeland

    Science.gov (United States)

    2002-01-01

    U.S. computers (“ zombies ”) with high bandwidth connections An increased number and frequency of automated attacks, including widespread distributed...ISPG is the central office of record for all national security information applicable to the Department. The Drug Enforcement Administration (DEA), FBI...CWIN Cyber Warning Information Network CY Calendar Year DEA Drug Enforcement Administration DFOs Disaster Field Offices DHS Department of Homeland

  8. Grassroots Engagement: Securing Support for Science Communication Training Programs Created by Graduate Students for Graduate Students

    Science.gov (United States)

    Rohde, J. A.

    2016-12-01

    The need for science communication and outreach is widely recognized throughout the scientific community. Yet, at present, graduate students and early career scientists have, at best, widely variable access to opportunities to train in science communication techniques and to hone their outreach skills. In 2010, a small group of graduate students at the University of Washington led a grassroots effort to increase their own access to communication and outreach training by creating "The Engage Program." They developed a novel, interdisciplinary curriculum focused on storytelling, public speaking and improvisation, design, and the distillation of complex topics to clear and accessible forms. These entrepreneurial students faced (real or perceived) barriers to building this program, including the pressure to hide or dampen their enthusiasm from advisors and mentors, ignorance of university structures, and lack of institutional support. They overcame these barriers and secured institutional champions and funding, partnered with Town Hall Seattle to create a science speaker series, and developed a student leadership structure to ensure long-term sustainability of the program. Additionally, they crowdfunded an evaluation of the program's effectiveness in order demonstrate the benefits of such training to the scientific careers of the students. Here we present our key strategies for overcoming barriers to support, and compare them with several similar grassroots graduate-student led public communication programs from other institutions.

  9. 49 CFR 1548.13 - Security coordinators.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  10. Border Security: A Journey Without a Destination

    Science.gov (United States)

    2013-12-01

    RESEARCH QUESTION ...............................................................................6 F. SCOPE...Immigration and Naturalization Service (INS) .................................7 2. Homeland Security Enterprise ( HSE ...18 E. PROJECT MANAGEMENT ........................................................................20 III. RESEARCH

  11. Medicine, material science and security: the versatility of the coded-aperture approach.

    Science.gov (United States)

    Munro, P R T; Endrizzi, M; Diemoz, P C; Hagen, C K; Szafraniec, M B; Millard, T P; Zapata, C E; Speller, R D; Olivo, A

    2014-03-06

    The principal limitation to the widespread deployment of X-ray phase imaging in a variety of applications is probably versatility. A versatile X-ray phase imaging system must be able to work with polychromatic and non-microfocus sources (for example, those currently used in medical and industrial applications), have physical dimensions sufficiently large to accommodate samples of interest, be insensitive to environmental disturbances (such as vibrations and temperature variations), require only simple system set-up and maintenance, and be able to perform quantitative imaging. The coded-aperture technique, based upon the edge illumination principle, satisfies each of these criteria. To date, we have applied the technique to mammography, materials science, small-animal imaging, non-destructive testing and security. In this paper, we outline the theory of coded-aperture phase imaging and show an example of how the technique may be applied to imaging samples with a practically important scale.

  12. Soil science. Soil and human security in the 21st century.

    Science.gov (United States)

    Amundson, Ronald; Berhe, Asmeret Asefaw; Hopmans, Jan W; Olson, Carolyn; Sztein, A Ester; Sparks, Donald L

    2015-05-08

    Human security has and will continue to rely on Earth's diverse soil resources. Yet we have now exploited the planet's most productive soils. Soil erosion greatly exceeds rates of production in many agricultural regions. Nitrogen produced by fossil fuel and geological reservoirs of other fertilizers are headed toward possible scarcity, increased cost, and/or geopolitical conflict. Climate change is accelerating the microbial release of greenhouse gases from soil organic matter and will likely play a large role in our near-term climate future. In this Review, we highlight challenges facing Earth's soil resources in the coming century. The direct and indirect response of soils to past and future human activities will play a major role in human prosperity and survival. Copyright © 2015, American Association for the Advancement of Science.

  13. Food security: contributions from science to a new and greener revolution.

    Science.gov (United States)

    Beddington, John

    2010-01-12

    There is an intrinsic link between the challenge we face to ensure food security through the twenty-first century and other global issues, most notably climate change, population growth and the need to sustainably manage the world's rapidly growing demand for energy and water. Our progress in reducing global poverty and achieving the Millennium Development Goals will be determined to a great extent by how coherently these long-term challenges are tackled. A key question is whether we can feed a future nine billion people equitably, healthily and sustainably. Science and technology can make a major contribution, by providing practical solutions. Securing this contribution requires that high priority be attached both to research and to facilitating the real world deployment of existing and emergent technologies. Put simply, we need a new, 'greener revolution'. Important areas for focus include: crop improvement; smarter use of water and fertilizers; new pesticides and their effective management to avoid resistance problems; introduction of novel non-chemical approaches to crop protection; reduction of post-harvest losses; and more sustainable livestock and marine production. Techniques and technologies from many disciplines, ranging from biotechnology and engineering to newer fields such as nanotechnology, will be needed.

  14. 49 CFR 1542.107 - Changed conditions affecting security.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the security... 49 Transportation 9 2010-10-01 2010-10-01 false Changed conditions affecting security. 1542.107...

  15. (Congressional Interest) Network Information and Space Security Center

    Science.gov (United States)

    2011-09-30

    Terror Management Theory and Human Factors research to support HLS psychology of terrorism studies.  Began collaborations with the Economic...continued to fund Human Factors research (Department of Homeland Security Directorate of Science and Technology priority area) in Terror Management Theory . The...Unpublished manuscript. University of Colorado Colorado Springs, CO. Pyszczynski, T. (2005) What are we so afraid of? A terror management theory perspective

  16. Outline of changes in cortisol and melatonin circadian rhythms in the security guards of shiraz university of medical sciences

    Directory of Open Access Journals (Sweden)

    Zahra Zamanian

    2013-01-01

    Conclusions: The present study aimed to investigate the subsequences of shift working in the security guards of Shiraz University of Medical Sciences and showed that occupational exposure to bright light could affect some biological markers, such as melatonin and cortisol secretion.

  17. Science and Security before the Atomic Bomb: The Loyalty Case of Harald U. Sverdrup

    Science.gov (United States)

    Oreskes, Naomi; Rainger, Ronald

    In the summer of 1941, Harald Sverdrup, the Norwegian-born Director of the Scripps Institution of Oceanography (SIO) in La Jolla, California, was denied security clearance to work on Navy-sponsored research in underwater acoustics applied to anti-submarine warfare. The clearance denial embarrassed the world renown oceanographer and Arctic explorer, who repeatedly offered his services to the U.S. government only to see scientists of far lesser reputation called upon to aid the war effort. The official story of Sverdrup's denial was the risk of blackmail over relatives in occupied Norway. Declassified documents tell a different story. Although Sverdrup's integrity was defended on the highest levels of U.S. science, doubt was cast upon him by members of his own institution, who accused him of being a Nazi sympathiser. Personal distrust, rooted in scientific and intellectual disagreement, spilled over into questions about Sverdrup's loyalty and judgement. These doubts were considered sufficient grounds for withholding clearance, until Roger Revelle, a former student of Sverdrup now working within the Navy, was able to obtain a limited clearance for Sverdrup to develop techniques to forecast surf conditions during amphibious assaults. After the war, this work was credited with saving many lives, but at the time it placed Sverdrup out of the mainstream of Navy-sponsored oceanographic research. In being denied access to major areas of scientific work, Sverdrup's position as a leader of American oceanography was undermined. The loyalty case of Harald Sverdrup illustrates the emergence of an institutional apparatus through which the U.S. military began to control and shape the organisation of American science in the twentieth century. Military sponsorship of scientific research, begun during the open conflicts of World War II and continuing into the simmering tensions of the Cold War, involved explicit control by the U.S. military of who had access to critical information

  18. 49 CFR 1544.215 - Security coordinators.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  19. 49 CFR 1542.113 - Airport tenant security programs.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section...

  20. DoD’s Role in Homeland Defense and Homeland Security

    Science.gov (United States)

    2006-04-14

    enforcement activities such as search, arrest and detention at the bequest , and direction, of a local authority (sheriff, marshal, etc.). The United... motivation for the Act in the 1870s was simply to withdraw the federal troops from the South as a final signal to the end of Reconstruction

  1. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ... Doc No: 2012-10510] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs... Federal Register of April 25, 2012, concerning the President's National Security Telecommunications...

  2. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-11-23

    ... Doc No: 2011-30298] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0106] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, December...

  3. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  4. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  5. 75 FR 16491 - Science and Technology Directorate; Submission for Review; Information Collection Request for the...

    Science.gov (United States)

    2010-04-01

    ... Rules of Behavior. Members will also be able to participate in threaded discussions and comment on other... AGENCY: Science and Technology Directorate, DHS. ACTION: 30-day Notice and request for comment. SUMMARY: The Department of Homeland Security (DHS) invites the general public to comment on a new data...

  6. Radiological Events in the Homeland

    Science.gov (United States)

    2008-01-01

    and China, all of whom have dedicated security and protection measures for their arsenals, along with over 50 years of experience in handling these...devices—to the newer members of the club, such as India, Pakistan, and North Korea—all of whom have their own secu- rity challenges in the handling ...severe radiation effects almost immediately. Of 600 workers on the site, 134 received high exposures (ranging from 50–1,340 radium absorbed doses

  7. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  8. War in the Atlantic: A Historical Case of Homeland Security

    Science.gov (United States)

    2015-09-01

    chancellor who, on October 5, 1918, asked President Wilson for an armistice. Negotiations dragged on for a month before the Treaty of Versailles was...submarine menace had been solved by convoys and minefields in World War I, and because U-boats were forbidden in the Treaty of Versailles , naval brass did...Britain’s commerce in 1939 was Germany’s pocket battleships. Built to conform to restrictions imposed by the Treaty of Versailles , these small vessels

  9. U.S. Biodefense & Homeland Security: Toward Detection & Attribution

    Science.gov (United States)

    2006-12-01

    Johnny’s Café and The Chuck Wagon restaurants. They also contaminated blue cheese salad bar dressing at Arlo’s restaurant. Ava said Puja claimed to...Ibid., 319. 104 Ibid., 20-21. 105 Ibid. 106 Ibid. 30 cheese dressing of another, but not in the dry mix used to make the dressing. “This suggested... biotechnology experts until months into the investigation. “There was a delay of several months before the FBI subpoenaed laboratories working with

  10. Risk Unbound: Threat, Catastrophe, and the End of Homeland Security

    Science.gov (United States)

    2015-09-01

    controlled, hierarchical units. There are barriers to entry, and tightly structured means of advancing through experience, training and time in service...This presents a barrier to innovation during operations. 6. NIMS Unbound Writing in 2013, Cynthia Renaud argued that the structures of incident...allowing us to become the madman described in A Midsummer Night’s Dream—who sees more devils than hell can hold.334 To understand unbounded risks aright

  11. The Development and Recognition of Homeland Security Law

    Science.gov (United States)

    2007-03-01

    Rig hts of M ino riti es Ma rit i me La w Ad mi ral ty Tra ns po rta tio n a nd C om mo n C arr ier La w Pr ac tic e b efo re Go ve rnm en t A...La w Ad mi ral ty Tra ns po rta tio n a nd C om mo n C arr i.. Pr ac tic e b efo re Go ve rnm en t A ge ... Ad mi nis tra tiv e L aw Wh ite C

  12. Image-Based Vehicle Identification Technology for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A

    2002-10-08

    The threat of terrorist attacks against US civilian populations is a very real, near-term problem that must be addressed, especially in response to possible use of Weapons of Mass Destruction. Several programs are now being funded by the US Government to put into place means by which the effects of a terrorist attack could be averted or limited through the use of sensors and monitoring technology. Specialized systems that detect certain threat materials, while effective within certain performance limits, cannot generally be used efficiently to track a mobile threat such as a vehicle over a large urban area. The key elements of an effective system are an image feature-based vehicle identification technique and a networked sensor system. We have briefly examined current uses of image and feature recognition techniques to the urban tracking problem and set forth the outlines of a proposal for application of LLNL technologies to this critical problem. The primary contributions of the proposed work lie in filling important needs not addressed by the current program: (1) The ability to create vehicle ''fingerprints,'' or feature information from images to allow automatic identification of vehicles. Currently, the analysis task is done entirely by humans. The goal is to aid the analyst by reducing the amount of data he/she must analyze and reduce errors caused by inattention or lack of training. This capability has broad application to problems associated with extraction of useful features from large data sets. (2) Improvements in the effectiveness of LLNL's WATS (Wide Area Tracking System) by providing it accurate threat vehicle location and velocity. Model predictability is likely to be enhanced by use of more information related to different data sets. We believe that the LLNL can accomplish the proposed tasks and enhance the effectiveness of the system now under development.

  13. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    and utilizing a regular army and establishing political ties with the French. Without the aid of the Continental Army and the French crown , American...The people receive this cruel edict with abhorrence and indignation.” From Harry Alonzo Cushing, The Writings of Samuel Adams Collected and Edited

  14. Securing Nuclear and Radiological Material in the Homeland

    Science.gov (United States)

    2007-03-01

    his sleeper, and with the help of some sleeping pills, falls fast asleep. As many drivers often do, he leaves the truck tractor’s diesel engine...wakes him. He feels foggy from the sleeping pills and steps out of the rig to go wash his face in the rest room. The cobalt 60 cask, which was...of a plan to obtain and weaponize biological warfare agents. Jamaah Islamiyah maintains close ties to al-Qa’ida. 1-Dec-01 Malaysian authorities

  15. Creation of a Homeland Security Jail Information Model

    Science.gov (United States)

    2012-03-01

    about drug cartels, human trafficking/illegal immigration, firearms and explosives, counterfeit merchandise used to fund terrorist groups, and...gang activity. Beyond the scope of street gangs there exists untapped information regarding the counterfeiting of U.S. currency, illegal border...and local law enforcement agencies with an expertise in cartels, immigration fraud, counterfeit currency, international terrorist organizations

  16. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    Science.gov (United States)

    2009-09-01

    collaboration? 11 Eugene Bardach , A Practical Guide for Policy Analysis (Washington, DC: CQ Press...express this idea is appropriate. In his book, A Practical Guide for Policy Analysis,37 Eugene Bardach challenges the “best practice” concept. In...place of best practices, Bardach argues that a more suitable term would be “smart practices.” Bardach defines smart practices as adding value to an

  17. Homeland Security: Unmanned Aerial Vehicles and Border Surveillance

    National Research Council Canada - National Science Library

    Bolkcom, Christopher; Nunez-Neto, Blas

    2008-01-01

    .... Between POE, the United States Border Patrol (USBP) is charged with detecting and preventing the entry of terrorists, weapons of mass destruction, and unauthorized aliens into the country, and interdicting drug smugglers and other criminals...

  18. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    Science.gov (United States)

    2012-03-01

    James Monroe in 1823 ( Martin , n.d.). There is also political doctrine, such as egalitarianism a “political doctrine that holds that all people...be able to engage a larger stakeholder community and avoid the need for a huge new bureaucracy (Linde, O’Brien, Lindstrom , Spiegeleire, Vayrynen...Presentation, Osan Air Force Base, South Korea. 74 Linde, E., O’Brien, K., Lindstrom , G., Spiegeleire, S., Vayrynen, M., & de Vries, H. (2002

  19. Congressional Oversight of Homeland Security: Help or Hinderance?

    Science.gov (United States)

    2012-12-01

    207 These committees, however, were not an innovation of the 1946 reorganization of Congress. Prior to 1946, the House and Senate had a Military...Eisenhower took office congressional critics were equally critical of his “New Look” defense strategy , which favored technology over manpower.214 For...1956, the SASC identified what they viewed as a duplication of efforts between the Army and the Air Force. The Army had sought to fund a Nike

  20. Quantifying a Negative: How Homeland Security Adds Value

    Science.gov (United States)

    2015-12-01

    every way possible. My deepest gratitude goes to my wife, Lisa, the most beautiful woman I have ever laid my eyes on. But her appearance pales in...responses in a regional economy. For example, if a city builds a sports arena, REIM can estimate the new development’s effect on income, employment, and

  1. Homeland Security: There’s an App for That

    Science.gov (United States)

    2017-03-01

    the popularity of legitimate games (in this case, the legitimate app -based game Pokémon Go) take advantage of uninformed users through “scareware...THERE’S AN APP FOR THAT by Christopher Michael DeMaise March 2017 Thesis Advisor: Rodrigo Nieto-Gomez Second Reader: David O’Keeffe...

  2. Membrane Inlet Mass Spectrometry for Homeland Security and Forensic Applications

    Science.gov (United States)

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; France, Neil

    2015-02-01

    A man-portable membrane inlet mass spectrometer has been built and tested to detect and monitor characteristic odors emitted from the human body and also from threat substances. In each case, a heated membrane sampling probe was used. During human scent monitoring experiments, data were obtained for inorganic gases and volatile organic compounds emitted from human breath and sweat in a confined space. Volatile emissions were detected from the human body at low ppb concentrations. Experiments with compounds associated with narcotics, explosives, and chemical warfare agents were conducted for a range of membrane types. Test compounds included methyl benzoate (odor signature of cocaine), piperidine (precursor in clandestine phencyclidine manufacturing processes), 2-nitrotoluene (breakdown product of TNT), cyclohexanone (volatile signature of plastic explosives), dimethyl methylphosphonate (used in sarin and soman nerve agent production), and 2-chloroethyl ethyl sulfide (simulant compound for sulfur mustard gas). Gas phase calibration experiments were performed allowing sub-ppb LOD to be established. The results showed excellent linearity versus concentration and rapid membrane response times.

  3. Leveraging Social Media to Engage the Public in Homeland Security

    Science.gov (United States)

    2009-09-01

    computer whirs quietly in one corner and software manuals, spiritual texts and books of political philosophy line the shelves. But a closer look...so that they can define their needs.  You need to get to “Robust Statement of Needs” 84 Enablers  New Generation (The Millennials ) are...Enablers  New Generation (The Millennials ) are “growing up online.”  Politics  Mechanism for confluence of interest  Engaged and passionate

  4. Homeland Security Organizations: Design Contingencies in Complex Environments

    Science.gov (United States)

    2011-09-01

    when a Newtonian, linear, and mechanized approach was the contemporary paradigm . The “machine” was the metaphor that shaped organizational design...1994). Managing chaos and complexity in government: A new paradigm for managing change, innovation, and organizational renewal. San Francisco, CA... humanistic approaches. In J. G. March (Ed.), Handbook of organizations (pp. 1144–1170). Chicago, IL: Rand-McNally. Leavitt, H. J. (2005). Top down: Why

  5. Safety Risk Management for Homeland Defense and Security Responders

    National Research Council Canada - National Science Library

    Meyers, Tommey H

    2005-01-01

    .... Coast Guard and the U.S. Navy. This revealed that Operational Risk Management (ORM), a risk-based decision-making tool that systematically balances risk and mission completion, and Crew Resource Management (CRM...

  6. Enhancing Public Helicopter Safety as a Component of Homeland Security

    Science.gov (United States)

    2016-12-01

    flight rules 2. Crew endurance (pilot rest) 3. Pre-flight risk assessments Each of these risk categories are codes used to analyze the three ...FLIGHT RULES RATING A factor in all three helicopter crashes studied in this thesis was inclement weather. To prevent future accidents due to poor...13 E. ACCIDENT REPORTS ................................................................. 16 1. Overview of the New Mexico

  7. Interagency collaboration challenges among homeland security disciplines in urban areas

    OpenAIRE

    Hagen, Jerome D.

    2006-01-01

    CHDS State/Local First responders have struggled to incorporate strategic direction provided by the federal government into their existing plans. An urgent call for teamwork and cooperation has changed the landscape for America's first responders. They have been required to shoulder new responsibilities and become more networked and interactive with their peer disciplines to achieve higher levels of performance and response capability. This thesis examines interactions among four key homel...

  8. Does Homeland Security Constitute an Emerging Academic Discipline?

    Science.gov (United States)

    2013-03-01

    disciplines that make it easy for them to find a job and receive good pay. 7. Entrepreneurs will enter and firms will expand in sectors that promise to be...industry-government triad and the societal influences that impact that ecosystem . As the components of the framework are evaluated on their own respective

  9. Homeland Security and the Private Sector : a CBO Paper

    Science.gov (United States)

    2004-12-01

    meat products for E. coli and salmonella , but it does not routinely test food supplies for contamination from anthrax or ricin. Records are kept on...deadly pathogens an- thrax and botulism are considered the greatest dangers. Next are salmonella , pathogenic strains of E. coli, and ri- C HAP TER 1...requires that outbreaks of many diseases (whether in plants and animals or in the human popula- tion) be reported. As a result, it is likely that an

  10. The Italian Army’s Role in Homeland Security

    Science.gov (United States)

    2003-04-07

    1 (11 Luglio 1978). 7 Martin Rance and Emanuele Rossi, “Note sul terrorismo rosso;” available from http://www.geocities.com/Athens/Olympus/1997...1o Aprile 1981). 32 Rance, Martin and Emanuele Rossi. “Note sul terrorismo rosso.” Available from http://www.geocities.com/Athens/Olympus/1997/memhis1

  11. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    fifth grade. Fire Prevention Week classroom kits are created through the NFPA for both teachers and students to teach and reinforce fire safety...limitations on available classroom time and financial resources, as well as state educational requirements. Government at all levels, along with organizations...with broad and diversified groups of community stakeholders, which include schools, faith- based groups, businesses, neighborhood associations, trade

  12. Volunteer Military Forces Provide Homeland Security Around the World

    Science.gov (United States)

    2007-01-01

    volunteer force plays an important part in advancing public recognition of Canada’s First Nations and Inuit groups. Currently there are 4,000 Rangers in...traditional skills – which are uniquely defined according to the cultural and historical practices in the local community. Periodic maintenance

  13. Expanding the Role of Emergency Medical Services in Homeland Security

    Science.gov (United States)

    2013-03-01

    iii+52 Pp. (Oct 2011). 40 Robert Berne , Emergency Medical Services: The Forgotten First Responder (New York City, NY: New York University, Center...responders do not have the training or skills to identify chemical, biological, bomb , or other terrorist tools or tactics, we will not know if any...and mortality. An example of this would be where a paramedic would report identifying bomb making materials, since it could be associated with

  14. Will Climate Change the Future of Homeland Security

    Science.gov (United States)

    2016-09-01

    support and encouragement of my advisor, Glen Woodbury, and co-advisor, Christopher Bellavita. Their belief in the importance of this topic kept me...Jane Bullock. I am forever indebted to the Walker and Hamilton Bank and Trust for their financial support and to my classmates who never lost faith...Government Dataset. Climate Central (www.climatecentral.org) is the website run by an independent organization of scientists and journalists involved with

  15. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... HSAR 3002.101 and usage conventions. Add a new HSAR subpart 3003.10, Contractor Code of Business Ethics... follows: Subpart 3003.10--Contractor Code of Business Ethics and Conduct Sec. 3003.1003 Requirements. 3003.1004 Contract clauses. Subpart 3003.10--Contractor Code of Business Ethics and Conduct 3003.1003...

  16. Future Role of Fire Service in Homeland Security

    Science.gov (United States)

    2008-09-01

    conflicting protocols , missions, plans, and procedures were quickly revised and implemented. Joint procedures and memorandums of understandings were...Kelvin J. Cochran, (2006). “Management and Leadership in the Fire Service.” In John M. Buckman , III (Ed.). Chief Fire Officers Desk Reference (p.16

  17. Strengthening Homeland Security through Improved Foreign Language Capability

    Science.gov (United States)

    2011-12-01

    special agent who was shot during a botched drug -bust. In this case, an undercover ICE agent was conducting a meeting with two Colombian drug dealers...States in the twenty-first century,‖ Language in the Twenty-First Century: Selected Papers of the Millennial Conference of the Center for Research...United States in the twenty- first Century.‖ In Language in the Twenty-First Century: Selected Papers of the Millennial Conference of the Center for

  18. Military Unmanned Aircraft Systems in Support of Homeland Security

    Science.gov (United States)

    2007-03-30

    The head of the US Army’s UAS project management office , Colonel Don Hazelwood is calling for a more phased approach to the development of UAS access...initiate the policy changes have started with the establishment of FAA UAS Project Management Office , an FAA office fully focused on integrating UASs

  19. Beating the red gold rush: copper theft and homeland security

    OpenAIRE

    Cook, James A.

    2015-01-01

    Approved for public release; distribution is unlimited This thesis is a comparative case study comparing and contrasting the efforts of three countries (United Kingdom, France, Italy) in their fight to reduce copper wire theft incidents within their nations. The ultimate goal of the research is to highlight the significant threat posed to critical infrastructure from copper thieves and to offer best practice recommendations to policymakers within theUnited States in response, based on the ...

  20. Improving Information Exchange and Coordination Amongst Homeland Security Organizations

    National Research Council Canada - National Science Library

    Goan, Terrance; Mayk, Israel

    2005-01-01

    ... events that involve dozens of local, state, and Federal organizations. In this paper we describe progress made in the development of new information access services that provide for improved situation awareness...

  1. 7 CFR 2.32 - Director, Office of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ..., disseminate and store USDA intelligence requirements and convey information to the intelligence community. (3...). (8) Administer a competitive grant program to support the development and expansion of advanced... veterinarians; administer a competitive grant and low-interest loan assistance program to assist States in...

  2. The National Guard: A Future Homeland Security Paradigm?

    Science.gov (United States)

    2002-05-14

    Next, the CD Public Affairs Officer (PAO) practices “real world” military PAO skills everyday, including OPSEC, media (print, news, TV), photojournalism ...emergencies, authorized law enforcement activities, environmental (Hazmat, CBRNE, and WMD), and community assistance/support § Linguist (Translator

  3. Japan as a Paradigm for U.S. Homeland Security

    Science.gov (United States)

    2006-12-01

    hostages, the JRA demanded the release of nine JRA prisoners in Japan and a $6 million ransom.111 The then Japanese Prime Minister, Takeo Fukuda ...Aum Shinrikyo still operates in Japan, but has changed its name to Aleph and removed doctrines that justified using murder.139

  4. Department of Homeland Security Cyber Resilience Review (Case Study)

    Science.gov (United States)

    2014-01-23

    IL2 IL3 IL4...IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL1 IL2 G1 G2 G3 G4 IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL1 IL2 G1 G2 G3 IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL4 IL1 IL2 IL3...IL1 IL2 G1 G2 G3 G4 IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL1 IL2 G1 G2 G3 G4 G5 IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL4 IL1 IL2 IL3 IL1 IL2 G1 G2

  5. Safety Risk Management for Homeland Defense and Security Responders

    National Research Council Canada - National Science Library

    Meyers, Tommey H

    2005-01-01

    ...) report on responder safety, this thesis explores the issues associated with creating a safety risk management capability that will enable HLDS responders to better protect themselves from harm...

  6. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    institutions because it appears that the medical industry, political mechanisms, and institutions work simply to maintain the inertia of the dogma and not...of normal dietary patterns and sleep that is associated with shift work.6768 Researchers from Boston University School of Medicine (BUSM), Boston...Obesity also exacerbates sleep apnea and may lead to more clinical depression. Obesity has become and will continue to be a national and international

  7. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    Press, and My Years in the White House (2005), by Ari Fleisher, and Lipstick on a Pig (2008) by Torie Clarke. Despite their political focus, these...November 12, 2010, from http://www.colorado.edu/hazards/resources/socy4037/Panic_Myth%20or%20Real ity.pdf Clarke, T. (2006). Lipstick on a pig

  8. Homeland Security Strategic Research Action Plan 2016-2019

    Science.gov (United States)

    This is a four-year research strategy designed to meet the following objectives:Improve water utilities’ abilities to prepare for and respond to incidents that threaten public health; andAdvance EPA’s capabilities to respond to wide-area contamination

  9. The Affordable Care Act: A Prescription for Homeland Security Preparedness?

    Science.gov (United States)

    2014-09-01

    vaccination program: In 2000, Ontario, Canada implemented a universal influenza immunization program and provided free flu vaccines to the entire...is health.” But maintaining our health often requires professional assistance or medical intervention. For the vast majority of United States...residents, health care is an inevitability. In 2010 alone, 80 percent of U.S. adults saw a health care professional at least once during the year,1 and

  10. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Kimberly A. [Georgia Inst. of Technology, Atlanta, GA (United States)

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

  11. The Fire Service’s Role in Maritime Homeland Security

    Science.gov (United States)

    2011-03-01

    DEFENSE) from the NAVAL POSTGRADUATE SCHOOL Month Year Author: Paul S. Foerster Approved by: Nadov Marag Thesis Co-Advisor...become the warehouses for the just in time retailers and manufacturers , our store shelves would quickly go bare and our factories would be idled.”6... addition , opinions were sought on fire department roles in protection and prevention, response capabilities, interaction and interoperability with

  12. The Homeland Security Enterprise: Where Do We Fit?

    Science.gov (United States)

    2009-09-01

    essence of a thing, whether it be a point of doctrine, of practice, or of interpretation. Marcus Aurelius (121–180) Two hundred years after the...and what they cleave to. Marcus Aurelius (121-180) A. RESEARCH SCOPE It is widely accepted that protecting the American people is a responsibility... Marcus Aurelius ]. Retrieved April 27, 2009, from http://www.bartleby.com/100/718.39.html 106 John Bartlett (1820–1905). Familiar Quotations, 10th

  13. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must meet the following standards: (1) Address each vulnerability identified in the facility's Security...

  14. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...

  15. 49 CFR 1544.225 - Security of aircraft and facilities.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.225 Security of aircraft and facilities. Each... 49 Transportation 9 2010-10-01 2010-10-01 false Security of aircraft and facilities. 1544.225...

  16. 49 CFR 1544.233 - Security coordinators and crewmembers, training.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.233 Security coordinators and crewmembers... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators and crewmembers, training...

  17. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  18. A systems science perspective and transdisciplinary models for food and nutrition security.

    Science.gov (United States)

    Hammond, Ross A; Dubé, Laurette

    2012-07-31

    We argue that food and nutrition security is driven by complex underlying systems and that both research and policy in this area would benefit from a systems approach. We present a framework for such an approach, examine key underlying systems, and identify transdisciplinary modeling tools that may prove especially useful.

  19. The DETER Project: Advancing the Science of Cyber Security Experimentation and Test

    Science.gov (United States)

    2010-11-10

    such use. DETER is currently setting up a Moodle [5] server, slated to be made public in Fall 2010, that will host educational content and facilitate...Security Research,” in Proceedings of Tridentcom, March 2006. [4] Emulab Testbed Web page, http://www.emulab.net [5] Moodle Course Management Tool

  20. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  1. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ....235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The...

  2. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessment. 1540.203 Section 1540.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES...

  3. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  4. 49 CFR 1546.105 - Acceptance of and amendments to the security program.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.105 Acceptance of and amendments to the security program. (a... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance of and amendments to the security...

  5. 49 CFR 1546.103 - Form, content, and availability of security program.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a... 49 Transportation 9 2010-10-01 2010-10-01 false Form, content, and availability of security...

  6. Complexity Science: A Mechanism for Strategic Foresight and Resiliency in National Security Decision-Making.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hayden, Nancy Kay [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Most national policy decisions are complex with a variety of stakeholders, disparate interests and the potential for unintended consequences. While a number of analytical tools exist to help decision makers sort through the mountains of data and myriad of options, decision support teams are increasingly turning to complexity science for improved analysis and better insight into the potential impact of policy decisions. While complexity science has great potential, it has only proven useful in limited case s and when properly applied. In advance of more widespread use, a national - level effort to refine complexity science and more rigorously establish its technical underpinnings is recommended.

  7. PREFACE: 2014 Joint IMEKO TC1-TC7-TC13 Symposium: Measurement Science Behind Safety and Security

    Science.gov (United States)

    Sousa, João A.; Ribeiro, Álvaro S.; Filipe, Eduarda

    2015-02-01

    The 2014 Joint IMEKO (International Measurement Confederation) TC1-TC7-TC13 Symposium was organized by RELACRE - Portuguese Association of Accredited Laboratories and the Portuguese Society for Metrology, on 3-5 September 2014. The work of this symposium is reported in this volume. The scope of the symposium includes the main topics covered by the above Technical Committees: - TC1 Education and Training in measurement and Instrumentation - TC7 Measurement Science - TC13 Measurements in Biology and Medicine The effort towards excellence of previous events, in this well established series, is maintained. There has been a special focus on measurement science behind safety and security, with the aim of highlighting the interdisciplinary character of measurement science and the importance of metrology in our daily lives. The discussion was introduced by keynote lectures on measurement challenges in biometrics, health monitoring and social sciences, to promote useful interactions with scientists from different disciplines. The Symposium was attended by experts working in these areas from 18 countries, including USA, Japan and China, and provided a useful forum for them to share and exchange their work and ideas. In total over fifty papers are included in the volume, organized according to the presentation sessions. Each paper was independently peer-reviewed by two reviewers from a distinguished international panel. The Symposium was held in Funchal, capital of Madeira Islands, known as the Atlantic Pearl. This wonderful Atlantic archipelago, formed by Madeira and Porto Santo islands, discovered in the 14th century, was chosen to host the 2014 IMEKO TC1-TC7-TC13 Joint Symposium ''Measurement Science behind Safety and Security''. It was the first territory discovered by the Portuguese sailors, when set out to discover a new world, in an epic journey where instrumentation and quality of measurement played a central role in the success of the enterprise, and gave an

  8. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... Doc No: 2010-32709] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  9. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    Science.gov (United States)

    2017-03-28

    www.pewclimate.org/ global - warming -in-depth/all_reports/adaptation. 28. Joel B. Smith et al., Adapting to Climate Change: A Call for Federal Leadership (Pew Center...MosT concern, noW and ahead Security to Extremes in Climate Although the exact predictions about global warming have recently been called into... climate has previously undergone warming and cooling periods (figure 3), although the global extent of these temperature swings is unclear, as

  10. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    modeling and simulation tools, leveraging existing commercial innovations and technologies, and using open system architectures , frameworks, and... landscape of national security technology concerns in the 21st century. The Strategy is informed by the central premise of the President’s 2015 National...opportunities of the 21st century, there is significant diversity of statutory mission authorities, and structural models and operational authorities, among

  11. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  12. How Academies use science to enhance global security and well-being.

    Science.gov (United States)

    Boright, John

    2017-01-01

    Science academies were originally created to facilitate science communication and later to recognize excellence. But in the last 20 years some 150 academies of science, engineering,and medicine around the world have united to cooperate in contributing to human welfare, by: 1. Providing evidence-based inputs to national, regional, and global policies addressing human needs, and 2. Conducting cooperative programs to increase the capacity of academies to provide such advice, and to better connect academies to publics and to policy makers. Examples: At the global level, 112 academies of science produce brief common statements on major global issues. They have also created an organization to provide in-depth reports on major issues such as a transition to sustainable energy systems, boosting agricultural productivity in Africa, and a guide to responsible conduct in the global research enterprise. Regional networks of those academies, in Africa, the Americas, Asia, and Europe conduct program on topics such as water, energy, engagement of women in science, and science education. They also help and mentor new academies.

  13. Homeland defense: looking back, moving forward

    Science.gov (United States)

    Quine, Dennis H.

    2002-07-01

    A concern for homeland defense has been with us since the inception of the Republic. However, it has changed in focus and emphasis depending on the nature of the threat we perceived. In the earliest decades the threat was from invasion by a Britain that still did not accept the results of the Revolutionary War. Later the focus shifted to concern about possible attack by ships, and during WW I and WW II, by submarines. With the advent of the intercontinental nuclear-armed bomber in 1950, our focus changed again. When we could be attacked by ballistic missiles after 1960, our concern focused on that threat. Now that we have seen that damaging attacks can be brought to the homeland 'under the radar screen', by terrorist operations, the focus has shifted again. We are now entering an era when we must address potential homeland attacks with weapons of mass destruction (WMD) that may be delivered by a range of means, depending on the source of the attack. In response to this full spectrum of attack modes, the U.S. has implemented a three-stage defense policy that integrates overseas 'offense' and homeland 'defense'. This framework for defense analysis and planning is likely to be with us into the indefinite future.

  14. 19 CFR 19.47 - Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  15. 76 FR 76981 - Request for Public Comments Concerning U.S.-Canada Action Plan for Perimeter Security and...

    Science.gov (United States)

    2011-12-09

    ... SECURITY Request for Public Comments Concerning U.S.-Canada Action Plan for Perimeter Security and Economic... of Homeland Security (DHS), on behalf of the Administration, is seeking public input on the Beyond..., U.S. Department of Homeland Security, Mailstop 0455, Washington, DC 20016. The public is strongly...

  16. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    Science.gov (United States)

    2015-05-14

    Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs Report Documentation Page Form... fairness of personnel security in the DoD In the wake of events like 9-11, Ft. Hood, and the Washington Navy Yard shootings, we expanded our

  17. Protecting environment, national security, and health, earth and environment sciences 1996 annual report

    Energy Technology Data Exchange (ETDEWEB)

    Davis, J.C.; Younker, L.; Proctor, I.; Bannevik, B.; Layton, D.; Jackson, K.; Hannon, J.

    1996-01-01

    In 1994, Lawrence Livermore National Laboratory established a new directorate, called Environmental Program, to form one organization combining most of the Laboratory`s capabilities in the geosciences and ecological sciences with its supporting technologies in analytical areas such as molecular, radiation, and particle spectrometry; high-pressure physics; and bioscience applied to bioremediation. Current areas of research include atmospheric radiative transfer, chemistry, dynamics, and climate processes; physics of the atmospheric boundary layer and cloud processes; seismic processes; geochemistry and geophysics; pathway, dosimetry, and risk analysis of radioactive and toxic substances; isotopic and ion-beam sciences; modeling of subsurface flow and transport; subsurface imaging and characterization; in situ environmental remediation using natural and engineered processes; and design, analysis, and testing of advanced waste-treatment technologies.

  18. Global Security Scan for Canadian Science Capabilities (2015-2020): Report of Proceedings

    Science.gov (United States)

    2008-03-01

    Fuel Crisis? Lord John Brown, BP Richard Branson , Virgin Fuels You and Me? Your local Farmer? Veg Oil + Alcohol = Instant Bio... leadership roles in partnering for the future protection of critical infrastructure through research and innovation. 4) Science, including technology and...capacity to mitigate the effects of these and other threats. Leadership in a number of these areas must come from the Public Safety community as market

  19. United States Preparedness to Respond to a Mumbai-Style Attack within the Homeland

    Science.gov (United States)

    2010-02-17

    The exercise scenario began on a weekend midsummer night when ten al-Qaida operatives notionally entered Chicago after dark via maritime...when dealing with hostage-taking scenarios . According to NYPD Commissioner Kelly in an open session of the Homeland Security and Governmental Affairs...Metro Cinema – a famous Metro-Goldwyn-Mayer (MGM) theater 7 Navy Department Library, “Riverine Warfare: The U.S. Navy‟s Operations on Inland

  20. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-02-01

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide and the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the

  1. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Science.gov (United States)

    2010-10-01

    ... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.11 Training and knowledge for individuals with security...

  2. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the air operations area (AOA). 1542...

  3. Scalable, Secure Analysis of Social Sciences Data on the Azure Platform

    Energy Technology Data Exchange (ETDEWEB)

    Simmhan, Yogesh; Deng, Litao; Kumbhare, Alok; Redekopp, Mark; Prasanna, Viktor

    2012-05-07

    Human activity and interaction data is beginning to be collected at population scales through the pervasiveness of social media and willingness of people to volunteer information. This can allow social science researchers to understand and model human behavior with better accuracy and prediction power. Political and social scientists are starting to correlate such large scale social media datasets with events that impact society as evidence abound of the virtual and physical public spaces intersecting and influencing each other [1,2]. Managers of Cyber Physical Systems such as Smart Power Grid utilities are investigating the impact of consumer behavior on power consumption, and the possibility of influencing the usage profile [3]. Data collection is also made easier through technology such as mobile apps, social media sites and search engines that directly collect data, and sensors such smart meters and room occupancy sensors that indirectly measure human activity. These technology platforms also provide a convenient framework for “human sensors” to record and broadcast data for behavioral studies, as a form of crowd sourced citizen science. This has the added advantage of engaging the broader public in STEM activities and help influence public policy.

  4. 49 CFR 1540.209 - Fees for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY... accepted accounting principles and practices, and calculated in accordance with the provisions of 31 U.S.C. 9701 and other applicable Federal law. (2) TSA will publish fee amounts and any revisions to the fee...

  5. Homeland Security Within State Departments of Agriculture: Success Factors and Barriers to an Effective Security Program

    Science.gov (United States)

    2010-09-01

    2006). Bardach , E. (1998). Getting agencies to work together: The practice and theory of managerial craftsmanship. Washington, D.C.: Brookings...Institution Press. Bardach , E. (2008). A practical guide for policy analysis. Berkeley: CQ Press. Bea, K. (2005). The national preparedness system

  6. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    grown in-house to contaminate pastries served to 45 co-workers 12 ill, 4 hospitalizations Slide credit: IFT Threat as a Weapon 1989: Chile ...Virus Poliovirus Type 1 Rotavirus SA-11 SARS coronavirus Brucella abortus Enterobacter aerogenes Enterococcus faecalis Erwinia herbicola Francisella

  7. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    Robideaux and George C. Jackson, The U.S.-Canada Border: Cost Impacts, Causes, and Short to Long Term Management Options (n.p.: May 21, 2003), 7. 6 HLB ...Transportation Infrastructure and the Border Economy (n.p.: June 2001), 4. 11 HDR/ HLB Decision Economics Inc., Economic Impacts of Wait Times at the...HDR/ HLB Decision Economics study suggested that the post 9/11 wait times at the San Diego-Baja border are costing each country in excess of $6

  8. Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense

    Science.gov (United States)

    2012-09-01

    drugs in the U.S. According to the Justice Department assessment, the seven leading Mexican-based TCOs are the Sinaloa cartel, Los Zetas, the Gulf...The Sinaloa cartel controls almost one-half of the drug trade in Mexico.33 Led by Joaquin “El Chapo” Guzman, the cartel is organized into a...federation of smaller organizations, which makes it difficult to dismantle. Controlling most of the west coast of Mexico, the Sinaloa cartel mainly crosses

  9. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    strengthening of transnational criminal organizations.27 Other major weather events, such as hurricanes and tornados , are also prominently...foundation for the 15 national planning scenarios and five overarching mission areas.79 The mission areas were sub- categorized into a 578 page Target...injured casualties.269 This is further broken down into sub- categorizes of the triage classification of those patients. The plan even includes an

  10. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    component. “In some localities disaster management was a political football fought over by police and firefighters, both of whom wanted primary...between local, state, and federal leaders during Hurricane Katrina were televised around the world. The slow federal response was attributed to who is in...After the bombing suspects had eluded apprehension, a revisit of the crime scene via close circuit television camera revealed troubling images. It

  11. 49 CFR 1548.16 - Security threat assessments for each proprietor, general partner, officer, director, and certain...

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.16 Security... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for each proprietor...

  12. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Science.gov (United States)

    2010-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...

  13. CHARGE 3: POTENTIAL SAFETY AND SECURITY ADVANTAGES, IF ANY, OF DIFFERENT DRY CASK STORAGE DESIGNS

    National Research Council Canada - National Science Library

    2006-01-01

    In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study to assess the safety and security risks of spent...

  14. Safety and security of commercial spent nuclear fuel storage: public report

    National Research Council Canada - National Science Library

    Board on Radioactive Waste Management; Division on Earth and Life Studies; National Research Council; National Research Council; National Academy of Sciences

    2006-01-01

    In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study to assess the safety and security risks of spent...

  15. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  16. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  17. 49 CFR 1540.301 - Withdrawal of approval of a security program.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION... withdrawal. If TSA finds that there is an emergency with respect to aviation security requiring immediate... 49 Transportation 9 2010-10-01 2010-10-01 false Withdrawal of approval of a security program. 1540...

  18. Using Automatic Identification System Technology to Improve Maritime Border Security

    Science.gov (United States)

    2014-12-01

    System xiii POE port of entry QHSR Quadrennial Homeland Security Review RCMP Royal Canadian Mounted Police RFID radio frequency identification...IDENTIFICATION SYSTEM TECHNOLOGY TO IMPROVE MARITIME BORDER SECURITY by Tedric R. Lindstrom December 2014 Thesis Advisor: Robert Simeral... SECURITY 5. FUNDING NUMBERS 6. AUTHOR(S) Tedric R. Lindstrom 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey

  19. 19 CFR 122.181 - Definition of Customs security area.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  20. 49 CFR 1580.201 - Rail security coordinator.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Rail security coordinator. 1580.201 Section 1580... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION..., including heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular...

  1. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  2. Primer Control System Cyber Security Framework and Technical Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  3. Evaluating Novel Threats to the Homeland. Unmanned Aerial Vehicles and Cruise Missiles

    Science.gov (United States)

    2008-01-01

    ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE...intelligence, foren - sic capabilities, efforts at prelaunch engagement, and nonproliferation are examples of strategies for which investments provide, or at...Analyst in National Defense Congressional Research Service, Before the Senate Governmental Affairs Committee, Subcommittee on International Security

  4. The Security and Defense of America's Ports: An Assessment of Coast Guard and Navy Roles, Capabilities and Synchronization

    National Research Council Canada - National Science Library

    Richardt, Timothy P

    2006-01-01

    .... The United States must thus act to increase security for seaborne commerce and create depth of enforcement through the assets of the Department of Homeland Security and the Department of Defense...

  5. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Science.gov (United States)

    2010-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.213 Access to cargo... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...

  6. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability an...

  7. Control Systems Security Test Center - FY 2004 Program Summary

    Energy Technology Data Exchange (ETDEWEB)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  8. Consequence Management in the Homeland, What Does Right Look Like

    Science.gov (United States)

    2010-03-01

    also provide a force to assist in the consequence management from a successful WMD attack. There are many issues to this debate that must be...St ra te gy R es ea rc h Pr oj ec t CONSEQUENCE MANAGEMENT IN THE HOMELAND, WHAT DOES RIGHT LOOK LIKE? BY COLONEL WILLIAM THOMAS...Consequence Management in the Homeland, What Does Right Look Like? 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) William

  9. Enemies within: Christian Extremism, a Threat to the Homeland

    Science.gov (United States)

    2016-06-10

    those within the homeland that threaten the very liberty and freedom intended by the founding fathers for all Americans. This thesis and many more...homeland that threaten the very liberty and freedom intended by the founding fathers for all Americans. This thesis and many more studies like it, is...freedom of Americans are protected. v ACKNOWLEDGMENTS I would like to first thank my daughter Saadya, for her patience and support. Her name means

  10. India-United States cooperation on science and technology for countering terrorism: summary of a workshop

    National Research Council Canada - National Science Library

    Guenther, Rita S; Lowenthal, Micah; Sundaresan, Lalitha

    2014-01-01

    .... workshop to identify and examine potential areas for substantive scientific and technical cooperation that can support counterterrorism efforts through the Homeland Security Dialogue and through direct cooperation...

  11. How to Fund Homeland Security without Federal Dollars: State and Local Funding of Homeland Security Initiatives in Light of Decreased Support by the Federal Government

    National Research Council Canada - National Science Library

    Emler, Jay S

    2008-01-01

    ..., sales taxes, congestion fees and multi-year budgeting with the addition of a "rainy day" fund, to less conventional options like public/private partnerships and innovative investment strategies...

  12. Highway Security: Filling the Void

    Science.gov (United States)

    2011-09-01

    to express my gratitude to Major George Daniels and Lieutenants F. Danny Glick , James De Ford, Sr. and Steve Hawkins of the Virginia State Police...Homeland Security Affairs 1, no. 1. http://www.hsaj.org/?fullarticle=1.1.4 Esposito, R., Ross, B., Thomas , P. (May 4, 2010). Faisal Shahzad...pdf 70 Jenkins, B., and Gersten, L . (September 2001). Protecting Public Surface Transportation Against Terrorism and Serious Crime: Continuing

  13. Computer Security: Competing Concepts

    OpenAIRE

    Nissenbaum, Helen; Friedman, Batya; Felten, Edward

    2001-01-01

    This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing systems (in particular, Mozilla) so that values relevant to web-browser systems are better served than presently they are. The tension, which ...

  14. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  15. Science & Technology Review May 2006

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide III, M B

    2006-04-03

    This month's issue has the following articles: (1) Science and Technology Help the Nation Counter Terrorism--Commentary by Raymond J. Juzaitis; (2) Imagers Provide Eyes to See Gamma Rays--Gamma-ray imagers provide increased radiation detection capabilities and enhance the nation's arsenal for homeland security; (3) Protecting the Nation's Livestock--Foot-and-mouth disease could devastate America's livestock; a new assay provides a rapid means to detect it; (4) Measures for Measures--Laboratory physicists combine emissivity and reflectivity to achieve highly accurate temperature measurements of metal foils; and (5) Looping through the Lamb Shift--Livermore scientists measured a small perturbation in the spectra of highly ionized uranium--the first measurement of the two-loop Lamb shift in a bound state.

  16. U.S. Geological Survey natural hazards science strategy: promoting the safety, security, and economic well-being of the Nation

    Science.gov (United States)

    Holmes, Robert R.; Jones, Lucile M.; Eidenshink, Jeffery C.; Godt, Jonathan W.; Kirby, Stephen H.; Love, Jeffrey J.; Neal, Christina A.; Plant, Nathaniel G.; Plunkett, Michael L.; Weaver, Craig S.; Wein, Anne; Perry, Suzanne C.

    2013-01-01

    The mission of the U.S. Geological Survey (USGS) in natural hazards is to develop and apply hazard science to help protect the safety, security, and economic well-being of the Nation. The costs and consequences of natural hazards can be enormous, and each year more people and infrastructure are at risk. USGS scientific research—founded on detailed observations and improved understanding of the responsible physical processes—can help to understand and reduce natural hazard risks and to make and effectively communicate reliable statements about hazard characteristics, such as frequency, magnitude, extent, onset, consequences, and where possible, the time of future events. To accomplish its broad hazard mission, the USGS maintains an expert workforce of scientists and technicians in the earth sciences, hydrology, biology, geography, social and behavioral sciences, and other fields, and engages cooperatively with numerous agencies, research institutions, and organizations in the public and private sectors, across the Nation and around the world. The scientific expertise required to accomplish the USGS mission in natural hazards includes a wide range of disciplines that this report refers to, in aggregate, as hazard science. In October 2010, the Natural Hazards Science Strategy Planning Team (H–SSPT) was charged with developing a long-term (10–year) Science Strategy for the USGS mission in natural hazards. This report fulfills that charge, with a document hereinafter referred to as the Strategy, to provide scientific observations, analyses, and research that are critical for the Nation to become more resilient to natural hazards. Science provides the information that decisionmakers need to determine whether risk management activities are worthwhile. Moreover, as the agency with the perspective of geologic time, the USGS is uniquely positioned to extend the collective experience of society to prepare for events outside current memory. The USGS has critical

  17. Science for the 21st Century

    Energy Technology Data Exchange (ETDEWEB)

    2004-07-01

    The Federal government plays a key role in supporting the country's science infrastructure, a national treasure, and scientific research, an investment in our future. Scientific discoveries transform the way we think about our universe and ourselves, from the vastness of space to molecular-level biology. In innovations such as drugs derived through biotechnology and new communications technologies we see constant evidence of the power of science to improve lives and address national challenges. We had not yet learned to fly at the dawn of the 20th century, and could not have imagined the amazing 20th century inventions that we now take for granted. As we move into the 21st century, we eagerly anticipate new insights, discoveries, and technologies that will inspire and enrich us for many decades to come. This report presents the critical responsibilities of our Federal science enterprise and the actions taken by the Federal research agencies, through the National Science and Technology Council, to align our programs with scientific opportunity and with national needs. The many examples show how our science enterprise has responded to the President's priorities for homeland and national security, economic growth, health research, and the environment. In addition, we show how the science agencies work together to set priorities; coordinate related research programs; leverage investments to promote discovery, translate science into national benefits, and sustain the national research enterprise; and promote excellence in math and science education and work force development.

  18. Outline of changes in cortisol and melatonin circadian rhythms in the security guards of Shiraz University of Medical Sciences, Shiraz, Iran

    Directory of Open Access Journals (Sweden)

    2012-09-01

    Full Text Available Introduction: According to the literature, a large number of people working in industries and service providing personnel, such as firefighters, physicians, and nurses, are shift workers. The spread of shift working in industrial societies and the incidence of the problems resulting from shift working have caused the researchers to conduct studies on this issue. The present study also aimed to investigate melatonin and cortisol circadian rhythms in the security guards of Shiraz University of Medical Sciences, Shiraz, Iran. . Material and Method: The present study was conducted among 20 security guards of Shiraz University of Medical Sciences. In order to collect the required data, blood samples were taken from the participants in different times of the day (1, 4, 7, 10, 13, 16, 19, and 22 and cortisol and melatonin levels were determined using radioimmunoassay and enzyme immunoassay techniques, respectively. Then, the data were entered into the SPSS statistical software (v. 16.0 and analyzed using One-Way ANOVA. . Result: The results showed that as the intensity of light increased during night time, the level of plasma cortisol increased, as well. Besides, no statistically significant difference was found between the plasma cortisol levels in natural light and 4500-lux light. On the other hand, a significant difference was observed between the level of plasma cortisol in natural light and 9000-lux light as well as 4500- and 9000-lux lights. The study findings also showed that as the intensity of light increased at night, the level of plasma melatonin decreased. In addition, a statistically significant difference was found between the plasma melatonin levels in natural light and 4500-lux light. Nevertheless, no significant difference was observed between the plasma melatonin levels in natural light and 9000-lux light as well as 4500- and 9000-lux lights. .Conclusion: The present study aimed to investigate the subsequences of shift working in the

  19. 76 FR 70366 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-11-14

    ... benefits of enabling AN Agents to provide AN Purchasers' identity verification information directly to... FURTHER INFORMATION CONTACT: Ammonium Nitrate Security Program Manager, U.S. Department of Homeland... additional information on public meeting facilities, information on access to those facilities for...

  20. 33 CFR 106.135 - Alternative Security Program.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... facility; (b) The OCS facility does not serve vessels on international voyages; and (c) The Alternative...

  1. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  2. Food security as a social movement in neo-liberal times: Envisaging a role for social sciences

    DEFF Research Database (Denmark)

    Hiranandani, Vanmala Sunder

    2008-01-01

    Food is one of the vital elements of human existence and human health. The right to food is equivalent to the right to life. From production to consumption, food involves many important cultural, social, and economic activities of human societies. Yet, despite advances in science and technology......’ movements and government responses, and recommend priorities for social science research, policy development and social action....... is affected by food availability and affordability, which in turn, is largely influenced by the state of agriculture. The pivotal importance of agriculture in the fight against hunger and poverty lies in the fact that around 2.5 billion people in developing countries live in rural areas and are engaged...

  3. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Durling, Jr., R L; Price, D E; Spero, K K

    2005-01-03

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented.

  4. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  5. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Durling, R L; Price, D E; Spero, K K

    2005-06-06

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  6. Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management

    Energy Technology Data Exchange (ETDEWEB)

    Durling, Jr., R L; Price, D E

    2005-12-16

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  7. National Intelligence Estimate: The Terrorist Threat to the US Homeland

    National Research Council Canada - National Science Library

    2007-01-01

    .... Among the key judgments in this NIE are the following: the U.S. Homeland will face a persistent and evolving terrorist threat over the next 3 years, with the main threat coming from Islamic terrorist groups and cells, especially al-Qa'ida...

  8. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... information from chemical facilities that may reflect potential consequences of or vulnerabilities to a... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...

  9. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  10. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  11. 49 CFR 1572.15 - Procedures for HME security threat assessment.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY... TSA; (iii) Transmits the fingerprints to the FBI/Criminal Justice Information Services (CJIS), in... 1572.9. (2) Searches domestic and international Government databases described in 49 CFR 1572.105, 1572...

  12. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area...

  13. From School Militarization to School Securitization: National Security Finds Its Place in Schools

    Science.gov (United States)

    Nguyen, Nicole

    2017-01-01

    This ethnography explores daily life at Milton High School, a US public school with its own specialized Homeland Security program. From "military grunts" serving in distant theaters of war to Transportation Security Administration (TSA) agents defending the US borderlands to National Security Administration (NSA) technicians monitoring…

  14. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    Science.gov (United States)

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  15. Border Security Agency Structure: A Hindrance to Demonstrating Border Security Success

    Science.gov (United States)

    2013-12-01

    White House Security Office leader Ridge were all opposed to the creation of a new department and that “adept White House coordination and leadership...Homeland Security.” Ranking member Bennie G. Thompson was joined by Congressmen Zoe Lofgren, and 11 others (Thompson, 2005). The comments were not... Bennie G. Thompson, e. a. (July 14, 2005). Protecting America against terrorists:The case for a comphrehensive reorganization of the Department of

  16. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  17. The future of infrastructure security :

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  18. Group nightmares about escape from ex-homeland.

    Science.gov (United States)

    Cernovsky, Z

    1990-09-01

    Escape nightmares (recurrent nightmares about re-escaping ex-homeland) were studied via a 79-item questionnaire administered to 83 Czechoslovak refugees who were living in Switzerland. The key features of the nightmare were not related significantly to the refugees' age, gender, occupation, or educational level. Further analyses dealt with mutual relationships of the various reported aspects of the escape nightmares. The reports of dreaming about arrival in the ex-homeland by a "mistake," such as boarding a wrong airplane (i.e., a Freudian parapraxis), were associated with higher levels of (subsequent) dream anxiety, with waking up due to mounting dream tension, and with the dreamer not knowing at first upon awakening whether he was now in the free world or elsewhere.

  19. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  20. Ett komplext hemland : En kvalitativ studie av televisionsprogrammet Homeland

    OpenAIRE

    Andersson, Alexandra

    2013-01-01

    After 9/11 and the following War on Terror, Muslims are often understood as global enemies. However, the idea of an international, Islamic enemy is in some circumstances criticized, not least after the actions of Anders Behring Breivik in Norway in 2011. This study analyses the North American, Emmy Award-winning television series Homeland. It centres on the War on Terror and the following social and political climate, and there are opposing understandings regarding how religion and ethnicity...

  1. 78 FR 24669 - Reorganization of Regulations on the Adjudication of Department of Homeland Security Practitioner...

    Science.gov (United States)

    2013-04-26

    ... amended, transferred the functions of the former Immigration and Naturalization Service (INS) to DHS... costs or prices; or significant adverse effects on competition, employment, investment, productivity, innovation, or on the ability of United States-based companies to compete with foreign-based enterprises in...

  2. 75 FR 32676 - Revision of Department of Homeland Security Acquisition Regulation; Restrictions on Foreign...

    Science.gov (United States)

    2010-06-09

    ... individual officials based on the facts of the individual acquisition. Comment on Para-aramid Fibers--A... that are para-aramid fibers and yarns manufactured in qualifying countries, in a manner similar to exceptions granted by DoD. The commenter suggests DHS should determine if para-aramid fibers that are part of...

  3. 75 FR 8377 - Privacy Act of 1974; Department of Homeland Security Immigration and Customs Enforcement-007...

    Science.gov (United States)

    2010-02-24

    ...; with other agencies as needed to test information systems and technologies; with foreign governments..., coordination and de-confliction of investigative matters, to avoid duplicative or disruptive efforts, and for... organizations where DHS is aware of a need to utilize relevant data for purposes of testing new technology and...

  4. Recommendations for Homeland Security Organizational Approaches at the State Government Level

    National Research Council Canada - National Science Library

    Woodbury, Glen

    2004-01-01

    .... The federal government has required this role of states and has asked them to organize task forces to deal with these challenges but has provided little guidance about how states might establish...

  5. 76 FR 42004 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-07-18

    ... subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as...

  6. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ..., for the following reasons: (a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal...

  7. Of Nasa and Neanderthals, Elephants and Machines: Metaphors and the Conceptualization of Homeland Security

    Science.gov (United States)

    2013-12-01

    Genus Metaphor .........................................................................84 a. Challenges for the Genus Metaphor... technologies , etc., is critical to how the organization relates to the external world. • The varieties of organizations allow for a large array of choices in... violence , inherent in the concept of combat, whereas the notion of complacency is not commonly associated with violence . Therefore, the latter use of

  8. 2008 Homeland Security S and T Stakeholders Conference West volume 2 Monday

    Science.gov (United States)

    2008-01-16

    game space as that is the fastest growing segment of the current videogame industry . 27 Planning the DHS MMOG We propose to develop a plan and an...Training Session 13 IED Training for First Responders (LES) Incident Response to Terrorist Bombings 1 EMRTC, New Mexico Tech Training...Training for First Responders (LES) Incident Response to Terrorist Bombings 2 EMRTC, New Mexico Tech Training Workshop Track 7 Training

  9. The Crime-Terror Nexus and the Threat to U.S. Homeland Security

    Science.gov (United States)

    2015-12-01

    GAFE Airborne Special Forces Group GAO Government Accounting Office GWIG Global Intelligence Working Group IED improvised explosive device IRA... device xi EXECUTIVE SUMMARY Since 2001, violent sub-national groups with disparate ideologies and motivations have been working together to further...writings of Karl Marx , Frederick Engles, and Vladimir Lenin. As early as 1848, with the release of the Communist Manifesto, Marx and Engles wrote about

  10. Denationalized Citizenship Theory: What Is the Role of Citizenship Theory in Homeland Security?

    Science.gov (United States)

    2011-12-01

    involved either included international factors outside the norm, or brought into question the effectiveness of and/or accuracy of the U.S. government and...Rubenstein, “International Citizenship: The Future of Nationality in a Globalised World,” Indiana Journal of Global Legal Studies 7, issue 2 (April 1...to discuss everything from national identity to federalism to the unfinished business of guaranteeing human rights through democratic government. As

  11. Opaque Communities: A Framework for Assessing Potential Homeland Security Threats from Voids on the Map

    Science.gov (United States)

    2014-09-01

    Davidians in September 1989 and eventually moved to Australia following Koresh’s assertions that even the married female members of the community...other Davidians regarding their persecuted status. While in Australia , Breault conveyed his defector’s tale to Martin King of the Australian exposé...the community and unlikely to find willing landlords, to opt for homelessness rather than remain entrenched. In addition, the massive show of force

  12. Solving Homeland Security’s Wicked Problems: A Design Thinking Approach

    Science.gov (United States)

    2015-09-01

    Salter, Criscuolo, and Wal state that for many organizations, the notion of open innovation has not been successful due to organizational barriers ...organisation Adopting new narrative in the organisation From Helle Vibeke Carstensen and Christian Bason, “Powering Collaborative Policy Innovation...78 MindLab has gone through a series of 78 Helle Vibeke Carstensen and Christian Bason, “Powering

  13. Texas Should Require Homeland Security Standards for High-Speed Rail

    Science.gov (United States)

    2015-12-01

    any such threat is overstated, as the Clarke-Knake scenario is based on “distributed denial of service” attacks ( DDOS ). In addition, Brito and...Watkins are skeptical that a DDOS attack would be sufficient to derail a train.226 Dumont disagrees, however, suggesting attacks would go beyond DDOS to

  14. 77 FR 50449 - Revision of Department of Homeland Security Acquisition Regulation; Contractor Billing and...

    Science.gov (United States)

    2012-08-21

    ... and orders for non-commercial items using adequate price competition. The proposed rule would require... be awarded using adequate price competition. The purpose of these procedures is to ensure appropriate.../LH) Proposal Requirements-Non-commercial Item Acquisitions With Adequate Price Competition, to...

  15. OneDHS: The Department of Homeland Security’s Organizational Culture

    Science.gov (United States)

    2012-04-27

    success stories. The first concerns New York City in the 1990s and the second highlights the Walt Disney Company and its chain of excellence. Both...difference that other actions were unable to produce. Walt Disney Company In contrast to a culture that has evolved over a number of years is a culture...designed from day one and constantly reinforced day in and day out for the last ninety years. The Walt Disney Company is an example of a culture

  16. Play Well With Others: Improvisational Theater and Collaboration in the Homeland Security Environment

    Science.gov (United States)

    2013-09-01

    family, my parents , brothers and sister all work so hard to understand what it is I do, and their support for this career of mine really keeps me going...Shakespeare, Molière, puppets Punch and Judy and twentieth century performers like Charlie Chaplin and the Keystone Cops (Hartnoll, 1985). The idea of a...four sources, with each source drawing from media reports, interviews , and communications during the Deepwater Horizon disaster. Two of the reports

  17. Funding Homeland Security Programs at the State Level: A Multiple Policy Analysis

    Science.gov (United States)

    2014-12-01

    major center of the insurance industry and an early player in the political cycle hosting the first caucus of the presidential primary. Iowa tends to...and related space and certain finish materials, fixtures, fumishings. equipment and appliances for the foregoing (tile ’’SMF" or the "Building’’ and

  18. The Engaged and Empowered Community: An Essential Ingredient of Homeland Security

    Science.gov (United States)

    2010-09-01

    Challenge , 4th edition by James M. Kouzes and Barry Z. Posner Publisher: Pfeiffer; ISBN-10: 047055972 Leadership on the Line: Staying Alive...Strategic Planning..............................................................................17 2. Leadership ...56 D. THEMATIC ANALYSIS ..............................................................................58 1. Leadership

  19. Defining the Role and Responsibility of the Fire Service Within Homeland Security

    Science.gov (United States)

    2010-03-01

    Press. Kouzes , J. M. and Posner , B. Z. (1995). The leadership challenge . Boulder CO: Jossey- Bass Publishers. London Fire Brigade. (2008). Risk...success. The tasks include: challenge the process, inspire a shared vision, enable others to act, model the way and encourage the heart ( Kouzes ... Posner , 1995, p. 12). Leaders must challenge the process by moving the fire service beyond the status quo to a level of proactive strategic performance

  20. Tactical Firefighter Teams: Pivoting Toward the Fire Service’s Evolving Homeland Security Mission

    Science.gov (United States)

    2016-09-01

    including a restaurant , a hotel, and the train station. The attackers combined the use of assault rifles, hand grenades, IEDs, and fire while holding... sustained level of right-wing inspired domestic terrorism.70 To date, lone attackers have overwhelmingly executed most of these assaults; however...level that would cause a second-degree burn to the wearer of the PPE.”136 A TPP of 35 means the garments must protect the wearer from sustaining second