WorldWideScience

Sample records for homeland security unmanned

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  3. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  4. Changing Homeland Security: In 2010, Was Homeland Security Useful?

    Science.gov (United States)

    2011-02-01

    Education Consortium, September 2007). 8 James Ramsay , Daniel Cutrer, and Robert Raffel, “Development of an Outcomes-Based Undergraduate Curriculum in... Gordon , “Changing Homeland Security: Teaching the Core,” Homeland Security Affairs II, no. 1 (April 2006) http://www.hsaj.org/?article=2.1.1. 13 Kuhn

  5. Homeland security: what are the advantages and disadvantages of different local homeland security organizational structures?

    OpenAIRE

    Fitzpatrick, William Mark

    2015-01-01

    Approved for public release; distribution is unlimited After the attacks of September 11, 2001, and the creation of the federal Department of Homeland Security in 2002, many local agencies formed their own homeland security entity. Since that time, significant economic downturns have resulted in reductions in the amount of homeland security funding available to local jurisdictions. Another issue involves the lack of a common definition of homeland security and what it entails and how daily...

  6. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  7. Homeland Security Affairs Journal (press release)

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Homeland Defense and Security

    2013-01-01

    Homeland Security Affairs (HSA) is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  8. Changing Homeland Security: Ten Essential Homeland Security Books

    National Research Council Canada - National Science Library

    Bellavita, Christopher

    2007-01-01

    .... The list is personal and provisional. The discipline is too new to have a canon. We need to continuously examine what is signal and what is background noise in homeland security's academic environment...

  9. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  10. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  11. Homeland Security: Unmanned Aerial Vehicles and Border Surveillance

    Science.gov (United States)

    2010-07-08

    outfit the Predator B with a synthetic aperture radar (SAR) system17 and a moving target indicator (MTI) radar. Adding SAR and MTI to the Predator B’s...Predator Squadrons,” Inside the Air Force, June 7, 2002. 17 For more information about Synthetic Aperture Radar, see http://www.sandia.gov/radar...contributed to the seizing of more than 22,000 pounds of marijuana and the apprehension of 5,000 illegal immigrants,” others disagree.24 “Unmanned aircraft

  12. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  13. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  14. Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April

    OpenAIRE

    2006-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...

  15. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...

  16. Homeland Security: Scope of the Secretary's Reorganization Authority

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2005-01-01

    ...). Section 872 of the Homeland Security Act gives the Secretary of Homeland Security the authority to reorganize "functions" and "organizational units" within the Department either independently, 60...

  17. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  18. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  19. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  20. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  1. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  2. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  3. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  4. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  5. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  6. Proceedings and Presentations from the 2015 Homeland Security Education Summit

    OpenAIRE

    2015-01-01

    Proceedings: 9th Annual Homeland Defense and Security Education Summit The 9th Annual Homeland Defense and Security Education Summit was held on September 25-26, 2015 at the Hyatt Regency Hotel in Orlando Florida. The theme of the event was Evolving Homeland Security…

  7. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Science.gov (United States)

    2012-11-02

    ... the White House Homeland Security Partnership Council #0; #0; #0; Presidential Documents #0; #0; #0;#0... White House Homeland Security Partnership Council By the authority vested in me as President by the... States. Sec. 2. White House Homeland Security Partnership Council and Steering Committee. (a) White House...

  8. Changing Homeland Security: What Should Homeland Security Leaders Be Talking About?

    Science.gov (United States)

    2006-07-01

    constructionism , middle-of-the-road moderation, and radical reconstructionism.14 BELLA VIT A, CH A NGI NG HOMELA ND SECU R ITY 6...nation by paying more attention to the social and economic conditions that give rise to and support “premeditated, politically motivated violence...threat.24 Left and right wing domestic terrorists are still active.25 Homeland security needs both short- and long-term perspectives. From a social

  9. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  10. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  11. Top Ten Challenges Facing the Next Secretary of Homeland Security

    National Research Council Canada - National Science Library

    2008-01-01

    In an effort to assist with the first Presidential administration transition of the Department of Homeland Security, the Homeland Security Advisory Council has identified ten key challenges that will...

  12. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  13. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  14. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  15. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  16. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Resilience Is a Complex Adaptive System of Systems ( CASoS ) ....60 4. Resilience Is Experienced and Demonstrated in Different Ways ..60 5. Resilience Is...The inclusion of a resilience module into existing homeland security training programs broadens the practitioner’s knowledge base from a basic level...psychology offer several considerations for the homeland security practitioner. The first consideration maintains that a de -emphasis on the

  17. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  18. The homeland security enterprise where do we fit?

    OpenAIRE

    Marlowe, Kirk S.

    2009-01-01

    CHDS State/Local Homeland security is a responsibility to be shared across the nation. Resource demands, differing cultures, and varying motivations result in frustration and confusion that conflict with the nation's need to collaborate and cooperate. As such, the homeland security enterprise appears to be imploding from turf battles, suspicion, poor communication, competitive funding, and mistrust, which cause stakeholders to wonder where they fit in this complex, interdependent env...

  19. Comparative U.S.-Israeli Homeland Security

    National Research Council Canada - National Science Library

    Larsen, Jeffrey A; Pravecek, Tasha L

    2006-01-01

    .... It begins with the threats experienced by each nation, examining the respective homeland security organizational structures and ways of preventing attacks and responding to attacks that do occur...

  20. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  1. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  2. Martin Continues His Homeland Security Profession with New UASI Position

    OpenAIRE

    Issvoran, Heather

    2014-01-01

    Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.

  3. Proposing C4ISR Architecture Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Farah-Stapleton, Monica F; Dimarogonas, James; Eaton, Rodney; Deason, Paul J

    2004-01-01

    This presentation presents how a network architecture methodology developed for the Army's Future Force could be applied to the requirements of Civil Support, Homeland Security/Homeland Defense (CS HLS/HLD...

  4. Homeland Security - Can It be Done?

    Science.gov (United States)

    2003-04-07

    and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes

  5. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  6. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    and largely ignores the social aspects that influence an individual’s beliefs, attitudes and, behaviors.53 Self-efficacy is defined by Albert Bandura ...master’s thesis Naval Postgraduate School, Monterey, CA), 39–52 53 Ibid., 53. 54 Albert Bandura , “Self-efficacy: Toward a Unifying Theory of...Hometown Security: Advancing the Homeland Security Paradigm, Homeland Security Affairs V (2009). http://www.hsaj.org/?fullarticle=5.2.2. Bandura

  7. An exploratory risk perception study of attitudes toward homeland security systems.

    Science.gov (United States)

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  8. A survey of COTS wireless transceiver solutions for unmanned/unattended homeland defense systems

    Science.gov (United States)

    Wurth, Timothy J.; Wells, Jeffrey S.; Trimble, Michael L.

    2004-08-01

    As the war on terrorism continues abroad, the need to maintain security at home remains a major concern. Every aspect of the security effort can benefit from rapid information transfer. Advances in Commercial-Off-the-Shelf (COTS) radios make them valuable in applications ranging from deployed sensors on unsecured borders, to organizing an emergency response team. Additionally, the reduced cost and availability of these transceivers make them a viable alternative to custom developments. As an example, COTS radios can serve as the communication element in Unattended Ground Sensor (UGS) and munitions systems. Other applications include networked sonobuoys and networked RFID tracking. An additional advantage of COTS solutions is that they are available in a small form factor. They have extremely small mechanical outlines and are easily installed in systems requiring miniature designs and light payloads such as man-pack emplaced radios for the Army"s Future Combat System (FCS), as well as missions carried out by Unmanned Aerial Vehicles (UAV). The availability of the COTS radios result in a low-cost alternative for communication links that are applicable to military and Homeland Defense projects. They provide an easily obtainable, low-cost radio alternative enabling quick design cycles to meet mission timeliness. COTS solutions eliminate months from a typical design cycle and have many features already implemented such as ad-hoc routing and encryption. This enables robust hardware to be fielded quickly when a new need arises. The focus of this paper is to identify different COTS modules that can efficiently and cost effectively be applied to these and other various applications.

  9. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    ... cyber attack. Under 5 U.S.C. 552b(c)(9)(B), disclosure of this information would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate the successful.... The closed portions of the meeting will address threats to our homeland security, results of a cyber...

  10. Emergency management and homeland security: Exploring the relationship.

    Science.gov (United States)

    Kahan, Jerome H

    2015-01-01

    In the years after the 9/11 tragedy, the United States continues to face risks from all forms of major disasters, from potentially dangerous terrorist attacks to catastrophic acts of nature. Professionals in the fields of emergency management and homeland security have responsibilities for ensuring that all levels of government, urban areas and communities, nongovernmental organizations, businesses, and individual citizens are prepared to deal with such hazards though actions that reduce risks to lives and property. Regrettably, the overall efficiency and effectiveness of the nation's ability to deal with disasters is unnecessarily challenged by the absence of a common understanding on how these fields are related in the workforce and educational arenas. Complicating matters further is the fact that neither of these fields has developed agreed definitions. In many ways, homeland security and emergency management have come to represent two different worlds and cultures. These conditions can have a deleterious effect on preparedness planning for public and private stakeholders across the nation when coordinated responses among federal, state, and local activities are essential for dealing with consequential hazards. This article demonstrates that the fields of emergency management and homeland security share many responsibilities but are not identical in scope or skills. It argues that emergency management should be considered a critical subset of the far broader and more strategic field of homeland security. From analytically based conclusions, it recommends five steps that be taken to bring these fields closer together to benefit more from their synergist relationship as well as from their individual contributions.

  11. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  12. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  13. Fortress America: The Aesthetics of Homeland Security in the Public Realm

    Science.gov (United States)

    2017-09-01

    matured and evolved as a profession and is now an integral part of all urban design. UK citizens benefit from aesthetical public spaces where security...only can homeland security architecture restrict access to public spaces, it might not actually make the public safer. The indirect costs of poorly...change. Until public agencies hold homeland security architecture projects to the same public benefit requirements as other projects, the hostile

  14. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  15. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    recreation, national defense, and tourism . To understand the maritime homeland security efforts put into place after 9/11 better, a study of the practices...fire service venturing beyond its fire suppression or emergency medical services role and asserted the value of having firefighters better integrated...national defense, and tourism , so too must be the approach to maritime homeland security. This research examined only the role of state and local law

  16. Homeland Security. Management Challenges Facing Federal Leadership

    Science.gov (United States)

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  17. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  18. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  19. Twitter, Facebook, and Ten Red Balloons: Social Network Problem Solving and Homeland Security

    OpenAIRE

    Ford, Christopher M.

    2011-01-01

    This article appeared in Homeland Security Affairs (February 2011), v.7 no.1 This essay, the winner of the Center for Homeland Defense and Security (CHDS) Essay Contest in 2010, looks at how homeland security could benefit from crowd-sourced applications accessed through social networking tools such as Twitter and Facebook. Christopher M. Ford looks at the apparent efficacy of two such endeavors: the Defense Advanced Research Projects Agency'۪s (DARPA) competition to find ten 8-foot balloo...

  20. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications...

  1. Homeland Security: The Department of Defense's Role

    National Research Council Canada - National Science Library

    Bowman, Steve

    2003-01-01

    ...) more closely with federal, state, and local agencies in their homeland security activities. DoD resources are unique in the government, both in their size and capabilities, and can be applied to both deter and respond to terrorist acts...

  2. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal..., Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445...

  3. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  4. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal.... Postal Service Mail to Jeffery Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security...

  5. Communications and Integration Enhancements to Improve Homeland Security

    National Research Council Canada - National Science Library

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  6. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting... Analysis Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  7. Homeland Security-Related Education and the Private Liberal Arts College

    OpenAIRE

    Moore, Gregory; Hatzadony, John G.; Cronin, Kelley; Breckenridge, Mary B.

    2010-01-01

    This article appeared in Homeland Security Affairs (May 2010), v.6 no.2 Small private liberal arts colleges enjoy certain advantages when developing new academic programs, such as in homeland security-related education. These institutions offer students the opportunity to acquire a broad-based education in order to gain a holistic view of the world, a critical need in this age of global challenges. Smaller colleges can also adapt more quickly to changes in the marketplace and are able to d...

  8. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  9. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  10. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  11. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Science.gov (United States)

    2011-09-28

    ... 1974; Department of Homeland Security Federal Emergency Management Agency--012 Suspicious Activity... establish a new system of records titled, ``Department of Homeland Security/Federal Emergency Management... Department of Homeland Security/Federal Emergency Management Agency to collect, maintain, and retrieve...

  12. Homeland Security: Scope of the Secretary's Reorganization Authority

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2005-01-01

    .... While many of the proposed changes may be effectuated administratively, some might require legislative action due to limits on reorganization authority under the Homeland Security Act of 2002 (P.L. 107-296...

  13. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  14. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  15. The Development and Recognition of Homeland Security Law

    National Research Council Canada - National Science Library

    McDaniel, Michael C

    2007-01-01

    .... Just as Congress passed thousands of pages of legislation in response to the events of 9/11, the Department of Homeland Security, created by one of those new laws, is churning out thousands of pages...

  16. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Science.gov (United States)

    2010-01-01

    ... Procedures for certification of approved products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... application for renewal must be made using the “Application for Certification of an Approved Product for...

  17. Cybersecurity Lanes in the Road for the Department of Homeland Security

    Science.gov (United States)

    2016-06-01

    imposing censorship here in the United States.”66 According to President Obama the main goal of the attack was for North Korea to impose restrictions on...was Congress passing Public Law 107–56 in October 2001, titled “The Uniting and Strengthening America by Providing Appropriate Tools Required to...Department of Homeland Security, modified October 2014, http://www.dhs.gov/creation-department-homeland-security. 80 Uniting and Strengthening America by

  18. Measuring the Foundation of Homeland Security

    Science.gov (United States)

    2007-03-01

    Pirak Kevin Eack Susan Pyle Chuck Eaneff Joseph Saitta Susan Fernandez Shelly Schechter Helen Fitzpatrick Rick Schwein Jay...multiple disciplines. The scope of this literature review is to cast a broad net and then narrow to specific literature related to Homeland Security...Suez Canal. His successes as a planner, diplomat and promoter made him the most celebrated man in Europe. Because of these successes, De Lesseps

  19. Radiation Detection for Homeland Security Applications

    Science.gov (United States)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will

  20. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    Science.gov (United States)

    2017-06-01

    Approved for public release. Distribution is unlimited. SAUDI ARABIA’S COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY Majed M...examined in the previous chapter with examples from the case studies related to terrorist attacks and Saudi Arabia’s responses. Furthermore, the...COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY by Majed M. Bin Madhian June 2017 Thesis Advisor: James Russell Co-Advisor

  1. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  2. Managing Materials and Wastes for Homeland Security Incidents

    Science.gov (United States)

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  3. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Science.gov (United States)

    2012-08-30

    ... border. The Public Safety and Homeland Security Bureau (Bureau), by this action, affords interested... INFORMATION CONTACT: Brian Marenco, Policy and Licensing Division, Public Safety and Homeland Security Bureau... 2007, the Commission delegated authority to Public Safety and Homeland Security Bureau to propose and...

  4. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    Science.gov (United States)

    2013-06-01

    create a coast-to-coast, interoperable digital emergency communications network.36 Accordingly, Homeland Security Act 2002 and Homeland Security...or fixed monitor that depicts friendly forces on an easy-to-read digitized geospatial map. The number of assets being tracked directly determines...Common Defense diminished since Colombian security forces killed notorious Medellin cartel leader Pablo Escobar in 1993.74 There undeniably is an

  5. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY... Fullano, Associate Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission...

  6. How to Fund Homeland Security without Federal Dollars: State and Local Funding of Homeland Security Initiatives in Light of Decreased Support by the Federal Government

    National Research Council Canada - National Science Library

    Emler, Jay S

    2008-01-01

    .... This thesis, therefore, examined alternatives states and local units of government might use to fund homeland security initiatives, ranging from conventional alternatives such as, asset forfeiture...

  7. Japan as a Paradigm for U.S. Homeland Security

    National Research Council Canada - National Science Library

    Ruth, Allen C

    2006-01-01

    ...) is in full swing and the United States is engaged around the world. These factors provide valid reasons for the United States to research other countries' homeland security paradigms to provide a contrast in methods of combating terrorism...

  8. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    After more than seven years of funding through The Centers for Disease Control and Prevention, local public health agencies have made inconsistent progress in fulfilling their Homeland Security objectives...

  9. The Road Less Traveled: Exploring the Experiences and Successes of Women Leaders in Homeland Security

    Science.gov (United States)

    2013-03-01

    SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL March 2013 Author: Jonna West Approved by...local agencies with homeland security related agencies. For purposes of this study , agencies included the U.S. DHS and its component agencies, state...circles. In fact, often when the topic does come up, it is generally followed by discussions about feminism in general, and is often accompanied by

  10. Metro Optical Networks for Homeland Security

    Science.gov (United States)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  11. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    Science.gov (United States)

    2015-06-01

    to properly understand homeland security threats and their origin directly impacts our ability to prevent or mitigate these threats. “Homeland...of new cognitive approaches or policy tools to eliminate or mitigate homeland security threats, perhaps even at the level of their root causes. A key...to self-similar ‘fractal’ structure. The frequency spectrum of 1/f noise or flicker noise with a power-law spectrum S (f) ≈ f⁻β.” Bak, Tang, and

  12. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  13. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  14. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  15. 75 FR 9238 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-03-01

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  16. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  17. A governor's guide to emergency management. Volume two : homeland security

    Science.gov (United States)

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  18. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  19. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    Science.gov (United States)

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  20. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  1. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fourth meeting on...

  2. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its third meeting on October...

  3. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Security, Reliability, and Interoperability Council (CSRIC III) scheduled for December 5, 2012, at Federal...

  4. Fluid Mechanics and Homeland Security

    Science.gov (United States)

    Settles, Gary S.

    2006-01-01

    Homeland security involves many applications of fluid mechanics and offers many opportunities for research and development. This review explores a wide selection of fluids topics in counterterrorism and suggests future directions. Broad topics range from preparedness and deterrence of impending terrorist attacks to detection, response, and recovery. Specific topics include aircraft hardening, blast mitigation, sensors and sampling, explosive detection, microfluidics and labs-on-a-chip, chemical plume dispersal in urban settings, and building ventilation. Also discussed are vapor plumes and standoff detection, nonlethal weapons, airborne disease spread, personal protective equipment, and decontamination. Involvement in these applications requires fluid dynamicists to think across the traditional boundaries of the field and to work with related disciplines, especially chemistry, biology, aerosol science, and atmospheric science.

  5. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    published books and peer reviewed journal articles. The Congressional Research Service being the key source on congressional procedure and theory ...Transportation Committee 1 Senate Homeland Security & Governmental Affairs Committee 15 Senate Small Business & Entrepreneurship 1 Senate Special...military contracting procedures in a war zone are not necessarily oversight of national security functions, reviews of FEMA contracting practices

  6. HOMELAND SECURITY: Intergovernmental Coordination and Partnership Will Be Critical to Success

    National Research Council Canada - National Science Library

    2002-01-01

    .... Moreover, formation of a department should not be considered a replacement for the timely issuance of a national homeland security strategy, which is needed to guide implementation of the complex...

  7. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  8. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  9. 2006 Homeland Security Symposium and Exposition. Held in Arlington, VA on 29-31 March 2006

    Science.gov (United States)

    2006-03-31

    Consequences , Vulnerabilities, and Threats) Prioritize Implement Protective Programs Measure Effectiveness 9March 2006 Major NIPP Theme: Sector Partnership... effect of exposure • Full understanding of the levels of exposure that mark the onset of miosis • Refined human operational exposure standard for GB...Untitled Document 2006 Homeland Security Symposium and Exposition.html[7/7/2016 11:38:26 AM] 2006 Homeland Security Symposium and Exposition

  10. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Science.gov (United States)

    2011-07-06

    ... the Terrorist Screening Database System of Records relates to official DHS national security and law... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 [Docket No. DHS-2011-0060] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--030 Use of the...

  11. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  12. Irradiation applications for homeland security

    International Nuclear Information System (INIS)

    Desrosiers, Marc F.

    2004-01-01

    In October 2001, first-class mail laced with anthrax was sent to political and media targets resulting in several deaths, illnesses, significant mail-service disruption, and economic loss. The White House Office of Science and Technology Policy established a technical task force on mail decontamination that included three key agencies: National Institute of Standards and Technology with responsibility for radiation dosimetry and coordinating and performing experiments at industrial accelerator facilities; the Armed Forces Radiobiology Research Institute with responsibility for radiobiology; and the US Postal Service with responsibility for radiation-processing quality assurance and quality control. An overview of the anthrax attack decontamination events will be presented as well as expectations for growth in this area and the prospects of other homeland security areas where irradiation technology can be applied

  13. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  14. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  15. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  16. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  17. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... cybersecurity awareness, education, talent management, and professional development and training. NICCS Portal... Education Office, will submit the following Information Collection Request (ICR) to the Office of Management... contemplated: Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security...

  18. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  19. Planning for Success: Constructing a First Responder Planning Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Jankowski, Thaddeus K., Sr

    2005-01-01

    .... This thesis argues that the fire service and others in the first responder community will be able to contribute to homeland security missions much more effectively, and efficiently, by switching...

  20. Myth, Metaphor, and Imagination: Framing Homeland Security as Art and Archetype

    Science.gov (United States)

    2013-03-01

    Culture to Identify the Post 9/11 Homeland Security Zeitgeist” (Master’s thesis, Naval Postgraduate School, 2008). 4 Abraham H. Maslow , The Farther...Archetypes in a Public Mental Hospital.” Doctoral dissertation, University of Southern California, 1987. Maslow , Abraham H. 1971. The Farther Reaches

  1. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false All other CBP regulations issued under the authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY...

  2. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  3. 8 CFR 2.1 - Authority of the Secretary of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ... Secretary's discretion, delegate any such authority or function to any official, officer, or employee of the Department of Homeland Security, including delegation through successive redelegation, or to any employee of the United States to the extent authorized by law. Such delegation may be made by regulation...

  4. Wireless sensors and sensor networks for homeland security applications.

    Science.gov (United States)

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  5. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  6. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  7. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Science.gov (United States)

    2011-11-23

    ... http://www.regulations.gov . FOR FURTHER INFORMATION CONTACT: For general questions and privacy issues... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal Records System of Records AGENCY: Privacy...

  8. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  9. United States and Israeli Homeland Security: A Comparative Analysis of Emergency Preparedness Efforts

    National Research Council Canada - National Science Library

    Pockett, Consuella B

    2005-01-01

    This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland Security's Emergency Preparedness and Response directorate and the Israel Defense Forces Home Front Command...

  10. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Policy, U.S. Department of Homeland Security, Washington, DC 20528. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0040] Privacy Act of... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY...

  11. SEVIS: The Impact of Homeland Security on American Colleges and Universities

    Science.gov (United States)

    Danley, Janet V.

    2010-01-01

    This chapter covers the impact of homeland security mandates on institutions and international students and scholars. The author traces the history of interest by the Immigration and Naturalization Service (INS) in developing a management system for international students and scholars that eventually resulted in the birth of Student and Exchange…

  12. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  13. Energizing the Enterprise: An Incentive-Based Approach to Homeland Security

    Science.gov (United States)

    2010-12-01

    8217" (master’s thesis, Naval Postgraduate School, 2007), 79–82. 8 desensitization and complacency often hamper long-term results, necessitating additional...for contributing to homeland security, it may exact a cost from the offering entity. Additionally, some incentives may require advertising to make...people aware of their existence. Many of these advertisements , however, might be able to be combined with existing awareness campaign messages. 2

  14. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  15. Environment and homeland security in France

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2011-01-01

    The author comments the impact of extreme events related to global warming and climate change on the French homeland security. He comments the evolution of temperature during the last century, the various transformations notably predicted by IPCC reports, and the various climate evolutions. Then, he discusses impacts of climate change on different economic sectors. He notably addresses the impact on coast lines (risks of submersion and erosion, more particularly for overseas territories), the impact extreme events may have on soft water (a temperature rise would impact the operation of nuclear plants; sewage and water networks will be threatened by more intense rainfalls), the positive and negative impacts on forests (high productivity but loss of diversity, development of parasites, risks of forest fires), and the impacts on various economic activities (agriculture, food supply, tourism, insurance) and on health

  16. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    culture, morale, and job satisfaction levels of employees .28 Gerstein argues the development of a Homeland Security personnel system and career maps...and culture, low morale, and job satisfaction levels of employees . DHS has been following a similar approach to the DOD in terms of professional...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  17. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  18. Homeland Security and Emergency Management Education: An Investigation into Workforce Needs

    Science.gov (United States)

    Carlson, Cameron D.

    2017-01-01

    The U.S. Department of Homeland Security (DHS) was created in the wake of the September 11th 2001 terrorist events. DHS's formation, the largest reorganization of a governmental agency in over 50 years, brought a new emphasis on the protection of the nation, its citizens and its infrastructure to government emergency management policy. Previously,…

  19. Balanced Scorecard: A Strategic Tool in Implementing Homeland Security Strategies

    OpenAIRE

    Caudle, Sharon

    2008-01-01

    This article appeared in Homeland Security Affairs (October 2008), v.4 no.3 Starting in the early 1990s, Robert S. Kaplan and David P. Norton advocated a 'balanced scorecard' translating an organization's mission and existing business strategy into specific strategic objectives that could be linked in cause and effect relationships and measured operationally. The balanced scorecard stressed drivers of future organizational performance -- capabilities, resources, and business processes -- a...

  20. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Science.gov (United States)

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of...: United States Coast Guard Auxiliary Database (AUXDATA). Security classification: Unclassified. System...

  1. Integrated homeland security system with passive thermal imaging and advanced video analytics

    Science.gov (United States)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  2. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  3. Enabling private and public sector organizations as agents of homeland security

    Science.gov (United States)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  4. Gamma-ray imaging. Applications in nuclear non-proliferation and homeland security

    International Nuclear Information System (INIS)

    Vetter, Kai; Mihailescu, Lucian

    2010-01-01

    This paper provides the motivation and describes implementations of gamma-ray imaging for homeland security applications and more general for national and international nuclear security. As in nuclear medicine and astrophysics, the goal of gamma-ray imaging is the detection and localization of nuclear materials, however, here in a terrestrial environment with distances between nuclear medicine and astrophysics, i.e. in the range of 1-100 meters. Due to the recently increased threat of nuclear terrorism, the detection of illicit nuclear materials and the prevention of nuclear proliferation through the development of advanced gamma-ray imaging concepts and technologies has become and active research field. (author)

  5. The Impact of Organizational Culture on the Sharing of Homeland Security Information

    Science.gov (United States)

    2008-04-04

    transform an organization through 8 U.S. Government Accountability Office, “Homeland Security: Efforts...www.whitehouse.gov/omb/ egov /documents/FEA_Practice_Guidance.pdf (accessed September 23, 2007), 4-1. 10 U.S. Government Accountability Office, GAO-04-777, 12...between the federal government and the state and local governments , and the transformation of disparate cultures into a new executive department – the

  6. Employing the intelligence cycle process model within the Homeland Security Enterprise

    OpenAIRE

    Stokes, Roger L.

    2013-01-01

    CHDS State/Local The purpose of this thesis was to examine the employment and adherence of the intelligence cycle process model within the National Network of Fusion Centers and the greater Homeland Security Enterprise by exploring the customary intelligence cycle process model established by the United States Intelligence Community (USIC). This thesis revealed there are various intelligence cycle process models used by the USIC and taught to the National Network. Given the numerous differ...

  7. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  8. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... addressing privacy concerns. The fifteen- year retention period will allow CBP to access the data when needed... security, law enforcement and counterterrorism missions, while addressing privacy concerns. Legal or...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs and Border...

  9. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    Science.gov (United States)

    2013-05-24

    Secretary of Homeland Security also has the responsibility for establishing International Security Cooperation with the countries of Canada and Mexico ...and goals”84 to improve its culture and morale issues. However, further study is required to determine ways to: de -conflict the overlap of...National Preparedness Description is one of the requirements for Presidental Policy Directive-8. 55 the Joint Staff integrates internal and external

  10. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  11. The FBI is Leading the Way by Making the Private Sector an Integral Part of the Counterterrorism Homeland Security Enterprise

    Science.gov (United States)

    2012-09-01

    This thesis discusses the building of a sustainable business process wherein the private sector is integrated into the homeland security apparatus...As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the private sector into the homeland security...attack. The private sector brings with it a plethora of talents and resources. Because it has not traditionally been seen as a partner the private sector has

  12. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  13. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  14. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  15. Detection of unmanned aerial vehicles using a visible camera system.

    Science.gov (United States)

    Hu, Shuowen; Goldman, Geoffrey H; Borel-Donohue, Christoph C

    2017-01-20

    Unmanned aerial vehicles (UAVs) flown by adversaries are an emerging asymmetric threat to homeland security and the military. To help address this threat, we developed and tested a computationally efficient UAV detection algorithm consisting of horizon finding, motion feature extraction, blob analysis, and coherence analysis. We compare the performance of this algorithm against two variants, one using the difference image intensity as the motion features and another using higher-order moments. The proposed algorithm and its variants are tested using field test data of a group 3 UAV acquired with a panoramic video camera in the visible spectrum. The performance of the algorithms was evaluated using receiver operating characteristic curves. The results show that the proposed approach had the best performance compared to the two algorithmic variants.

  16. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  17. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  18. Detecting objects in radiographs for homeland security

    Science.gov (United States)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  19. Homeland Security: Compendium of Recommendations Relevant to House Committee Organization and Analysis of Considerations for the House

    National Research Council Canada - National Science Library

    Koempel, Michael L

    2005-01-01

    .... The original report was not changed; its summary follows: The 9/11 Commission and other commissions and think tanks studying homeland security recommended congressional committee reorganization to increase Congress's policy and oversight coordination...

  20. Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security. Volume 1

    Science.gov (United States)

    2003-11-01

    were used to develop a web-based "deployment picture." (A little money -a few million dollars-can go a long way in the combatant commands). OSD critical...AND MISSIONS f1 HOMELAND SECURJTY 91 APP8VD&XH Dr. Mark Harper U.S. Naval Academy Mr. Art Money Private Consultant Mr. Walter Morrow, Jr. MIT Lincoln...Protection BrigGen Irv Halter Discussion Mr. John Lauder Overview of NRO support to Homeland Security Mr. Brian Hack and Mr. Alan NRO Comms - NRO backbone

  1. In Support of the Common Defense: Homeland Defense and Security Journal. Volume 1

    Science.gov (United States)

    2012-04-01

    as the United Kingdom, France, and Norway to name a few. Sharia law is Islamic law. While most people understand that the Quran is the Bible of Islam...grotesquely, Satanism . The Cult serves as a stabilizing religious force by using traditional cultural norms to justify the new narco-culture.35...irp/offdocs/pdd/pdd-39. pdf (accessed November 3, 2010). 4. Executive Order 13228 of October 8, 2001, Establishing the Office of Homeland Security and

  2. Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security

    Science.gov (United States)

    Yilmaz, Bahadır.

    2013-06-01

    Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.

  3. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  4. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Science.gov (United States)

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  5. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Science.gov (United States)

    2013-11-21

    ... Emergency Management Agency, 500 C Street SW., Washington, DC 20475. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0077] Privacy Act of..., Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy...

  6. State and Local Homeland Security Officials: Who Are They and What Do They Do?

    Science.gov (United States)

    2011-09-01

    importance of social networking and its direct impact upon the effectiveness of their work during an emergency. (Marcus, 2005, as adapted by Bell...strict constructionists who maintain that homeland security is about terrorism, middle-of-the-road moderates who sense that an all-hazards approach... method . As the interviews were conducted, data was analyzed and patterns emerged, which then provide insight into the population being studied. The

  7. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... Flexibility Act, 5 U.S.C. 605(b), as amended by the Small Business Regulatory Enforcement and Fairness Act of... Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS). ACTION: Final... consolidate all Federal regulations on drug-free workplace requirements for financial assistance into one...

  8. Homeland security and virtual reality: building a Strategic Adaptive Response System (STARS).

    Science.gov (United States)

    Swift, Christopher; Rosen, Joseph M; Boezer, Gordon; Lanier, Jaron; Henderson, Joseph V; Liu, Alan; Merrell, Ronald C; Nguyen, Sinh; Demas, Alex; Grigg, Elliot B; McKnight, Matthew F; Chang, Janelle; Koop, C Everett

    2005-01-01

    The advent of the Global War on Terrorism (GWOT) underscored the need to improve the U.S. disaster response paradigm. Existing systems involve numerous agencies spread across disparate functional and geographic jurisdictions. The current architecture remains vulnerable to sophisticated terrorist strikes. To address these vulnerabilities, we must continuously adapt and improve our Homeland Security architecture. Virtual Reality (VR) technologies will help model those changes and integrate technologies. This paper provides a broad overview of the strategic threats, together with a detailed examination of how specific VR technologies could be used to ensure successful disaster responses.

  9. A Model for Effective Organization and Communication of Homeland Security Activity at the State Level

    Science.gov (United States)

    2007-03-01

    whether managing the functional segments of a major corporation, i.e. sourcing, product development, inbound/ outbound logistics , or after-market services...homeland security concerns. While none specifically addresses the mechanics or logistics of the reorganization of state governments, it does assert...and around casino and hotels . Respond to all threats and hazards. Admit lawful bettors and visitors. Promote legal gaming.41 Department of

  10. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  11. Domestic Aerial Surveillance and Homeland Security: Should Americans Fear the Eye in the Sky?

    Science.gov (United States)

    2014-03-01

    In this case, an individual in North Dakota barricaded himself inside his property after officials ordered him to return six cows that wondered onto...www.hsdl.org/?view&did=737816. 24 Donald F. Kettl, System under Stress : Homeland Security and American Politics (Washington, DC: CQ, 2007), 113-115...police used a thermal imaging device to detect abnormal levels of heat radiating from the home of Danny Kyllo. Officials entered his home without a

  12. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  13. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  14. Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications

    International Nuclear Information System (INIS)

    Reijonen, Jani

    2006-01-01

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented

  15. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ... civil rights, civil liberties, such as profiling on the basis of race, ethnicity, or religion, by.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it); Allegation... Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive...

  16. 78 FR 28867 - Privacy Act of 1974; Department of Homeland Security/U.S. Immigration and Customs Enforcement-014...

    Science.gov (United States)

    2013-05-16

    ... related to travel and identity documents; latent and patent finger and palm prints; and audio and video... Homeland Security Investigations (HSI) that provides a broad range of forensic, intelligence, and... finger and palm prints; and audio and video files in support of law enforcement investigations and...

  17. The Journal of the Naval Postgraduate School Center for Homeland Defense and Security. Volume 6. Issue 3

    Science.gov (United States)

    2010-09-01

    genetic relationships between kin.33 Regardless of the underlying mechanism, individual symbiotic relationships can confer multiple benefits to the...allocation guidelines for homeland security and emergency management policymakers. The framework provides an operationally relevant rubric for...S. Wells, The Journey of Man: A Genetic Odyssey (Princeton, NJ: Princeton University Press, 2002). 4 A. Jakubowicz, “Anglo-multiculturalism

  18. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    Science.gov (United States)

    2012-12-01

    ALPR Automated License Plate Readers DHS Department of Homeland Security DOJ Department of Justice EOA Ecosystem-Oriented Architectures FEMA...through the use of technology, including the use of automated license plate readers ( ALPR ), ballistics evidence from crime scenes and confiscated...interest, their associates, and the use of ALPR technology to track criminal suspects and their routes of travel. Other recommendations included: the

  19. Exploring Security Vulnerabilities of Unmanned Aerial Vehicles

    NARCIS (Netherlands)

    Rodday, Nils Miro; de Oliveira Schmidt, R.; Pras, Aiko

    We are currently observing a significant increase in the popularity of Unmanned Aerial Vehicles (UAVs), popularly also known by their generic term drones. This is not only the case for recreational UAVs, that one can acquire for a few hundred dollars, but also for more sophisticated ones, namely

  20. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  1. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  2. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  3. Communicating Health Risks under Pressure: Homeland Security Applications

    International Nuclear Information System (INIS)

    Garrahan, K.G.; Collie, S.L.

    2006-01-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  4. Homeland Security: Compendium of Recommendations Relevant to House Committee Organization and Analysis of Considerations for the House, and 109th and 110th Congresses: Epilogue

    National Research Council Canada - National Science Library

    Koempel, Michael L

    2007-01-01

    ...: The 9/11 Commission and other commissions and think tanks studying homeland security recommended congressional committee reorganization to increase Congress's policy and oversight coordination...

  5. Future Role of Fire Service in Homeland Security

    National Research Council Canada - National Science Library

    Cloud, Rosemary

    2008-01-01

    .... The problem is that the world has changed. Increasing terrorist threats against our homeland and the potential for pandemic or other natural disasters are shifting the mission and placing new unconventional demands on the fire department...

  6. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  7. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  8. A multisignal detection of hazardous materials for homeland security

    Directory of Open Access Journals (Sweden)

    Alamaniotis Miltiadis

    2009-01-01

    Full Text Available The detection of hazardous materials has been identified as one of the most urgent needs of homeland security, especially in scanning cargo containers at United States ports. To date, special nuclear materials have been detected using neutron or gamma interrogation, and recently the nuclear resonance fluorescence has been suggested. We show a new paradigm in detecting the materials of interest by a method that combines four signals (radiography/computer tomography, acoustic, muon scattering, and nuclear resonance fluorescence in cargos. The intelligent decision making software system is developed to support the following scenario: initially, radiography or the computer tomography scan is constructed to possibly mark the region(s of interest. The acoustic interrogation is utilized in synergy to obtain information regarding the ultrasonic velocity of the cargo interior. The superposition of the computer tomography and acoustic images narrows down the region(s of interest, and the intelligent system guides the detection to the next stage: no threat and finish, or proceed to the next interrogation. If the choice is the latter, knowing that high Z materials yield large scattering angle for muons, the muon scattering spectrum is used to detect the existence of such materials in the cargo. Additionally, the nuclear resonance fluorescence scan yields a spectrum that can be likened to the fingerprint of a material. The proposed algorithm is tested for detection of special nuclear materials in a comprehensive scenario.

  9. A multisignal detection of hazardous materials for homeland security

    International Nuclear Information System (INIS)

    Alamaniotis, M.; Terrill, S.; Perry, J.; Gao, R.; Tsoukalas, L.; Jevremovic, T.

    2009-01-01

    The detection of hazardous materials has been identified as one of the most urgent needs of homeland security, especially in scanning cargo containers at United States ports. To date, special nuclear materials have been detected using neutron or gamma interrogation, and recently the nuclear resonance fluorescence has been suggested. We show a new paradigm in detecting the materials of interest by a method that combines four signals (radiography/computer tomography, acoustic, muon scattering, and nuclear resonance fluorescence) in cargos. The intelligent decision making software system is developed to support the following scenario: initially, radiography or the computer tomography scan is constructed to possibly mark the region(s) of interest. The acoustic interrogation is utilized in synergy to obtain information regarding the ultrasonic velocity of the cargo interior. The superposition of the computer tomography and acoustic images narrows down the region(s) of interest, and the intelligent system guides the detection to the next stage: no threat and finish, or proceed to the next interrogation. If the choice is the latter, knowing that high Z materials yield large scattering angle for muons, the muon scattering spectrum is used to detect the existence of such materials in the cargo. Additionally, the nuclear resonance fluorescence scan yields a spectrum that can be likened to the fingerprint of a material. The proposed algorithm is tested for detection of special nuclear materials in a comprehensive scenario. (author)

  10. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  11. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  12. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  13. Unmanned Aircraft Systems Integration in the National Airspace System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — There is an increasing need to fly Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) to perform missions of vital importance to national security...

  14. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  15. Controlling disasters: Local emergency management perceptions about Federal Emergency Management and Homeland Security actions after September 11, 2001.

    Science.gov (United States)

    Hildebrand, Sean

    This article examines local emergency manager's beliefs regarding control over tasks during various stages of the hazard cycle since federal policies went into effect following the September 11 attacks. The study considers whether a disparity exists between the actions of local officials during each phase of the "hazard cycle" and the policy expectations of the federal government, which call for greater federal control over activities in emergency management and homeland security. To do so, hypothesis testing investigates the jurisdiction's use of comprehensive emergency management (CEM) practices, the perceived "clarity" of the federal policy demands, and if the local actors feel coerced to comply with federal policy demands so that grant funding is not compromised. Using a model developed from "third-generation" policy implementation research, the results show that the odds of local officials citing federal control over these actions have very limited statistical significance. This signals that the perceived lack of local input into the development of these federal policies and the policies' limited use of traditional CEM measures may not be in concert with what local actors perform in the field. Simply put, the respondents claim to understand the federal policy demands, support the concept of federal control as the policies describe, yet follow their own plans or traditional CEM principles, even if such actions do not support the federal policy demands. These results align with pre-existing research in the emergency management field that show issues with efforts to centralize policies under the Department of Homeland Security and Federal Emergency Management Agency.

  16. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  17. The control of a parallel hybrid-electric propulsion system for a small unmanned aerial vehicle using a CMAC neural network.

    Science.gov (United States)

    Harmon, Frederick G; Frank, Andrew A; Joshi, Sanjay S

    2005-01-01

    A Simulink model, a propulsion energy optimization algorithm, and a CMAC controller were developed for a small parallel hybrid-electric unmanned aerial vehicle (UAV). The hybrid-electric UAV is intended for military, homeland security, and disaster-monitoring missions involving intelligence, surveillance, and reconnaissance (ISR). The Simulink model is a forward-facing simulation program used to test different control strategies. The flexible energy optimization algorithm for the propulsion system allows relative importance to be assigned between the use of gasoline, electricity, and recharging. A cerebellar model arithmetic computer (CMAC) neural network approximates the energy optimization results and is used to control the parallel hybrid-electric propulsion system. The hybrid-electric UAV with the CMAC controller uses 67.3% less energy than a two-stroke gasoline-powered UAV during a 1-h ISR mission and 37.8% less energy during a longer 3-h ISR mission.

  18. Unmanned Aircraft Systems: A Logical Choice for Homeland Security Support

    Science.gov (United States)

    2011-12-01

    UAS] has contributed to the seizure of more than 15,000 pounds of marijuana and the apprehension of more than 4,000 undocumented people.”6 Also, CBP...technology includes transponders, electro-optical, infrared radar, and synthetic aperture radar. Although each type of technology has advantages and...addition, the video and synthetic aperture radar capabilities on UAS can be used to provide imagery of river basins in support of flood response efforts

  19. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  20. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  1. Application of military uncooled infrared sensors to homeland defense

    Science.gov (United States)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  2. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  5. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Security June 2006, NIMS Revision Version 2 March 2007, NWDC Domestic Disaster Relief Operations Planning, 15 May 2006, AFRL-Supported Studies on Large- Scale Coordination, A Sociotechnical Systems...

  6. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    Science.gov (United States)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  7. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  8. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  9. The use of stimulated electron emission (SEE) in homeland security applications

    Science.gov (United States)

    Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.

    2012-06-01

    Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

  10. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  11. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    Energy Technology Data Exchange (ETDEWEB)

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  12. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  13. The Reality Of The Homeland Security Enterprise Information Sharing Environment

    Science.gov (United States)

    2017-12-01

    Related Information to Protect the Homeland (GAO 15- 290) (Washington, DC: U.S. Government Accountability Office, 2015), http://www.gao.gov/ assets...Government Accountability Office [GAO], Information Sharing Environment Better Road Map Needed to Guide Implementation and Investments (GAO-11-455...and its ISE PM would have clearer accountability for information sharing lapses and a faster ability to reform or develop domestic information -sharing

  14. Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system

    Science.gov (United States)

    Antony, Richard T.; Karakowski, Joseph A.

    2010-04-01

    A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.

  15. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION

  16. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  17. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  18. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  19. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  20. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  1. Homeland Security: Air Passenger Prescreening and Counterterrorism

    National Research Council Canada - National Science Library

    Elias, Bart; Krouse, William; Rappaport, Ed

    2005-01-01

    ... of their persons or baggage, or to prevent them from boarding an aircraft in the event of a terrorist watch list hit, is likely to be a difficult proposition for the federal agencies tasked with aviation security...

  2. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  3. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  4. U.S. Geological Survey Emerging Applications of Unmanned Aircraft Systems

    Science.gov (United States)

    Hutt, M. E.

    2012-12-01

    In anticipation of transforming the research methods and resource management techniques employed across the Department of the Interior, the U.S. Geological Survey (USGS) Unmanned Aircraft Systems (UAS) Project Office is conducting missions using small UAS- sUAS platforms (technology in support of scientific, resource and land management missions. UAS technology is currently being used by USGS and our partners to monitor environmental conditions, analyze the impacts of climate change, respond to natural hazards, understand landscape change rates and consequences, conduct wildlife inventories and support related land management and law enforcement missions. Our ultimate goal is to support informed decision making by creating the opportunity, via UAS technology, to gain access to an increased level of persistent monitoring of earth surface processes (forest health conditions, wildfires, earthquake zones, invasive species, etc.) in areas that have been logistically difficult, cost prohibitive or technically impossible to obtain consistent, reliable, timely information. USGS is teaming with the Department of the Interior Aviation Management Directorate to ensure the safe and cost effective adoption of UAS technology. While the USGS is concentrating on operating sUAS, the immense value of increased flight time and more robust sensor capabilities available on larger platforms cannot be ignored. We are partnering with several groups including the Department of Homeland Security, National Aeronautics and Space Administration, Department of Defense, and National Oceanic and Atmospheric Administration for access to data collected from their fleet of high altitude, long endurance (HALE) UAS. The HALE systems include state of the art sensors including Electro-Optical, Thermal Infrared and Synthetic Aperture Radar (SAR). The data being collected by High Altitude, Long Endurance (HALE) systems is can be routinely shared in near real time at several DOI- USGS locations. Analysis

  5. 33 CFR 127.705 - Security systems.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  6. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  7. Enemies within: Christian Extremism, a Threat to the Homeland

    Science.gov (United States)

    2016-06-10

    promotes fear of Muslim radical groups that perpetuate violence in the name of religion , while ignoring the threat Christian extremism poses on...those within the homeland that threaten the very liberty and freedom intended by the founding fathers for all Americans. This thesis and many more...the safety and freedom of Americans are protected. 15. SUBJECT TERMS Christian Extremism 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  8. 19 CFR 19.47 - Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  9. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  10. RISK DEFINITION IN CIVIL UNMANNED AVIATION

    Directory of Open Access Journals (Sweden)

    Volodymyr Kharchenko

    2016-12-01

    Full Text Available Objective: The risks in unmanned civil aviation are considered as one of the most important. In the article is proved applicability of ensuring the flight safety of aircraft and considered the basic risks of manned civil aviation. Methods: Analyzed statistical data on aviation accidents, organized probabilities distribution of aviation accidents for manned and unmanned civil aviation to identify factors that influence the occurrence of emergency situations in manned and unmanned aviation. Results: We proposed typology of risk components in civil aviation and systematized methods and techniques to reduce risks. Over the analogies defined possible risks, their causes and remedies in civil unmanned aircraft. Weight coefficients distribution was justified between risk types for development of recommendations on risk management in unmanned civil aviation. Discussion: We found that the most probable risk in manned civil aviation is the human factor, organization of air traffic control, design flaws of unmanned aviation system as a whole, as well as maintenance of unmanned aviation system.

  11. Common Operating Picture: UAV Security Study

    Science.gov (United States)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  12. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  13. 33 CFR 105.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...

  14. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  15. (Congressional Interest) Network Information and Space Security Center

    Science.gov (United States)

    2011-09-30

    Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of

  16. Aviation security : status of transportation security inspector workforce.

    Science.gov (United States)

    2009-02-06

    This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...

  17. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  18. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-02-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0002] President's National Security... National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, February 21, 2013... matters related to national security and emergency preparedness telecommunications policy. Agenda: The...

  19. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  20. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-09-19

    ... Portal is a national online resource for cybersecurity awareness, education, talent management, and... Management and Budget (OMB) for review and clearance in accordance with the Paperwork Reduction Act of 1995... of Management and Budget. Comments should be addressed to OMB Desk Officer, Department of Homeland...

  1. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  2. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  3. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  4. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  5. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  6. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  7. 8 CFR 103.34 - Security of records systems.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Security of records systems. 103.34 Section 103.34 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.34 Security of records systems. The security of records systems...

  8. 33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... disseminating appropriate security information to port stakeholders. ... Maritime Security (AMS) Committee. 103.310 Section 103.310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  9. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  10. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  11. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-12-29

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1005] National Maritime Security Advisory...

  12. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-07-02

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0586] National Maritime Security Advisory...

  13. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  14. Design of a sensor network system with a self-maintenance function for homeland security applications

    International Nuclear Information System (INIS)

    Fujiwara, Takeshi; Takahashi, Hiroyuki; Iyomoto, Naoko

    2008-01-01

    In this study, we develop a new concept of a robust wireless sensor network for homeland security applications. The sensor system consists of intelligent radiation sensors that can communicate each other through the wireless network. This structure can cover a wide area with a flexible geometry which is suitable for detecting a moving object with a detectable radiation source. Also, it has a tolerance against both the partial node's failure and packet errors; realized by a Self-Maintenance function. The Self-maintenance function is a function that enables an artifact to find, diagnosis and fix the trouble automatically and maintain itself. So far some approaches have been tried to realize robust monitoring system by applying the idea of multiplex system, based on ''2 out of 3'', but this requires a large amount of the hardware and is not suitable for sensor network systems. We designed a sensor network system with Self-Maintenance function based on qualitative reasoning technique for robust wireless sensor network system, and an instrument network based on ZigBee has been set up for investigations. CsI(Tl) gamma-ray detectors are used as sensors. The network system picks up correlation signals from sensors even some of sensors send false signals, which can be used as a reliable detection system for practical use. (author)

  15. Unmanned Maritime Systems Incremental Acquisition Approach

    Science.gov (United States)

    2016-12-01

    REPORT TYPE AND DATES COVERED MBA professional report 4. TITLE AND SUBTITLE UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION APPROACH 5. FUNDING...Approved for public release. Distribution is unlimited. UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION APPROACH Thomas Driscoll, Lieutenant...UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION APPROACH ABSTRACT The purpose of this MBA report is to explore and understand the issues

  16. 6 CFR 5.31 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  17. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  18. STUDY ON SAFETY TECHNOLOGY SCHEME OF THE UNMANNED HELICOPTER

    Directory of Open Access Journals (Sweden)

    Z. Lin

    2013-08-01

    Full Text Available Nowadays the unmanned helicopter is widely used for its' unique strongpoint, however, the high failure rate of unmanned helicopter seriously limits its further application and development. For solving the above problems, in this paper, the reasons for the high failure rate of unmanned helicopter is analyzed and the corresponding solution schemes are proposed. The main problem of the failure cause of the unmanned helicopter is the aircraft engine fault, and the failure cause of the unmanned helicopter is analyzed particularly. In order to improving the safety performance of unmanned helicopter system, the scheme of adding the safety parachute system to the unmanned helicopter system is proposed and introduced. These schemes provide the safety redundancy of the unmanned helicopter system and lay on basis for the unmanned helicopter applying into residential areas.

  19. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  20. Swot analysis of using aerostats for surveillance in counter terrorism

    Science.gov (United States)

    Çetin, Hüseyin

    2013-06-01

    In today's conjuncture, the terrorist activities are the most compelling issue for the defence forces in maintaining homeland security. Especially, the terrorist elements that penetrate the homeland may give harm. This harm can be minimized by preventing the terrorist penetrations from homeland borders. In counter terrorism, having Intelligence, Surveillance and Reconnaissance (ISR) capability and using this capability by twenty four hours is deterrence for the terrorist groups. Aerostats emerge as the ideal platform which can provide this capability. Aerostats are unmanned and aerodynamically shaped balloons that are stayed in the air, fixed to the ground by steel cable(s). The aerostat is made of a large fabric envelope that is filled with nonflammable helium gas, which provides the lifting force. The cables also serve to supply the electrical power to the aerostat systems, and for data relay between the aerostat and the ground station. Aerostats are different from the other manned and Unmanned Aerial Vehicles (UAVs) because of aerostats' capabilities such as cost effectiveness, long endurance and high resolution image transmission. Especially having uninterrupted image transmission and surveillance capabilities is important to be advantageous in counter terrorism. In this article, a short definition of terrorism has been given and then the importance of ensuring the homeland border security has been emphasized in counter terrorism. In addition, the questions of "what are the technical capabilities, the usage areas and the purposes of aerostats?" will be introduced as a result of literature review. Finally the strengths and weaknesses of aerostats, opportunities and threats for the near future will be introduced by using "SWOT" analysis method.

  1. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  2. M and S supporting unmanned autonomous systems (UAxS) concept development and experimentation

    Science.gov (United States)

    Biagini, Marco; Scaccianoce, Alfio; Corona, Fabio; Forconi, Sonia; Byrum, Frank; Fowler, Olivia; Sidoran, James L.

    2017-05-01

    The development of the next generation of multi-domain unmanned semi and fully autonomous C4ISR systems involves a multitude of security concerns and interoperability challenges. Conceptual solutions to capability shortfalls and gaps can be identified through Concept Development and Experimentation (CD and E) cycles. Modelling and Simulation (M and S) is a key tool in supporting unmanned autonomous systems (UAxS) CD and E activities and addressing associated security challenges. This paper serves to illustrate the application of M and S to UAxS development and highlight initiatives made by the North Atlantic Treaty Organization (NATO) M and S Centre of Excellence (CoE) to facilitate interoperability. The NATO M and S CoE collaborates with other NATO and Nations bodies in order to develop UAxS projects such as the Allied Command for Transformation Counter Unmanned Autonomous Systems (CUAxS) project or the work of Science and Technology Organization (STO) panels. Some initiatives, such as Simulated Interactive Robotics Initiative (SIRI) made the baseline for further developments and to study emerging technologies in M and S and robotics fields. Artificial Intelligence algorithm modelling, Robot Operating Systems (ROS), network operations, cyber security, interoperable languages and related data models are some of the main aspects considered in this paper. In particular, the implementation of interoperable languages like C-BML and NIEM MilOps are discussed in relation to a Command and Control - Simulation Interoperability (C2SIM) paradigm. All these technologies are used to build a conceptual architecture to support UAxS CD and E.In addition, other projects that the NATO M and S CoE is involved in, such as the NATO Urbanization Project could provide credible future operational environments and benefit UAxS project development, as dual application of UAxS technology in large urbanized areas.In conclusion, this paper contains a detailed overview regarding how applying

  3. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  4. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  5. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  6. Unmanned Systems in Perspective

    Science.gov (United States)

    2014-05-22

    36Gertler, 41-42. 37Gertler, 42; Spencer Ackerman, “Exclusive Pics: The Navy’s Unmanned, Autonomous ‘ UFO ’,” Wired, 31 July 2012, http...Pics: The Navy’s Unmanned, Autonomous ‘ UFO ’.” Wired, 31 July 2012. http://www.wired.com/dangerroom/2012/07/x47b (accessed 1 March 2014). Air Force

  7. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...

  8. 33 CFR 103.305 - Composition of an Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... port stakeholders having a special competence in maritime security; and (7) Port stakeholders affected... Security (AMS) Committee. 103.305 Section 103.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  9. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  10. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    national security and the interagency process ( Marcella , 2010). All these documents reviewed focused mainly on national security and overseas...administration, they were considered “the heart and soul of the process” ( Marcella , 2010). While subtle differences exist across administrations, the IPC...and build consensus across the government for action ( Marcella , 2010). During the second term of the Bush administration and during the first years

  11. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  12. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    Cong., 2nd sess., April 20, 1950. 13 8 U.S.C. 1104 . 14 8 U.S.C. 1201. AILA InfoNet Doc. No. 11071267. (Posted 07/12/11) Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS automated

  13. E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom

    Science.gov (United States)

    2010-04-01

    thesis is a prima facie , Strength, Weakness, Opportunity and Threat (SWOT) analysis of both the NSC/DoD and the HSC/DHS security/defense...all true Muslims have an obligation to engage in violent acts with the aim of relieving the world of corrupt values and social demagoguery. Extremist...9426085 on December 26, 2009). 47 meet the obligations associated with the globalization of democracy, America must align resources in a well

  14. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  15. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu, HI...

  16. Analysis of an Unmanned Aerial Vehicle Monitoring System for Resurveying of Shipping Routes

    Directory of Open Access Journals (Sweden)

    Urbahs Aleksandrs

    2016-12-01

    Full Text Available The paper gives brief description of the conventional and innovative hydrography survey methods and constraints connected with the realization. Proposed hydrographic survey system based on the use of Unmanned Aerial and Maritime systems provides functionality to conduct hydrographic measurements and environment monitoring. System can be easily adapted to fulfil marine safety and security operations, e.g. intrusion threat monitoring, hazardous pollutions monitoring and prevention operations, icing conditions monitoring.

  17. Natural interaction for unmanned systems

    Science.gov (United States)

    Taylor, Glenn; Purman, Ben; Schermerhorn, Paul; Garcia-Sampedro, Guillermo; Lanting, Matt; Quist, Michael; Kawatsu, Chris

    2015-05-01

    Military unmanned systems today are typically controlled by two methods: tele-operation or menu-based, search-andclick interfaces. Both approaches require the operator's constant vigilance: tele-operation requires constant input to drive the vehicle inch by inch; a menu-based interface requires eyes on the screen in order to search through alternatives and select the right menu item. In both cases, operators spend most of their time and attention driving and minding the unmanned systems rather than on being a warfighter. With these approaches, the platform and interface become more of a burden than a benefit. The availability of inexpensive sensor systems in products such as Microsoft Kinect™ or Nintendo Wii™ has resulted in new ways of interacting with computing systems, but new sensors alone are not enough. Developing useful and usable human-system interfaces requires understanding users and interaction in context: not just what new sensors afford in terms of interaction, but how users want to interact with these systems, for what purpose, and how sensors might enable those interactions. Additionally, the system needs to reliably make sense of the user's inputs in context, translate that interpretation into commands for the unmanned system, and give feedback to the user. In this paper, we describe an example natural interface for unmanned systems, called the Smart Interaction Device (SID), which enables natural two-way interaction with unmanned systems including the use of speech, sketch, and gestures. We present a few example applications SID to different types of unmanned systems and different kinds of interactions.

  18. Unmanned operation of Hydro Power Plants

    International Nuclear Information System (INIS)

    Regula, E.

    2008-01-01

    Intentions to launch unmanned operation are no news, the very first occurred in Hydro Power Plants (HPP) at the time when the first computer technology was implemented into process of power generation, i.e. no later than in 1960 s . ENEL entering Slovenske elektrarne not only revived but significantly accelerated the implementation process of unmanned operation. Experience of ENEL says that unmanned operation means better reliability of the HPP and this is the priority. (author)

  19. Unmanned Aerial Vehicle Systems for Disaster Relief: Tornado Alley

    Science.gov (United States)

    DeBusk, Wesley M.

    2009-01-01

    Unmanned aerial vehicle systems are currently in limited use for public service missions worldwide. Development of civil unmanned technology in the United States currently lags behind military unmanned technology development in part because of unresolved regulatory and technological issues. Civil unmanned aerial vehicle systems have potential to augment disaster relief and emergency response efforts. Optimal design of aerial systems for such applications will lead to unmanned vehicles which provide maximum potentiality for relief and emergency response while accounting for public safety concerns and regulatory requirements. A case study is presented that demonstrates application of a civil unmanned system to a disaster relief mission with the intent on saving lives. The concept utilizes unmanned aircraft to obtain advanced warning and damage assessments for tornados and severe thunderstorms. Overview of a tornado watch mission architecture as well as commentary on risk, cost, need for, and design tradeoffs for unmanned aerial systems are provided.

  20. Human health risk assessment database, "the NHSRC toxicity value database": supporting the risk assessment process at US EPA's National Homeland Security Research Center.

    Science.gov (United States)

    Moudgal, Chandrika J; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  1. Human health risk assessment database, 'the NHSRC toxicity value database': Supporting the risk assessment process at US EPA's National Homeland Security Research Center

    International Nuclear Information System (INIS)

    Moudgal, Chandrika J.; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-01-01

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007

  2. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  3. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  4. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability assessments. 27.240 Section 27.240 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval...

  5. Analysis of Unmanned Systems in Military Logistics

    Science.gov (United States)

    2016-12-01

    performance measures: customer satisfaction , flexibility, visibility, and trust. If we apply this explanation of Li and Schulze (2011) to the military...unmanned systems, initially, we aimed to define current and proposed unmanned applications in civilian-sector logistics and current military...aimed to define current and proposed unmanned applications in civilian-sector logistics and current military logistics challenges. Then, justifying

  6. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  7. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  8. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  9. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  10. The Port Security Grant Program: Good Enough, or Can it be Made Better

    Science.gov (United States)

    2016-06-01

    Statement of William O. Jenkins , Jr., Director Homeland Security and Justice, GAO 12-526T (Washington, DC, 2012) 4- 11, http://www.gao.gov/assets/590...127 de Rugy, “What Does Homeland Security Spending Buy?,” 13. 128 Yacov Haimes, Joost Santos, Kenneth Crowther, Matthew Henry ...Preparedness Grants and Assessing National Capabilities: Continuing Challenges Impede FEMA’s Progress, Statement of William O. Jenkins , Jr

  11. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  12. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order to...

  13. 33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zones; Chesapeake... HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS... Safety/Security Zones; Chesapeake Bay, Maryland. (a) Definitions. (1) Certain Dangerous Cargo (CDC) means...

  14. International Conference on Intelligent Unmanned Systems (ICIUS)

    CERN Document Server

    Kartidjo, Muljowidodo; Yoon, Kwang-Joon; Budiyono, Agus; Autonomous Control Systems and Vehicles : Intelligent Unmanned Systems

    2013-01-01

    The International Conference on Intelligent Unmanned Systems 2011 was organized by the International Society of Intelligent Unmanned Systems and locally by the Center for Bio-Micro Robotics Research at Chiba University, Japan. The event was the 7th conference continuing from previous conferences held in Seoul, Korea (2005, 2006), Bali, Indonesia (2007), Nanjing, China (2008), Jeju, Korea (2009), and Bali, Indonesia (2010). ICIUS 2011 focused on both theory and application, primarily covering the topics of robotics, autonomous vehicles, intelligent unmanned technologies, and biomimetics. We invited seven keynote speakers who dealt with related state-of-the-art technologies including unmanned aerial vehicles (UAVs) and micro air vehicles (MAVs), flapping wings (FWs), unmanned ground vehicles (UGVs), underwater vehicles (UVs), bio-inspired robotics, advanced control, and intelligent systems, among others. This book is a collection of excellent papers that were updated after presentation at ICIUS2011. All papers ...

  15. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  16. 19 CFR 122.181 - Definition of Customs security area.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  17. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  18. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  19. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  20. Unmanned Mobile Monitoring for Nuclear Emergency Response

    Energy Technology Data Exchange (ETDEWEB)

    Choi, YoungSoo; Park, JongWon; Kim, TaeWon; Jeong, KyungMin [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Severe accidents at nuclear power plant have led to significant consequences to the people, the environment or the facility. Therefore, the appropriate response is required for the mitigation of the accidents. In the past, most of responses were performed by human beings, but it was dangerous and risky. In this paper, we proposed unmanned mobile system for the monitoring of nuclear accident in order to response effectively. For the integrity of reactor cooling and containment building, reactor cooling pipe and hydrogen distribution monitoring with unmanned ground vehicle was designed. And, for the safety of workers, radiation distribution monitoring with unmanned aerial vehicle was designed. Unmanned mobile monitoring system was proposed to respond nuclear accidents effectively. Concept of reinforcing the integrity of RCS and containment building, and radiation distribution monitoring were described. RCS flow measuring, hydrogen distribution measuring and radiation monitoring deployed at unmanned vehicle were proposed. These systems could be a method for the preparedness of effective response of nuclear accidents.

  1. The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

    Science.gov (United States)

    2010-03-19

    trends. This report was designed to support the BEST’s and other operational components in planning and conducting outbound firearms smuggling...operations throughout the homeland and overseas through executing procurement, budget, logistics , and training functions. The Executive Information and...shooting and bombing rampage at two hotels , a railway station, hospital, Jewish Center, cafe, and cinema. 164 were killed. All of these attacks

  2. Primer Control System Cyber Security Framework and Technical Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  3. Development of a Geospatial Data-Sharing Method for Unmanned Vehicles Based on the Joint Architecture for Unmanned Systems (JAUS)

    Science.gov (United States)

    2005-08-01

    the Office of the Secretary of Defense chartered the Joint Architecture for Unmanned Ground Systems ( JAUGS ) Working Group to address these concerns...The JAUGS Working Group was tasked with developing an initial standard for interoperable unmanned ground systems. In 2002, the charter of the... JAUGS Working Group was 1 2 modified such that their efforts would extend to all unmanned systems, not only ground systems. The standard was

  4. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  5. An Innovative Unmanned System for Advanced Environmental Monitoring: Design and Development

    Science.gov (United States)

    Marsella, Ennio; Giordano, Laura; Evangelista, Lorenza; Iengo, Antonio; di Filippo, Alessandro; Coppola, Aniello

    2015-04-01

    The paper summarizes the design and development of a new technology and tools for real-time coordination and control of unmanned vehicles for advanced environmental monitoring. A new Unmanned System has been developed at Institute for Coastal Marine Environmental - National Research Council (Italy), in the framework of two National Operational Programs (PON): Technological Platform for Geophysical and Environmental Marine Survey-PITAM and Integrated Systems and Technologies for Geophysical and Environmental Monitoring in coastal-marine areas-STIGEAC. In particular, the system includes one Unmanned Aerial Vehicle (UAV) and two Unmanned Marine Vehicles (UMV). Major innovations concern the implementation of a new architecture to control each drone and/or to allow the cooperation between heterogeneous vehicles, the integration of distributed sensing techniques and real-time image processing capabilities. Part of the research in these projects involves, therefore, an architecture, where the ground operator can communicate with the Unmanned Vehicles at various levels of abstraction using pointing devices and video viewing. In detail, a Ground Control Station (GCS) has been design and developed to allow the government in security of the drones within a distance up to twenty kilometers for air explorations and within ten nautical miles for marine activities. The Ground Control Station has the following features: 1. hardware / software system for the definition of the mission profiles; 3. autonomous and semi-autonomous control system by remote control (joystick or other) for the UAV and UMVs; 4. integrated control system with comprehensive visualization capabilities, monitoring and archiving of real-time data acquired from scientific payload; 5. open structure to future additions of systems, sensors and / or additional vehicles. In detail, the UAV architecture is a dual-rotor, with an endurance ranging from 55 to 200 minutes, depending on payload weight (maximum 26 kg) and

  6. Design Validation of a {sup 10}B{sub 4}C Coated RSP with Multi-layered structure for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Su Hyun; Kim, Jong Yul; Lee, Joo Hyun; Moon, Mung Kook [KAERI, Daejeon (Korea, Republic of); Lim, Chang Hwy [Korea Research Institute of Ships and Ocean Engineering, Daejeon (Korea, Republic of); Lim, Ki Seo [Myongji University, Yongin (Korea, Republic of)

    2016-05-15

    It is a national priority to prevent radiological threats including radiological terrorism and smuggling nuclear material and devices. For this purpose, many governments and relevant organizations have been exploiting radiation detection technology. Especially, radiation portal monitor (RPM) is a widely used type of radiation detectors when it comes to homeland security and commonly deployed at strategic sites like airports and ports. In the most cases, they could be divided into two types of primary screening and secondary screening. In the latter case, hand-held detectors are mainly used for a closer inspection. On the other hand, RPMs for the primary screening, our concern, are stationary mounted type and comprise gamma-ray detector and neutron detector in many cases. The expected performance of the design of a RSP(Radiation Sensor Panel) has been demonstrated. According to the results of the simulation, three RSPs should be needed to meet the criterion mentioned in subsection 2.1. The design still can be validated when taking into account that the geometrical acceptance will be increased since it has been planned that the RPM is going to installed with four RSPs.

  7. Formation keeping of unmanned ground vehicles

    Directory of Open Access Journals (Sweden)

    Muangmin Kamonwan

    2017-01-01

    Full Text Available Controlling motions of an unmanned ground vehicle becomes more popular in real world practices. Its application is useful for household chores, military services, medical purposes, and industrial revolutions, etc. An analysis of motions by using the Fundamental Equations of Constrained Motion (FECM is one effective tool to determine the motions. Its conceptualization is done in three-step procedure as follows: (I Determining an unconstrained motion (II Assigning constraint equations and (III Computing a constrained motion. The equations of motion obtained are expressed as liner functions of acceleration. Then other kinematical information of the unmanned ground vehicles can be obtained by integration its acceleration. In this work, the FECM is used as a tool to analyze motions of a group of unmanned ground vehicles in various forms. The simulation results show that control forces obtained from the approach can regulate motions of unmanned ground vehicles to maneuver in desired formations.

  8. Neural network control of a parallel hybrid-electric propulsion system for a small unmanned aerial vehicle

    Science.gov (United States)

    Harmon, Frederick G.

    2005-11-01

    Parallel hybrid-electric propulsion systems would be beneficial for small unmanned aerial vehicles (UAVs) used for military, homeland security, and disaster-monitoring missions. The benefits, due to the hybrid and electric-only modes, include increased time-on-station and greater range as compared to electric-powered UAVs and stealth modes not available with gasoline-powered UAVs. This dissertation contributes to the research fields of small unmanned aerial vehicles, hybrid-electric propulsion system control, and intelligent control. A conceptual design of a small UAV with a parallel hybrid-electric propulsion system is provided. The UAV is intended for intelligence, surveillance, and reconnaissance (ISR) missions. A conceptual design reveals the trade-offs that must be considered to take advantage of the hybrid-electric propulsion system. The resulting hybrid-electric propulsion system is a two-point design that includes an engine primarily sized for cruise speed and an electric motor and battery pack that are primarily sized for a slower endurance speed. The electric motor provides additional power for take-off, climbing, and acceleration and also serves as a generator during charge-sustaining operation or regeneration. The intelligent control of the hybrid-electric propulsion system is based on an instantaneous optimization algorithm that generates a hyper-plane from the nonlinear efficiency maps for the internal combustion engine, electric motor, and lithium-ion battery pack. The hyper-plane incorporates charge-depletion and charge-sustaining strategies. The optimization algorithm is flexible and allows the operator/user to assign relative importance between the use of gasoline, electricity, and recharging depending on the intended mission. A MATLAB/Simulink model was developed to test the control algorithms. The Cerebellar Model Arithmetic Computer (CMAC) associative memory neural network is applied to the control of the UAVs parallel hybrid

  9. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Price, D E; Durling, R L

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  10. Strengthening Security during Sporting Events by Unmannde Aerial Vehicles

    NARCIS (Netherlands)

    Evers, L.

    2012-01-01

    This paper shows how Unmanned Aerial Vehicles (UAVs) can improve security in major sporting events. Given the increase in violence among sports fans it is important to timely monitor possible conflict locations. A UAV can patrol and remotely monitor the activity at these locations. Such a patrol

  11. 78 FR 54392 - Security Zone, Baltimore Harbor, Baltimore's Inner Harbor; Baltimore, MD

    Science.gov (United States)

    2013-09-04

    ... Department of Homeland Security FR Federal Register NPRM Notice of Proposed Rulemaking A. Regulatory History... the maritime safety and security of the general public. B. Basis and Purpose The National Football...

  12. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  13. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  14. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  15. FORMATION ALGORITHM OF DYNAMIC TURN FOR UNMANNED AERIAL VEHICLES ON APPROACH

    Directory of Open Access Journals (Sweden)

    Igor A. Chekhov

    2017-01-01

    Full Text Available Great interest in using unmanned aerial vehicles has recently been shown, both from economic entities, and from national security, defense and law enforcement agencies. However, for using UAV for the civil purposes there is now a number of problems which are connected with the use of airspace and without solving them it is impossible to use the UAV fully. It should be noted that the level of flight safety, both for regular aircraft, and for the UAV, has the primary value. It is necessary to use modern methods of data processing and to have an opportunity to quickly and effectively control the current flight safety level. For this purpose the fullest information on the current movement of aircraft and unmanned aerial vehicles, and also on the structure of the used airspace has to be used. The problem of procedures and maneuvers development that resolve potential traffic conflict including the UAV, is extremely important for air traffic safety especially in the vicinity of the destination or landing aerodrome. The possibility of creation of an algorithm of dynamic turn formation and the choice of a trajectory on approach of unmanned aerial vehicles is considered in this article. The technology of automatic dependent surveillance broadcast was used when collecting statistical data. Implementation of the landing algorithm is executed based on the criteria of ensuring efficiency and flight safety. The developed software provides the use only of open data on the aircraft movement in terminal airspace. The suggested algorithm can be adapted for air traffic management of the UAV in any selected airspace.

  16. Collaborative Unmanned Vehicles for Maritime Domain Awareness

    National Research Council Canada - National Science Library

    Healey, A. J; Horner, D. P; Kragelund, S. P

    2005-01-01

    Unmanned vehicles are becoming a critical component of military operations. As the vehicles develop in capability, there will be a trend for heterogeneous classes of unmanned vehicles to be able to work in a more collaborative fashion...

  17. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  18. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  19. The Effect of Appropriately and Inappropriately Applied Automation for the Control of Unmanned Systems on Operator Performance

    Science.gov (United States)

    2009-09-01

    2.1 Participants Twelve civilians (7 men and 5 women ) with no prior experience with the Robotic NCO simulation participated in this study. The mean...operators in a multitasking environment. 15. SUBJECT TERMS design guidelines, robotics, simulation, unmanned systems, automation 16. SECURITY...model of operator performance, or a hybrid method which combines one or more of these different invocation techniques (e.g., critical events and

  20. Controlling Unmanned Vehicles : the Human Factors Solution

    NARCIS (Netherlands)

    Erp, J.B.F. van

    2000-01-01

    Recent developments and experiences have proven the usefulness and potential of Unmanned Vehicles (UVs). Emerging technologies enable new missions, broadening the applicability of UVs from simple remote spies towards unmanned combat vehicles carrying lethal weapons. However, despite the emerging

  1. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  2. Department of Defense Involvement in Homeland Security: The Militarization of the Southwestern Border in the U.S

    National Research Council Canada - National Science Library

    Thompson, Michael A

    2008-01-01

    .... The Department of Defense (DoD) was given the lead role in Homeland Defense and it directed the U.S. Northern Command (USNORTHCOM) to implement plans and policies to defend against future terrorist attacks...

  3. C2 Link Security for UAS: Technical Literature Study and Preliminary Functional Requirements. Version 0.9 (Working Draft)

    Science.gov (United States)

    2005-01-01

    This document provides a study of the technical literature related to Command and Control (C2) link security for Unmanned Aircraft Systems (UAS) for operation in the National Airspace System (NAS). Included is a preliminary set of functional requirements for C2 link security.

  4. 33 CFR 165.720 - Safety/Security Zone: St. Johns River, Jacksonville, FL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: St. Johns... OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.720 Safety/Security Zone: St. Johns River, Jacksonville, FL. (a) Location. The water and the land...

  5. 78 FR 39301 - Committee name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-07-01

    ... early if the committee has completed its business. ADDRESSES: The meeting will be held at Ronald Reagan... research; campus and community resiliency, security and preparedness; faculty exchanges; and cybersecurity... Cybersecurity) will give progress reports. The HSAAC Subcommittee on Cybersecurity may present draft...

  6. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  7. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2013-08-01

    ... business card that directs customers to an online portal, a customer satisfaction card with survey... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  8. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    Science.gov (United States)

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  9. Mathematical Modeling Applied to Maritime Security

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Layered Defense: Modeling Terrorist Transfer Threat Networks and Optimizing Network Risk Reduction” Students in Ted Lewis’ Critical Infrastructure Protection course are taught how mathematic modeling can provide...

  10. Use of Unmanned Aerial Vehicles by the Islamic State: Nature of the Threat

    Directory of Open Access Journals (Sweden)

    David Mrva

    2018-01-01

    Full Text Available The proliferation of Unmanned Aerial Vehicles (UAVs on the battlefield does not exclude terrorist actors. Recently, there is an evident increase in the number of incidents when the so-called Islamic State has used UAVs. This article tries to describe this relatively new phenomenon and present an overview of main types of the potential Islamic State’s UAV employment in Europe. Despite the fact, that the UAV use by terrorist actors will probably not have the strategic impact by itself, it constitutes a new challenge for state security agencies.

  11. Manned-Unmanned Teaming of Aircraft - Literature Search

    Science.gov (United States)

    2013-12-01

    restricted to 2003 2013. Literature searches were conducted in eight databases Aerospace and High Technology, Scopus , NTIS, Inspec, Compendex, DTIC, Jane’si...Buddy Unmanned wingman Manned-Unmanned Teaming Dec 2013 Page 35 of 37 7.1.2 Sources Online databases • Scopus • Aerospace and High Technology

  12. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  13. Handbook of unmanned aerial vehicles

    CERN Document Server

    Vachtsevanos, George

    2015-01-01

    The Handbook of Unmanned Aerial Vehicles is a reference text for the academic and research communities, industry, manufacturers, users, practitioners, Federal Government, Federal and State Agencies, the private sector, as well as all organizations that are and will be using unmanned aircraft in a wide spectrum of applications. The Handbook covers all aspects of UAVs, from design to logistics and ethical issues. It is also targeting the young investigator, the future inventor and entrepreneur by providing an overview and detailed information of the state-of-the-art as well as useful new concepts that may lead to innovative research. The contents of the Handbook include material that addresses the needs and ‘know how’ of all of the above sectors targeting a very diverse audience. The Handbook offers a unique and comprehensive treatise of everything one needs to know about unmanned aircrafts, from conception to operation, from technologies to business activities, users, OEMs, reference sources, conferences, ...

  14. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  15. 33 CFR 165.116 - Safety and Security Zones; Salem and Boston Harbors, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Salem..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.116 Safety and Security Zones; Salem and Boston Harbors, Massachusetts. (a) Location. The...

  16. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2010-05-26

    ... business card that directs customers to an online portal. All responses are voluntary and there is no... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  17. New development thoughts on the bio-inspired intelligence based control for unmanned combat aerial vehicle

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Bio-inspired intelligence is in the spotlight in the field of international artificial intelligence,and unmanned combat aerial vehicle(UCAV),owing to its potential to perform dangerous,repetitive tasks in remote and hazardous,is very promising for the technological leadership of the nation and essential for improving the security of society.On the basis of introduction of bioinspired intelligence and UCAV,a series of new development thoughts on UCAV control are proposed,including artificial brain based high-level autonomous control for UCAV,swarm intelligence based cooperative control for multiple UCAVs,hy-brid swarm intelligence and Bayesian network based situation assessment under complicated combating environments, bio-inspired hardware based high-level autonomous control for UCAV,and meta-heuristic intelligence based heterogeneous cooperative control for multiple UCAVs and unmanned combat ground vehicles(UCGVs).The exact realization of the proposed new development thoughts can enhance the effectiveness of combat,while provide a series of novel breakthroughs for the intelligence,integration and advancement of future UCAV systems.

  18. 19 CFR 113.1 - Authority to require security or execution of bond.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority to require security or execution of bond. 113.1 Section 113.1 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS General Provisions § 113.1 Authority to require security or...

  19. Unmanned Aircraft Systems Roadmap, 2005-2030

    Science.gov (United States)

    2005-01-01

    UCAV Unmanned Combat Air Vehicle ISS Integrated Sensor Suite UCS Unmanned Control System ITU International Telecommunications Union UFO UHF...RDC) at Groton, CT. These have included alien and drug interdiction along the Texas coast and in the Caribbean, UA launch and recovery systems...altitude aircraft and UA; and narrowband services to support mobile and handheld services as a replacement or follow-on for the UHF Follow-On ( UFO

  20. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  1. Optimization of the Flight Path of an Unmanned Aerial Vehicle

    Directory of Open Access Journals (Sweden)

    Vasyl Myklukha

    2017-09-01

    Full Text Available The article describes the features of optimizing the flight path of an unmanned aerial vehicle. The paper analyzes the composition and designation of main equipment and payload of unmanned aerial vehicle. In particular, attention is drawn to the basic requirements that relate to the unmanned aerial vehicle today.

  2. A REVIEW OF TACTICAL UNMANNED AERIAL VEHICLE DESIGN STUDIES

    OpenAIRE

    Coban, Sezer; Oktay, Tugrul

    2017-01-01

    In this study, a literaturesearch was conducted on tactical unmanned aerial vehicles. First of all, it wasclassified as an unmanned aerial vehicle. It is mentioned about thecharacteristics of ZANKA-III, which is highly autonomous, passive and activemorphing, aerodynamically perfect, tactical unmanned aerial vehicle (TUAV)ZANKA-III, supported by TUBITAK's 1001 Ardeb program 115M603 by TUBITAK and itis mentioned that they have superior characteristics from other tacticalunmanned aerial veh...

  3. Delegation control of multiple unmanned systems

    Science.gov (United States)

    Flaherty, Susan R.; Shively, Robert J.

    2010-04-01

    Maturing technologies and complex payloads coupled with a future objective to reduce the logistics burden of current unmanned aerial systems (UAS) operations require a change to the 2-crew employment paradigm. Increased automation and operator supervisory control of unmanned systems have been advocated to meet the objective of reducing the crew requirements, while managing future technologies. Specifically, a delegation control employment strategy has resulted in reduced workload and higher situation awareness for single operators controlling multiple unmanned systems in empirical studies1,2. Delegation control is characterized by the ability for an operator to call a single "play" that initiates prescribed default actions for each vehicle and associated sensor related to a common mission goal. Based upon the effectiveness of delegation control in simulation, the U.S. Army Aeroflightdynamics Directorate (AFDD) developed a Delegation Control (DelCon) operator interface with voice recognition implementation for play selection, real-time play modification, and play status with automation transparency to enable single operator control of multiple unmanned systems in flight. AFDD successfully demonstrated delegation control in a Troops-in-Contact mission scenario at Ft. Ord in 2009. This summary showcases the effort as a beneficial advance in single operator control of multiple UAS.

  4. Building a new storyline for Florida's domestic security to provide future resiliency for the state

    OpenAIRE

    Pape, Dominick D.

    2008-01-01

    CHDS State/Local Quickly after the 9/11 event, the state of Florida drafted one of the Nation's first comprehensive counterterrorism strategies to aid in the protection of the state's visitors and citizens. This strategy was drafted early in the new paradigm of Homeland Security. The strategy had several modifications over the years but has not had a comprehensive review since its inception. Many things have changed in the arena of Homeland Security since that first step after the 9/11 ...

  5. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  6. Adapting existing training standards for unmanned aircraft: finding ways to train staff for unmanned aircraft operations

    CSIR Research Space (South Africa)

    Burger, CR

    2011-09-01

    Full Text Available - unmanned aircraft; pilot training. I. INTRODUCTION Unmanned aircraft offer flexibility not found in manned aircraft. They can be made smaller and cheaper to operate. They offer payload advantages relative to small manned aircraft. They can also perform... certificate to non-state users. To facilitate useful operations by UAs, future operations must be subject to no more than routine notification (e.g. an ATC flight plan), just like manned aircraft already are. Before such operations can be established, some...

  7. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-10-26

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the conference... President regarding their review of the Department of Homeland Security's (DHS) National Cybersecurity and...

  8. 77 FR 32898 - Safety & Security Zones; OPSAIL 2012 Connecticut, Thames River, New London, CT

    Science.gov (United States)

    2012-06-04

    ... 1625-AA00; AA87 Safety & Security Zones; OPSAIL 2012 Connecticut, Thames River, New London, CT AGENCY... 20, 2012 the Coast Guard published a notice of proposed rulemaking entitled Safety & Security Zones... Homeland Security Delegation No. 0170.1, which collectively authorize the Coast Guard to define safety and...

  9. Vision enhanced navigation for unmanned systems

    Science.gov (United States)

    Wampler, Brandon Loy

    A vision based simultaneous localization and mapping (SLAM) algorithm is evaluated for use on unmanned systems. SLAM is a technique used by a vehicle to build a map of an environment while concurrently keeping track of its location within the map, without a priori knowledge. The work in this thesis is focused on using SLAM as a navigation solution when global positioning system (GPS) service is degraded or temporarily unavailable. Previous work on unmanned systems that lead up to the determination that a better navigation solution than GPS alone is first presented. This previous work includes control of unmanned systems, simulation, and unmanned vehicle hardware testing. The proposed SLAM algorithm follows the work originally developed by Davidson et al. in which they dub their algorithm MonoSLAM [1--4]. A new approach using the Pyramidal Lucas-Kanade feature tracking algorithm from Intel's OpenCV (open computer vision) library is presented as a means of keeping correct landmark correspondences as the vehicle moves through the scene. Though this landmark tracking method is unusable for long term SLAM due to its inability to recognize revisited landmarks, as opposed to the Scale Invariant Feature Transform (SIFT) and Speeded Up Robust Features (SURF), its computational efficiency makes it a good candidate for short term navigation between GPS position updates. Additional sensor information is then considered by fusing INS and GPS information into the SLAM filter. The SLAM system, in its vision only and vision/IMU form, is tested on a table top, in an open room, and finally in an outdoor environment. For the outdoor environment, a form of the slam algorithm that fuses vision, IMU, and GPS information is tested. The proposed SLAM algorithm, and its several forms, are implemented in C++ using an Extended Kalman Filter (EKF). Experiments utilizing a live video feed from a webcam are performed. The different forms of the filter are compared and conclusions are made on

  10. Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management

    International Nuclear Information System (INIS)

    Durling, Jr. R.L.; Price, D.E.

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  11. 77 FR 75017 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2012-12-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2012-1038] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION... to read as follows: Sec. 165.T14-215 Security Zone; On the Waters in Kailua Bay, Oahu, HI. (a...

  12. Risk Assessment for an Unmanned Merchant Ship

    Directory of Open Access Journals (Sweden)

    Ø.J. Rødseth

    2015-09-01

    Full Text Available The MUNIN project is doing a feasibility study on an unmanned bulk carrier on an intercontinental voyage. To develop the technical and operational concepts, MUNIN has used a risk-based design method, based on the Formal Safety Analysis method which is also recommended by the International Mari-time Organization. Scenario analysis has been used to identify risks and to simplify operational scope. Systematic hazard identification has been used to find critical safety and security risks and how to address these. Technology and operational concept testing is using a hypothesis-based test method, where the hypotheses have been created as a result of the risk assessment. Finally, the cost-benefit assessment will also use results from the risk assessment. This paper describes the risk assessment method, some of the most important results and also describes how the results have been or will be used in the different parts of the project.

  13. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  14. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  15. Focused Lens on Unmanned Aerial Systems: An Evaluation of Department of Defense’s Unmanned Aerial Vision 2011

    Science.gov (United States)

    2014-06-13

    Break Free of Regulations.” 69Barbara Opall -Rome, “ Israel Tackles The Last Frontier Of UAS Technology: Israel Moves Closer Toward Flying UASs In...with the new F-35 Joint Strike Fighter once it comes online, or with helicopters aboard the Littoral Combat Ship. Unmanned mine hunters could operate...Office, 2002. ———. Unmanned Aircraft Systems Roadmap 2005-2030. Washington, DC: Government Publishing Office, 2005. Opall -Rome, Barbra. “Israel

  16. Research on Aerodynamic Characteristics of Composite powered Unmanned Airship

    Science.gov (United States)

    Chen, Yu; Wang, Yun; Wang, Lu; Ma, Chengyu; Xia, Jun

    2017-10-01

    The main structure of the composite powered unmanned airship is consists of airbags and four-rotor system, which airbag increases the available lift, and has more advantages in terms of load and flight when compared with the traditional four-rotor. In order to compare the aerodynamic performance of the composite powered unmanned airship and the traditional four-rotor, the SIMPLE algorithm and the RNG k-epsilon model method are be used. The energy consumption of the composite powered unmanned airship is lesser than the traditional four-rotor under the same load and range was found.

  17. 33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.

    Science.gov (United States)

    2010-07-01

    ... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone...

  18. 33 CFR 165.731 - Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River Entrance Channel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: Cumberland... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED... Seventh Coast Guard District § 165.731 Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River...

  19. 76 FR 9646 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-22

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 100, 117, 147, and 165 [USCG-2010-0399] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation Regulations and Regulated Navigation Areas AGENCY: Coast Guard, DHS. ACTION: Notice of expired temporary rules...

  20. NASA Unmanned Aircraft (UA) Control and Non-Payload Communication (CNPC) System Waveform Trade Studies

    Science.gov (United States)

    Chavez, Carlos; Hammel, Bruce; Hammel, Allan; Moore, John R.

    2014-01-01

    Unmanned Aircraft Systems (UAS) represent a new capability that will provide a variety of services in the government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized due to the lack of a common understanding of what is required to safely operate UAS in the National Airspace System (NAS). To address this deficiency, NASA has established a project called UAS Integration in the NAS (UAS in the NAS), under the Integrated Systems Research Program (ISRP) of the Aeronautics Research Mission Directorate (ARMD). This project provides an opportunity to transition concepts, technology, algorithms, and knowledge to the Federal Aviation Administration (FAA) and other stakeholders to help them define the requirements, regulations, and issues for routine UAS access to the NAS. The safe, routine, and efficient integration of UAS into the NAS requires new radio frequency (RF) spectrum allocations and a new data communications system which is both secure and scalable with increasing UAS traffic without adversely impacting the Air Traffic Control (ATC) communication system. These data communications, referred to as Control and Non-Payload Communications (CNPC), whose purpose is to exchange information between the unmanned aircraft and the ground control station to ensure safe, reliable, and effective unmanned aircraft flight operation. A Communications Subproject within the UAS in the NAS Project has been established to address issues related to CNPC development, certification and fielding. The focus of the Communications Subproject is on validating and allocating new RF spectrum and data link communications to enable civil UAS integration into the NAS. The goal is to validate secure, robust data links within the allocated frequency spectrum for UAS. A vision, architectural concepts, and seed requirements for the future commercial UAS CNPC system have been developed by RTCA Special Committee 203 (SC-203) in the process

  1. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    Science.gov (United States)

    2016-08-01

    and opinions regarding potential drawbacks to date. While the drawbacks noted are significant, we also identified several poten- tial benefits to...defend, as it deals entirely in hypothet- ical situations and is based solely on the opinions and conjecture of those interviewed. Nonetheless, stream...of Staff, Homeland Defense, Joint Publica - tion 3-27, Washington, DC: Joint Chiefs of Staff, July 29, 2013, Ap- pendix A, pp. A-1 – A-6. 9

  2. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  3. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  4. Cooperative conflict detection and resolution of civil unmanned aerial vehicles in metropolis

    Directory of Open Access Journals (Sweden)

    Jian Yang

    2016-06-01

    Full Text Available Unmanned air vehicles have recently attracted attention of many researchers because of their potential civil applications. A systematic integration of unmanned air vehicles in non-segregated airspace is required that allows safe operation of unmanned air vehicles along with other manned aircrafts. One of the critical issues is conflict detection and resolution. This article proposes to solve unmanned air vehicles’ conflict detection and resolution problem in metropolis airspace. First, the structure of metropolis airspace in the coming future is studied, and the airspace conflict problem between different unmanned air vehicles is analyzed by velocity obstacle theory. Second, a conflict detection and resolution framework in metropolis is proposed, and factors that have influences on conflict-free solutions are discussed. Third, the multi-unmanned air vehicle conflict resolution problem is formalized as a nonlinear optimization problem with the aim of minimizing overall conflict resolution consumption. The safe separation constraint is further discussed to improve the computation efficiency. When the speeds of conflict-involved unmanned air vehicles are equal, the nonlinear safe separation constraint is transformed into linear constraints. The problem is solved by mixed integer convex programming. When unmanned air vehicles are with unequal speeds, we propose to solve the nonlinear optimization problem by stochastic parallel gradient descent–based method. Our approaches are demonstrated in computational examples.

  5. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    Protection’s office responsible for securing the United States’ land border in the Detroit area. PoD provides a wide rage of cargo processing functions...a wide range of threats. Improper trademark labeling, tariffs, import quotas, agricultural issues, narcotics, human trafficking, and terrorism are...unloaded a truck, CBP agents search through the cargo. They open boxes, use hand-held radiation detectors, canines , and x-ray machines to inspect the

  6. Mitigations for Security Vulnerabilities Found in Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Trent D. Nelson

    2006-05-01

    Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

  7. Approach for Autonomous Control of Unmanned Aerial Vehicle Using Intelligent Agents for Knowledge Creation

    Science.gov (United States)

    Dufrene, Warren R., Jr.

    2004-01-01

    This paper describes the development of a planned approach for Autonomous operation of an Unmanned Aerial Vehicle (UAV). A Hybrid approach will seek to provide Knowledge Generation through the application of Artificial Intelligence (AI) and Intelligent Agents (IA) for UAV control. The applications of several different types of AI techniques for flight are explored during this research effort. The research concentration is directed to the application of different AI methods within the UAV arena. By evaluating AI and biological system approaches. which include Expert Systems, Neural Networks. Intelligent Agents, Fuzzy Logic, and Complex Adaptive Systems, a new insight may be gained into the benefits of AI and CAS techniques applied to achieving true autonomous operation of these systems. Although flight systems were explored, the benefits should apply to many Unmanned Vehicles such as: Rovers. Ocean Explorers, Robots, and autonomous operation systems. A portion of the flight system is broken down into control agents that represent the intelligent agent approach used in AI. After the completion of a successful approach, a framework for applying an intelligent agent is presented. The initial results from simulation of a security agent for communication are presented.

  8. Tracking Unmanned Aerial Vehicle CTU FTS - Application of equipment

    Directory of Open Access Journals (Sweden)

    David Hůlek

    2015-10-01

    Full Text Available Article which is about the Tracking Unmanned Aerial Vehicle continues in the description of the project development dealing with the utilization of the UAV (unmanned aerial vehicle. Documentation of the project progresses builds on the previous article. In that article the selection of observation and transmission equipment was summarized. In the article, the reader learns about an installation of the equipment on the UAV (helicopter, about an interconnection of the equipment to create complete and functional system, about testing of the UAV, about the solutions of the problems which came into being during testing and about protection of the equipment against unfavourable effects. The location of equipment on the unmanned vehicle was chosen after a considering of several parameters. These parameters are preservation of the functionality or an influence to the balance. To find out how the added equipment affect the centre of gravity of the UAV the tabular method of the centre of gravity calculation was used. The results of the existing work on the project are location and attaching of the equipment to the unmanned vehicle, balance of the unmanned vehicle, solutions of the problems coming into being during the testing and design of the equipment protection against unfavourable effects.

  9. The Security and Defense of America's Ports: An Assessment of Coast Guard and Navy Roles, Capabilities and Synchronization

    National Research Council Canada - National Science Library

    Richardt, Timothy P

    2006-01-01

    .... The United States must thus act to increase security for seaborne commerce and create depth of enforcement through the assets of the Department of Homeland Security and the Department of Defense...

  10. (Congressional Interest) Institute for Science, Space and Security (ISSS)

    Science.gov (United States)

    2012-03-19

    Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees

  11. 77 FR 9528 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2012-02-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Waterway Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 17, 2012, through 11...

  12. Extra-light gamma-ray imager for safeguards and homeland security

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Oleg P.; Semin, Ilya A.; Potapov, Victor N.; Stepanov, Vyacheslav E. [National Research Centre Kurchatov Institute, Moscow, 123182, (Russian Federation)

    2015-07-01

    Gamma-ray imaging is the most important way to identify unknown gamma-ray emitting objects in decommissioning, security, overcoming accidents. Over the past two decades a system for producing of gamma images in these conditions became more or less portable devices. But in recent years these systems have become the hand-held devices. This is very important, especially in emergency situations, and measurements for safety reasons. We describe the first integrated hand-held instrument for emergency and security applications. The device is based on the coded aperture image formation, position sensitive gamma-ray (X-ray) detector Medipix2 (detectors produces by X-ray Imaging Europe) and tablet computer. The development was aimed at creating a very low weight system with high angular resolution. We present some sample gamma-ray images by camera. Main estimated parameters of the system are the following. The field of view video channel ∼ 490 deg. The field of view gamma channel ∼ 300 deg. The sensitivity of the system with a hexagonal mask for the source of Cs-137 (Eg = 662 keV), is in units of dose D ∼ 100 mR. This option is less then order of magnitude worse than for the heavy, non-hand-held systems (e.g., gamma-camera Cartogam, by Canberra.) The angular resolution of the gamma channel for the sources of Cs-137 (Eg = 662 keV) is about 1.20 deg. (authors)

  13. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters..., California. 165.1192 Section 165.1192 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport...

  14. 33 CFR 165.502 - Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cove... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...

  15. 76 FR 3014 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2011-01-19

    ... Coast Guard will enforce the Blair Waterway security zone in Commencement Bay, WA for protection of... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0015] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS...

  16. 78 FR 54588 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6:00 a.m. on September 2, 2013 through 11:59 p.m...

  17. 78 FR 57485 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on September 12, 2013 through 11:59 p.m...

  18. Remote sensing and actuation using unmanned vehicles

    CERN Document Server

    Chao, Haiyang

    2012-01-01

    Unmanned systems and robotics technologies have become very popular recently owing to their ability to replace human beings in dangerous, tedious, or repetitious jobs. This book fill the gap in the field between research and real-world applications, providing scientists and engineers with essential information on how to design and employ networked unmanned vehicles for remote sensing and distributed control purposes. Target scenarios include environmental or agricultural applications such as river/reservoir surveillance, wind profiling measurement, and monitoring/control of chemical leaks.

  19. Bespilotne letjelice : Unmanned aerial vehicles

    Directory of Open Access Journals (Sweden)

    Vlado Jurić

    2016-12-01

    Full Text Available Bespilotne letjelice imaju širok spektar uporabe, i svrha im svakim danom sve više dobiva na značaju. Konstrukcija im se poboljšava, pronalaze se materijali koji su optimalniji za obavljanje funkcija s kojima se trebaju suočiti. Pravna regulativa za bespilotne letjelice do 150 kg težine na polijetanju (MTOW se razlikuje od države do države. : Unmanned aerial vehicles have a wide range of applications, and their purpose is every day more important. Construction has been improving, finding the materials that are optimal for carrying out the functions which need to be cope with. Legal regulations for unmanned aircrafts up to 150 kg take-off weight (MTOW varies from country to country.

  20. Control Systems Cyber Security Standards Support Activities

    Energy Technology Data Exchange (ETDEWEB)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  1. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  2. 33 CFR 165.1321 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Protection of... Areas Thirteenth Coast Guard District § 165.1321 Security Zone; Protection of Military Cargo, Captain of... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY...

  3. Cooperative path planning of unmanned aerial vehicles

    CERN Document Server

    Tsourdos, Antonios; Shanmugavel, Madhavan

    2010-01-01

    An invaluable addition to the literature on UAV guidance and cooperative control, Cooperative Path Planning of Unmanned Aerial Vehicles is a dedicated, practical guide to computational path planning for UAVs. One of the key issues facing future development of UAVs is path planning: it is vital that swarm UAVs/ MAVs can cooperate together in a coordinated manner, obeying a pre-planned course but able to react to their environment by communicating and cooperating. An optimized path is necessary in order to ensure a UAV completes its mission efficiently, safely, and successfully. Focussing on the path planning of multiple UAVs for simultaneous arrival on target, Cooperative Path Planning of Unmanned Aerial Vehicles also offers coverage of path planners that are applicable to land, sea, or space-borne vehicles. Cooperative Path Planning of Unmanned Aerial Vehicles is authored by leading researchers from Cranfield University and provides an authoritative resource for researchers, academics and engineers working in...

  4. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  5. Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft

    Science.gov (United States)

    2013-03-27

    Patton, Nikos Karapanos, Lorenz Meier, Peter Schwabe, Andrew Tridgell, Michael Oborne, Dr. Gareth Owen, and Capt Matthew Vincie, all of whom greatly...Frew and T. Brown . Networking Issues For Small Unmanned Aircraft Systems. In Unmanned Aircraft Systems : International Symposium on Unmanned Aerial

  6. 76 FR 22809 - Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2011-04-25

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0196] RIN 1625-AA00 Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA AGENCY... Security Exercise; San Francisco Bay, San Francisco, CA. (a) Location. The limits of this safety zone...

  7. 78 FR 79312 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2013-12-30

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2013-0934] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION..., Oahu, HI. (a) Location. The following area, within the COTP Honolulu Zone (see 33 CFR 3.70-10), from...

  8. Counter Unmanned Aerial Systems Testing: Evaluation of VIS SWIR MWIR and LWIR passive imagers.

    Energy Technology Data Exchange (ETDEWEB)

    Birch, Gabriel Carlisle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Woo, Bryana Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-01-01

    This report contains analysis of unmanned aerial systems as imaged by visible, short-wave infrared, mid-wave infrared, and long-wave infrared passive devices. Testing was conducted at the Nevada National Security Site (NNSS) during the week of August 15, 2016. Target images in all spectral bands are shown and contrast versus background is reported. Calculations are performed to determine estimated pixels-on-target for detection and assessment levels, and the number of pixels needed to cover a hemisphere for detection or assessment at defined distances. Background clutter challenges are qualitatively discussed for different spectral bands, and low contrast scenarios are highlighted for long-wave infrared imagers.

  9. Intelligent autonomy for unmanned naval systems

    Science.gov (United States)

    Steinberg, Marc

    2006-05-01

    This paper provides an overview of the development and demonstration of intelligent autonomy technologies for control of heterogeneous unmanned naval air and sea vehicles and describes some of the current limitations of such technologies. The focus is on modular technologies that support highly automated retasking and fully autonomous dynamic replanning for up to ten heterogeneous unmanned systems based on high-level mission objectives, priorities, constraints, and Rules-of-Engagement. A key aspect of the demonstrations is incorporating frequent naval operator evaluations in order to gain better understanding of the integrated man/machine system and its tactical utility. These evaluations help ensure that the automation can provide information to the user in a meaningful way and that the user has a sufficient level of control and situation awareness to task the system as needed to complete complex mission tasks. Another important aspect of the program is examination of the interactions of higher-level autonomy algorithms with other relevant components that would be needed within the decision-making and control loops. Examples of these are vision and other sensor processing algorithms, sensor fusion, obstacle avoidance, and other lower level vehicle autonomous navigation, guidance, and control functions. Initial experiments have been completed using medium and high-fidelity vehicle simulations in a virtual warfare environment and inexpensive surrogate vehicles in flight and in-water demonstrations. Simulation experiments included integration of multi-vehicle task allocation, dynamic replanning under constraints, lower level autonomous vehicle control, automatic assessment of the impact of contingencies on plans, management of situation awareness data, operator alert management, and a mixed-initiative operator interface. In-water demonstrations of a maritime situation awareness capability were completed in both a river and a harbor environment using unmanned surface

  10. Unmanned air vehicle (UAV) ultra-persitence research

    Energy Technology Data Exchange (ETDEWEB)

    Dron, S. B.

    2012-03-01

    Sandia National Laboratories and Northrop Grumman Corporation Integrated Systems, Unmanned Systems (NGIS UMS) collaborated to further ultra-persistence technologies for unmanned air vehicles (UAVs). The greatest shortfalls in UAV capabilities have been repeatedly identified as (1) insufficient flight persistence or 'hang time,' (2) marginal electrical power for running higher power avionics and payload systems, and (3) inadequate communications bandwidth and reach. NGIS UMS requested support from Sandia to develop an ultra-persistent propulsion and power system (UP3S) for potential incorporation into next generation UAV systems. The team members tried to determine which energy storage and power generation concepts could most effectively push UAV propulsion and electrical power capabilities to increase UAV sortie duration from days to months while increasing available electrical power at least two-fold. Primary research and development areas that were pursued included these goals: perform general system engineering and integration analyses; develop initial thermal and electrical power estimates; provide mass, volume, dimensional, and balance estimates; conduct preliminary safety assessments; assess logistics support requirements; perform, preliminary assessments of any security and safeguards; evaluate options for removal, replacement, and disposition of materials; generally advance the potential of the UP3S concept. The effort contrasted and compared eight heat sources technologies, three power conversion, two dual cycle propulsion system configurations, and a single electrical power generation scheme. Overall performance, specific power parameters, technical complexities, security, safety, and other operational features were successfully investigated. Large and medium sized UAV systems were envisioned and operational flight profiles were developed for each concept. Heat source creation and support challenges for domestic and expeditionary operations were

  11. ARM Unmanned Aerial Systems Implementation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Schmid, Beat [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ivey, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-11-01

    Recent advances in Unmanned Aerial Systems (UAS) coupled with changes in the regulatory environment for operations of UAS in the National Airspace increase the potential value of UAS to the U.S. Department of Energy (DOE) Atmospheric Radiation Measurement (ARM) Climate Research Facility. UAS include unmanned aerial vehicles (UAV) and tethered balloon systems (TBS). The roles UAVs and TBSs could play within the ARM Facility, particularly science questions they could help address, have been discussed in several workshops, reports, and vision documents, including: This document describes the implementation of a robust and vigorous program for use of UAV and TBS for the science missions ARM supports.

  12. National Security Reform 2010: A Mid-Term Assessment

    Science.gov (United States)

    2011-08-01

    ministration that has not pressed Congress to do the right thing. The poster child for the lack of integrated effort is the challenge of homeland security...26, 2006, available from www.heritage.org/research/lecture/herding-cats-understanding- why-government-agencies- dont -cooperate-and-how-to-fix-the

  13. Plotting the Flight Envelope of an Unmanned Aircraft System Air Vehicle

    Directory of Open Access Journals (Sweden)

    Glīzde Nikolajs

    2017-08-01

    Full Text Available The research is focused on the development of an Unmanned Aircraft System. One of the design process steps in the preliminary design phase is the calculation of the flight envelope for the Unmanned Aircraft System air vehicle. The results obtained will be used in the further design process. A flight envelope determines the minimum requirements for the object in Certification Specifications. The present situation does not impose any Certification Specification requirements for the class of the Unmanned Aircraft System under the development of the general European Union trend defined in the road map for the implementation of the Unmanned Aircraft System. However, operation in common European Aerospace imposes the necessity for regulations for micro class systems as well.

  14. 78 FR 7265 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 1, 2013, through 11:59 p.m...

  15. 78 FR 11981 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-21

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 23, 2013, through 11:59 p.m...

  16. Use of Unmanned Aerial Assault Vehicles (UAAV) as an Asymmetric Factor

    OpenAIRE

    Eker, Alper Alpaslan; Sallar, Eray; Turan, Yasin

    2014-01-01

    In the 21st century, unmanned systems (especially unmanned aerial vehicles) will play a dominant role in the operational fields. Thanks to the technological developments witnessed in many fields, the use of unmanned aerial vehicles for military purposes is becoming easier. Looking at the operations carried out over the last 25 years, it can be seen that most were conducted in residential areas, where and techniques, tactics and equipment with asymmetric effects will make significant differenc...

  17. STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    Science.gov (United States)

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    2009-05-01

    The U.S. Department of Homeland Security's Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to defeat explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.

  18. 76 FR 12 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-01-03

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-1111] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., Oahu, HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3...

  19. 76 FR 80251 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-12-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1142] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3.70...

  20. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-07-30

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the [[Page... of their review of the Department of Homeland Security's (DHS) National Cybersecurity and... the NSTAC's proposed Joint Collaboration Center that the NSTAC envisioned in its 2009 Cybersecurity...

  1. 33 CFR 165.1182 - Safety/Security Zone: San Francisco Bay, San Pablo Bay, Carquinez Strait, and Suisun Bay, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: San... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Eleventh Coast Guard District § 165.1182 Safety/Security Zone: San Francisco Bay, San Pablo Bay...

  2. The availability of unmanned air vehicles: a post-case study

    NARCIS (Netherlands)

    Smith, M.A.J.; Dekker, R.; Kos, J.; Hontelez, J.A.M.

    2001-01-01

    An Unmanned Air Vehicle (UAV) is an unmanned, remotely controlled, small air vehicle. It has an important role in antisurface warfare. This implies over-the-horizon detection, classification, targeting and battle damage assessment. To perform these tasks several UAVs are needed to assist or

  3. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  4. Regulation of Unmanned Aerial Systems and Related Privacy Issues in Lithuania

    Directory of Open Access Journals (Sweden)

    Pūraitė Aurelija

    2017-12-01

    Full Text Available In the past few years the use of unmanned aerial vehicles in Lithuania has significantly increased. However, enjoying the advantages of this technology, which improves society’s socio-economical safety (public safety in a broad sense, raises some privacy concerns. This article analyses European Union and national legal regulations regarding the use of unmanned aerial vehicles as well as legal tools for defence of the right to privacy or prevention from its breaches in the Republic of Lithuania. Unmanned aerial vehicles have become popular only recently; thus, legislation regarding their use has not yet become a common topic among lawyers. Furthermore, case law of the Republic of Lithuania is silent about it. Thus, the authors model a situation of breach of privacy using an unmanned aerial vehicle and analyse possible defence mechanisms.

  5. Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations

    Science.gov (United States)

    2015-12-01

    Journal of Criminology 49 no. 5 (2009): 628–645. 28 Torin Monahan, “The Future of Security? Surveillance Operations at Homeland Security Fusion...terrorism Imagining Future Crime in the ‘War on Terror.’” British Journal of Criminology 49 no. 5 (2009): 628–645. McLaughlin, John. “Serving the

  6. UNMANNED AERIAL VEHICLE USE FOR WOOD CHIPS PILE VOLUME ESTIMATION

    Directory of Open Access Journals (Sweden)

    M. Mokroš

    2016-06-01

    Full Text Available The rapid development of unmanned aerial vehicles is a challenge for applied research. Many technologies are developed and then researcher are looking up for their application in different sectors. Therefore, we decided to verify the use of the unmanned aerial vehicle for wood chips pile monitoring. We compared the use of GNSS device and unmanned aerial vehicle for volume estimation of four wood chips piles. We used DJI Phantom 3 Professional with the built-in camera and GNSS device (geoexplorer 6000. We used Agisoft photoscan for processing photos and ArcGIS for processing points. Volumes calculated from pictures were not statistically significantly different from amounts calculated from GNSS data and high correlation between them was found (p = 0.9993. We conclude that the use of unmanned aerial vehicle instead of the GNSS device does not lead to significantly different results. Tthe data collection consumed from almost 12 to 20 times less time with the use of UAV. Additionally, UAV provides documentation trough orthomosaic.

  7. 33 CFR 165.169 - Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: New... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...

  8. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R L; Price, D E; Spero, K K

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  9. ICAROUS: Integrated Configurable Architecture for Unmanned Systems

    Science.gov (United States)

    Consiglio, Maria C.

    2016-01-01

    NASA's Unmanned Aerial System (UAS) Traffic Management (UTM) project aims at enabling near-term, safe operations of small UAS vehicles in uncontrolled airspace, i.e., Class G airspace. A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight operations. This video describes a new capability referred to as ICAROUS (Integrated Configurable Algorithms for Reliable Operations of Unmanned Systems), which is being developed under the auspices of the UTM project. ICAROUS is a software architecture comprised of highly assured algorithms for building safety-centric, autonomous, unmanned aircraft applications. Central to the development of the ICAROUS algorithms is the use of well-established formal methods to guarantee higher levels of safety assurance by monitoring and bounding the behavior of autonomous systems. The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and autonomous detect and avoid functions. ICAROUS also provides a highly configurable user interface that enables the modular integration of mission-specific software components.

  10. Unmanned Mine of the 21st Centuries

    Science.gov (United States)

    Semykina, Irina; Grigoryev, Aleksandr; Gargayev, Andrey; Zavyalov, Valeriy

    2017-11-01

    The article is analytical. It considers the construction principles of the automation system structure which realize the concept of «unmanned mine». All of these principles intend to deal with problems caused by a continuous complication of mining-and-geological conditions at coalmine such as the labor safety and health protection, the weak integration of different mining automation subsystems and the deficiency of optimal balance between a quantity of resource and energy consumed by mining machines and their throughput. The authors describe the main problems and neck stage of mining machines autonomation and automation subsystem. The article makes a general survey of the applied «unmanned technology» in the field of mining such as the remotely operated autonomous complexes, the underground positioning systems of mining machines using infrared radiation in mine workings etc. The concept of «unmanned mine» is considered with an example of the robotic road heading machine. In the final, the authors analyze the techniques and methods that could solve the task of underground mining without human labor.

  11. INTEGRATING UNMANNED AIRCRAFT VEHICLES IN THE ROMANIAN NATIONAL AIRSPACE

    Directory of Open Access Journals (Sweden)

    Sorana Alina Catinca POP

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles in the Romanian civil airspace brings us back to the 1920's, when the first aircraft started to fly over the Romanian sky. Little did the legislators at that time know how to create the proper legal framework for the use of such machines so that all aspects related to their use be covered, as well as identify all potential risks and effects. Nowadays, UAVs are the new aircraft and it is a challenge for the legislators to properly identify the legal framework so that the safety and security of civil aviation are not affected. The paper will address the challenges the regulator faces in the integration of the UAVs in the Romanian civil airspace, developments and issues raised by the current regulation, as well as aspects related to the national regulations expected to enter into force at the end of 2015, beginning of 2016.

  12. 33 CFR 165.154 - Safety and Security Zones: Long Island Sound Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: Long... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.154 Safety and Security Zones: Long Island Sound Marine...

  13. Unmanned aircraft system bridge inspection demonstration project phase II final report.

    Science.gov (United States)

    2017-06-01

    An Unmanned Aircraft System (UAS) is defined by the Federal Aviation Administration (FAA) as an aircraft operated without the possibility of direct human intervention from within the aircraft. Unmanned aircraft are familiarly referred to as drones, a...

  14. Experimental and rendering-based investigation of laser radar cross sections of small unmanned aerial vehicles

    Science.gov (United States)

    Laurenzis, Martin; Bacher, Emmanuel; Christnacher, Frank

    2017-12-01

    Laser imaging systems are prominent candidates for detection and tracking of small unmanned aerial vehicles (UAVs) in current and future security scenarios. Laser reflection characteristics for laser imaging (e.g., laser gated viewing) of small UAVs are investigated to determine their laser radar cross section (LRCS) by analyzing the intensity distribution of laser reflection in high resolution images. For the first time, LRCSs are determined in a combined experimental and computational approaches by high resolution laser gated viewing and three-dimensional rendering. An optimized simple surface model is calculated taking into account diffuse and specular reflectance properties based on the Oren-Nayar and the Cook-Torrance reflectance models, respectively.

  15. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Science.gov (United States)

    2011-06-14

    ... business practices. Information will be submitted to DHS/NPPD through the Chemical Security Assessment Tool... programs. DHS/ TSA/TTAC will compare the information of affected individuals collected by DHS (via CSAT) to... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses...

  16. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-05-03

    ... reason: Vessel traffic can pass safely around the security zone. If you think that your business... its effects on them and participate in the rulemaking. If the rule would affect your small business... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625...

  17. The future of infrastructure security :

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  18. Unmanned Aerial Vehicle-Based Automobile License Plate Recognition System for Institutional Parking Lots

    Directory of Open Access Journals (Sweden)

    Julian Dasilva

    2017-10-01

    Full Text Available Unmanned aerial vehicles (UAVs, also known as drones have many applications and they are a current trend across many industries. They can be used for delivery, sports, surveillance, professional photography, cinematography, military combat, natural disaster assistance, security, and the list grows every day. Programming opens an avenue to automate many processes of daily life and with the drone as aerial programmable eyes, security and surveillance can become more efficient and cost effective. At Barry University, parking is becoming an issue as the number of people visiting the school greatly outnumbers the convenient parking locations. This has caused a multitude of hazards in parking lots due to people illegally parking, as well as unregistered vehicles parking in reserved areas. In this paper, we explain how automated drone surveillance is utilized to detect unauthorized parking at Barry University. The automated process is incorporated into Java application and completed in three steps: collecting visual data, processing data automatically, and sending automated responses and queues to the operator of the system.

  19. Tracking of a Fluorescent Dye in a Freshwater Lake with an Unmanned Surface Vehicle and an Unmanned Aircraft System

    Directory of Open Access Journals (Sweden)

    Craig Powers

    2018-01-01

    Full Text Available Recent catastrophic events in our oceans, including the spill of toxic oil from the explosion of the Deepwater Horizon drilling rig and the rapid dispersion of radioactive particulates from the meltdown of the Fukushima Daiichi nuclear plant, underscore the need for new tools and technologies to rapidly respond to hazardous agents. Our understanding of the movement and aerosolization of hazardous agents from natural aquatic systems can be expanded upon and used in prevention and tracking. New technologies with coordinated unmanned robotic systems could lead to faster identification and mitigation of hazardous agents in lakes, rivers, and oceans. In this study, we released a fluorescent dye (fluorescein into a freshwater lake from an anchored floating platform. A fluorometer (fluorescence sensor was mounted underneath an unmanned surface vehicle (USV, unmanned boat and was used to detect and track the released dye in situ in real-time. An unmanned aircraft system (UAS was used to visualize the dye and direct the USV to sample different areas of the dye plume. Image processing tools were used to map concentration profiles of the dye plume from aerial images acquired from the UAS, and these were associated with concentration measurements collected from the sensors onboard the USV. The results of this project have the potential to transform monitoring strategies for hazardous agents, enabling timely and accurate exposure assessment and response in affected areas. Fast response is essential in reacting to the introduction of hazardous agents, in order to quickly predict and contain their spread.

  20. 75 FR 27432 - Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2010-05-17

    ... can better evaluate its effects on them and participate in the rulemaking process. Small businesses... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0221] RIN 1625-AA87 Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA AGENCY...

  1. Visa Security Policy: Roles of the Departments of State and Homeland Sec

    Science.gov (United States)

    2010-03-08

    report pursuant to S. Res.137., committee print, 81st Cong., 2nd sess., April 20, 1950. 11 8 U.S.C. 1104 . 12 8 U.S.C. 1201. Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS

  2. 75 FR 53195 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-08-31

    ... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625-AA87 Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA AGENCY: Coast Guard, DHS. ACTION...

  3. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    Science.gov (United States)

    2010-01-01

    Reconnaissance and Observation ( MUSIS ), enhancement of the use of the EU Satellite-Center (EUSC), enhancement of Unmanned Armed Vehicles (UAV), Maritime Mine...stipulated by the capability declaration of 2008, are within the responsibility of the agency. Specific capabilities initiatives, such as the MUSIS ...Product ISAF = International Security Assistance Force KFOR = NATO Kosovo Force MUSIS = Multinational Space-Based Imaging System for Surveillance

  4. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  5. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  6. Learning Mobility: Adaptive Control Algorithms for the Novel Unmanned Ground Vehicle (NUGV)

    National Research Council Canada - National Science Library

    Blackburn, Mike

    2003-01-01

    Mobility is a serious limiting factor in the usefulness of unmanned ground vehicles, This paper contains a description of our approach to develop control algorithms for the Novel Unmanned Ground Vehicle (NUGV...

  7. U.S. spent fuel transportation security in the post 9/11 world

    International Nuclear Information System (INIS)

    Anne, Catherine; Patterson, John; Williams, Blake

    2002-01-01

    On September 11, 2002 the terrible tragedies in New York, Pennsylvania and Washington, DC changed the world forever. Security issues not only impact our daily lives, but are also in a state flux concerning the shipment of spent nuclear fuel in the United States. The formation of the Homeland Security Advisory System and Interim Compensatory Measures from the NRC, along with other security measures, have affected the way we transport spent nuclear fuel. This paper describes the challenging and demanding way that security is planned, implemented and maintained in support of spent fuel shipments in the United States. (author)

  8. 33 CFR 165.T09-0073 - Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes; Cleveland, OH; Bay City, MI...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Tall... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS... Guard District § 165.T09-0073 Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes...

  9. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico

    Science.gov (United States)

    2015-03-03

    Conference 2014 – Seattle, WA – Travel Scholarship awarded by Google. Celedonio was able to meet Mr. Tony Baylis, a recruiter from the Lawrence...Microsoft, Encase, Avaya, McAfee, Cisco , Department of Homeland Security, Department of Defense, ISACA among others. International Conferences in

  10. Reliability Assessment for Low-cost Unmanned Aerial Vehicles

    Science.gov (United States)

    Freeman, Paul Michael

    Existing low-cost unmanned aerospace systems are unreliable, and engineers must blend reliability analysis with fault-tolerant control in novel ways. This dissertation introduces the University of Minnesota unmanned aerial vehicle flight research platform, a comprehensive simulation and flight test facility for reliability and fault-tolerance research. An industry-standard reliability assessment technique, the failure modes and effects analysis, is performed for an unmanned aircraft. Particular attention is afforded to the control surface and servo-actuation subsystem. Maintaining effector health is essential for safe flight; failures may lead to loss of control incidents. Failure likelihood, severity, and risk are qualitatively assessed for several effector failure modes. Design changes are recommended to improve aircraft reliability based on this analysis. Most notably, the control surfaces are split, providing independent actuation and dual-redundancy. The simulation models for control surface aerodynamic effects are updated to reflect the split surfaces using a first-principles geometric analysis. The failure modes and effects analysis is extended by using a high-fidelity nonlinear aircraft simulation. A trim state discovery is performed to identify the achievable steady, wings-level flight envelope of the healthy and damaged vehicle. Tolerance of elevator actuator failures is studied using familiar tools from linear systems analysis. This analysis reveals significant inherent performance limitations for candidate adaptive/reconfigurable control algorithms used for the vehicle. Moreover, it demonstrates how these tools can be applied in a design feedback loop to make safety-critical unmanned systems more reliable. Control surface impairments that do occur must be quickly and accurately detected. This dissertation also considers fault detection and identification for an unmanned aerial vehicle using model-based and model-free approaches and applies those

  11. CADASTRAL AUDIT AND ASSESSMENTS USING UNMANNED AERIAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    K. Cunningham

    2012-09-01

    Full Text Available Ground surveys and remote sensing are integral to establishing fair and equitable property valuations necessary for real property taxation. The International Association of Assessing Officers (IAAO has embraced aerial and street-view imaging as part of its standards related to property tax assessments and audits. New technologies, including unmanned aerial systems (UAS paired with imaging sensors, will become more common as local governments work to ensure their cadastre and tax rolls are both accurate and complete. Trends in mapping technology have seen an evolution in platforms from large, expensive manned aircraft to very small, inexpensive UAS. Traditional methods of photogrammetry have also given way to new equipment and sensors: digital cameras, infrared imagers, light detection and ranging (LiDAR laser scanners, and now synthetic aperture radar (SAR. At the University of Alaska Fairbanks (UAF, we work extensively with unmanned aerial systems equipped with each of these newer sensors. UAF has significant experience flying unmanned systems in the US National Airspace, having begun in 1969 with scientific rockets and expanded to unmanned aircraft in 2003. Ongoing field experience allows UAF to partner effectively with outside organizations to test and develop leading-edge research in UAS and remote sensing. This presentation will discuss our research related to various sensors and payloads for mapping. We will also share our experience with UAS and optical systems for creating some of the first cadastral surveys in rural Alaska.

  12. 76 FR 70735 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... identify potential national security concerns, criminality, and fraud to ensure that serious or complex... duplicate and related accounts and identify potential national security concerns, criminality, and fraud to... identify national security concerns, criminality, and fraud to ensure that serious or complex cases receive...

  13. Conceptual Approach to Utilisation of the Unmanned Aerial Vehicles in Diverse Activities

    Directory of Open Access Journals (Sweden)

    Jelena Ćosić Lesičar

    2017-06-01

    Full Text Available This paper considers current situation and development of software for group of mobile agents applicable on group of unmanned aerial vehicles. Generally, unmanned aerial vehicles are used for transfer of information, mass and energy and their group work enhances their success rate in comparison with the success rate of the use of a single unmanned aerial vehicle. Despite the constant daily use, their potential is realized only in a small portion. It is argued that software development is the natural further step in achieving considerably larger portion of realizations of their potential of groups of unmanned aerial vehicles. Starting requirements that such software must fulfill are rudimentariness of the code, openness regarding number of group members and closeness regarding information exchange. Prospective directions of development of that software are analyzed.

  14. Ground impact probability distribution for small unmanned aircraft in ballistic descent

    DEFF Research Database (Denmark)

    La Cour-Harbo, Anders

    2018-01-01

    Safety is a key factor in all aviation, and while years of development has made manned aviation relatively safe, the same has yet to happen for unmanned aircraft. However, the rapid development of unmanned aircraft technology means that the range of commercial and scientific applications is growing...

  15. 2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday

    Science.gov (United States)

    2008-01-16

    www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of

  16. Development of a security vulnerability assessment process for the RAMCAP chemical sector.

    Science.gov (United States)

    Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William

    2007-04-11

    The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  17. Development of a security vulnerability assessment process for the RAMCAP chemical sector

    International Nuclear Information System (INIS)

    Moore, David A.; Fuller, Brad; Hazzan, Michael; Jones, J. William

    2007-01-01

    The Department of Homeland Security (DHS), Directorate of Information Analysis and Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors:*Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. *Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  18. A Queueing Model for Supervisory Control of Unmanned Autonomous Vehicles

    Science.gov (United States)

    2013-09-01

    Autonomous Vehicles Joseph DiVita, PhD Robert L. Morris Maria Olinda Rodas SSC Pacific Approved...298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18 09–2013 Final A Queueing Model for Supervisory Control of Unmanned Autonomous Vehicles Joseph...Mission Area: Command and Control, Queueing Model; Supervisory Control; Unmanned Autonomous Vehicles M. O. Rodas U U U U 38 (619)

  19. Secure Network-Centric Aviation Communication (SNAC)

    Science.gov (United States)

    Nelson, Paul H.; Muha, Mark A.; Sheehe, Charles J.

    2017-01-01

    The existing National Airspace System (NAS) communications capabilities are largely unsecured, are not designed for efficient use of spectrum and collectively are not capable of servicing the future needs of the NAS with the inclusion of new operators in Unmanned Aviation Systems (UAS) or On Demand Mobility (ODM). SNAC will provide a ubiquitous secure, network-based communications architecture that will provide new service capabilities and allow for the migration of current communications to SNAC over time. The necessary change in communication technologies to digital domains will allow for the adoption of security mechanisms, sharing of link technologies, large increase in spectrum utilization, new forms of resilience and redundancy and the possibly of spectrum reuse. SNAC consists of a long term open architectural approach with increasingly capable designs used to steer research and development and enable operating capabilities that run in parallel with current NAS systems.

  20. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  1. Recent advances in computational intelligence in defense and security

    CERN Document Server

    Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein

    2016-01-01

    This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

  2. Airspace Integration Plan for Unmanned Aviation

    National Research Council Canada - National Science Library

    2004-01-01

    The Office of the Secretary of Defense Airspace Integration Plan for Unmanned Aviation outlines the key issues that must be addressed to achieve the goal of safe, routine use of the National Airspace System (NAS...

  3. The Use of Unmanned Aerial Vehicle for Geothermal Exploitation Monitoring: Khankala Field Example

    OpenAIRE

    Sergey V. Cherkasov; Anvar M. Farkhutdinov; Dmitriy P. Rykovanov; Arbi A. Shaipov

    2018-01-01

    The article is devoted to the use of unmanned aerial vehicle for geothermal waters exploitation monitoring. Development of a geothermal reservoir usually requires a system of wells, pipelines and pumping equipment and control of such a system is quite complicated. In this regard, use of unmanned aerial vehicle is relevant. Two test unmanned aerial vehicle based infrared surveys have been conducted at the Khankala field (Chechen Republic) with the Khankala geothermal plant operating at differe...

  4. Homeland calling

    DEFF Research Database (Denmark)

    Juul, Kristine

    2007-01-01

    A great deal of those immigrants that settled in Denmark in the 1970s and 1980s have maintained strong bonds to their communities of origin. These bonds play an important role in shaping the identities and in maintaining relationships between migrants in the receiving communities. But while...... on the institutions and practices that act to transmit relations between country of origin and the new homeland. Focus is particularly on the efforts that the Yugoslav and Serbian states have made to maintain migrants political and economic loyalty and on the effects that this has had on migrants perceptions on key...

  5. Sensor data fusion for automated threat recognition in manned-unmanned infantry platoons

    Science.gov (United States)

    Wildt, J.; Varela, M.; Ulmke, M.; Brüggermann, B.

    2017-05-01

    To support a dismounted infantry platoon during deployment we team it with several unmanned aerial and ground vehicles (UAV and UGV, respectively). The unmanned systems integrate seamlessly into the infantry platoon, providing automated reconnaissance during movement while keeping formation as well as conducting close range reconnaissance during halt. The sensor data each unmanned system provides is continuously analyzed in real time by specialized algorithms, detecting humans in live videos of UAV mounted infrared cameras as well as gunshot detection and bearing by acoustic sensors. All recognized threats are fused into a consistent situational picture in real time, available to platoon and squad leaders as well as higher level command and control (C2) systems. This gives friendly forces local information superiority and increased situational awareness without the need to constantly monitor the unmanned systems and sensor data.

  6. Teleoperated Visual Inspection and Surveillance with Unmanned Ground and Aerial Vehicles

    Directory of Open Access Journals (Sweden)

    Viatcheslav Tretyakov

    2008-11-01

    Full Text Available This paper introduces our robotic system named UGAV (Unmanned Ground-Air Vehicle consisting of two semi-autonomous robot platforms, an Unmanned Ground Vehicle (UGV and an Unmanned Aerial Vehicles (UAV. The paper focuses on three topics of the inspection with the combined UGV and UAV: (A teleoperated control by means of cell or smart phones with a new concept of automatic configuration of the smart phone based on a RKI-XML description of the vehicles control capabilities, (B the camera and vision system with the focus to real time feature extraction e.g. for the tracking of the UAV and (C the architecture and hardware of the UAV

  7. Process Control Systems in the Chemical Industry: Safety vs. Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  8. 76 FR 60385 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2011-09-29

    ... for Disclosures) because release of the accounting of disclosures could alert the subject of an... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... ongoing law enforcement, national security or fraud investigation; to avoid disclosure of investigative...

  9. Investigative Operations: Use of Covert Testing to Identify Security Vulnerabilities and Fraud, Waste, and Abuse

    National Research Council Canada - National Science Library

    2007-01-01

    ... and internal control weaknesses at executive branch agencies. These vulnerabilities and internal control weaknesses include those that could compromise homeland security, affect public safety, or have a financial impact on taxpayer's dollars...

  10. The Use of Unmanned Aerial Vehicle for Geothermal Exploitation Monitoring: Khankala Field Example

    Directory of Open Access Journals (Sweden)

    Sergey V. Cherkasov

    2018-06-01

    Full Text Available The article is devoted to the use of unmanned aerial vehicle for geothermal waters exploitation monitoring. Development of a geothermal reservoir usually requires a system of wells, pipelines and pumping equipment and control of such a system is quite complicated. In this regard, use of unmanned aerial vehicle is relevant. Two test unmanned aerial vehicle based infrared surveys have been conducted at the Khankala field (Chechen Republic with the Khankala geothermal plant operating at different regimes: during the first survey – with, and the second – without reinjection of used geothermal fluid. Unmanned aerial vehicle Geoscan 201 equipped with digital (Sony DSX-RX1 and thermal imaging (Thermoframe-MX-TTX cameras was used. Besides different images of the geothermal plant obtained by the surveys, 13 thermal anomalies have been identified. Analysis of the shape and temperature facilitated determination of their different sources: fire, heating systems, etc., which was confirmed by a ground reconnaissance. Results of the study demonstrate a high potential of unmanned aerial vehicle based thermal imagery use for environmental and technological monitoring of geothermal fields under operation.

  11. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... determination based on the fact that the security zones created by this rule will only be in effect during the... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2009-1134] RIN 1625...

  12. Detail design of empennage of an unmanned aerial vehicle

    Science.gov (United States)

    Sarker, Md. Samad; Panday, Shoyon; Rasel, Md; Salam, Md. Abdus; Faisal, Kh. Md.; Farabi, Tanzimul Hasan

    2017-12-01

    In order to maintain the operational continuity of air defense systems, unmanned autonomous or remotely controlled unmanned aerial vehicle (UAV) plays a great role as a target for the anti-aircraft weapons. The aerial vehicle must comply with the requirements of high speed, remotely controlled tracking and navigational aids, operational sustainability and sufficient loiter time. It can also be used for aerial reconnaissance, ground surveillance and other intelligence operations. This paper aims to develop a complete tail design of an unmanned aerial vehicle using Systems Engineering approach. The design fulfils the requirements of longitudinal and directional trim, stability and control provided by the horizontal and vertical tail. Tail control surfaces are designed to provide sufficient control of the aircraft in critical conditions. Design parameters obtained from wing design are utilized in the tail design process as required. Through chronological calculations and successive iterations, optimum values of 26 tail design parameters are determined.

  13. 3D Reconfigurable MPSoC for Unmanned Spacecraft Navigation

    Science.gov (United States)

    Dekoulis, George

    2016-07-01

    This paper describes the design of a new lightweight spacecraft navigation system for unmanned space missions. The system addresses the demands for more efficient autonomous navigation in the near-Earth environment or deep space. The proposed instrumentation is directly suitable for unmanned systems operation and testing of new airborne prototypes for remote sensing applications. The system features a new sensor technology and significant improvements over existing solutions. Fluxgate type sensors have been traditionally used in unmanned defense systems such as target drones, guided missiles, rockets and satellites, however, the guidance sensors' configurations exhibit lower specifications than the presented solution. The current implementation is based on a recently developed material in a reengineered optimum sensor configuration for unprecedented low-power consumption. The new sensor's performance characteristics qualify it for spacecraft navigation applications. A major advantage of the system is the efficiency in redundancy reduction achieved in terms of both hardware and software requirements.

  14. Unmanned systems to support the human exploration of Mars

    Science.gov (United States)

    Gage, Douglas W.

    2010-04-01

    Robots and other unmanned systems will play many critical roles in support of a human presence on Mars, including surveying candidate landing sites, locating ice and mineral resources, establishing power and other infrastructure, performing construction tasks, and transporting equipment and supplies. Many of these systems will require much more strength and power than exploration rovers. The presence of humans on Mars will permit proactive maintenance and repair, and allow teleoperation and operator intervention, supporting multiple dynamic levels of autonomy, so the critical challenges to the use of unmanned systems will occur before humans arrive on Mars. Nevertheless, installed communications and navigation infrastructure should be able to support structured and/or repetitive operations (such as excavation, drilling, or construction) within a "familiar" area with an acceptable level of remote operator intervention. This paper discusses some of the factors involved in developing and deploying unmanned systems to make humans' time on Mars safer and more productive, efficient, and enjoyable.

  15. Unmanned aerial complexes as a way of NPP and environment radiation monitoring

    International Nuclear Information System (INIS)

    Babak, V.P.; Kanchenko, V.A.; Klyuchnikov, A.A.; Krasnov, V.A.; Chepur, N.L.

    2012-01-01

    As a example of the using of unmanned aircraft for video monitoring and radiation background measurement in the accident area at the NPP Fukushima -1 are shown the efficiency of its use. The analyse of possible environmental monitoring remotely piloted ultralight unmanned aerial vehicle are carried out

  16. Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project KDP-C Review

    Science.gov (United States)

    Grindle, Laurie; Sakahara, Robert; Hackenberg, Davis; Johnson, William

    2017-01-01

    safety and operational challenges of national airspace access by unmanned aircraft systems, or UAS. In the process, the project will work with other key stakeholders to define necessary deliverables and products to help enable such access. Within the project, NASA is focusing on five sub-projects. These five focus areas include assurance of safe separation of unmanned aircraft from manned aircraft when flying in the national airspace; safety-critical command and control systems and radio frequencies to enable safe operation of UAS; human factors issues for ground control stations; airworthiness certification standards for UAS avionics and integrated tests and evaluation designed to determine the viability of emerging UAS technology. Five Focus Areas of the UAS Integration in the NAS Project Separation Assurance Provide an assessment of how planned Next Generation Air Transportation System (NextGen) separation assurance systems, with different functional allocations, perform for UAS in mixed operations with manned aircraft Assess the applicability to UAS and the performance of NASA NextGen separation assurance systems in flight tests with realistic latencies and uncertain trajectories Assess functional allocations ranging from today's ground-based, controller-provided aircraft separation to fully autonomous airborne self-separation Communications Develop data and rationale to obtain appropriate frequency spectrum allocations to enable safe and efficient operation of UAS in the NAS Develop and validate candidate secure safety-critical command and control system/subsystem test equipment for UAS that complies with UAS international/national frequency regulations, standards and recommended practices and minimum operational and aviation system performance standards for UAS Perform analysis to support recommendations for integration of safety-critical command and control systems and air traffic control communications to ensure safe and efficient operation of UAS in the NAS

  17. Environmentally-induced displacement and human security

    OpenAIRE

    Terminski, Bogumil

    2012-01-01

    We can distinguish two general causes of internal displacement worldwide: 1. the impact of threats to and ensuing decline in the level of human security below that needed for normal existence in the homeland territory, 2. administrative compulsion to leave the current place of residence. Every year, at least tens of millions of people on all continents are forced to leave their places of residence. The predominant cause is the occurrence of natural disasters, creating the most dynamic categor...

  18. Reducing environmental damage through the use of unmanned aerial vehicles as the best available technology

    Science.gov (United States)

    Fedulova, E. A.; Akulov, A. O.; Rada, A. O.; Alabina, T. A.; Savina, Ju Ju

    2018-01-01

    The article examines the possibilities of using unmanned aerial vehicles as the best available technologies in the field of agriculture and mining. The object of the study is the use of unmanned aerial vehicles as the best available technology. The main areas of application of this technology are identified: agro technical operations, aerial photography of mining operations. The technology of unmanned aerial vehicles is compared with the technologies of ground agricultural machinery. The research methodology includes an expert evaluation of the unmanned aerial vehicle technology belonging to the class of the best available technologies by the criteria: the level of environmental impact, resource saving, the use of low-waste, non-waste processes, the existence of at least two objects, economic efficiency. Expert evaluations were processed using the apparatus of fuzzy sets, which make it possible to construct membership functions. This allowed us to prove that the technology of unmanned aerial vehicles belongs to a fuzzy set of the best available technologies. The results of the research show that the use of unmanned aerial vehicles provides a saving of resources, especially non-renewable combustible minerals, reduces emissions and discharges of pollutants into the atmosphere, and also reduces soil erosion. Unmanned aerial vehicles should be included in the national directories of the best available technologies for the mining industry and agriculture.

  19. Compliance Issues and Homeland Security with New Federal Regulations for Higher Education Institutions

    Science.gov (United States)

    Valcik, Nicolas A.

    2010-01-01

    Research advancements into different fields of study have increased the risks for accidents, criminal acts, or a potential breach of national security, and the types of hazardous materials (HAZMAT) stored and used at universities and colleges are under new scrutiny. Before, a chemistry laboratory might only have basic substances such as sulfur,…

  20. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R.L. Jr.; Price, D.E.; Spero, K.K.

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented

  1. Chemical Sniffing Instrumentation for Security Applications.

    Science.gov (United States)

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  2. Bespilotne letelice zapadnih zemalja / Unmanned aircraft of Western countries

    Directory of Open Access Journals (Sweden)

    Slavko Pokorni

    2002-11-01

    Full Text Available Trend sve češće primene bespilotnih letelica biće nastavljen nesumnjivo, i tokom ove decenije. U vezi s tim stiče se utisak da će razvoj borbenih bespilotnih letilica biti u usponu. Mada je u proteklom periodu težište bilo na razvoju bespilotnih letilica za vojne primene (gde su ulagana velika sredstva, a civilni sektor je, uglavnom, koristio rezultate razvoja vojnih bespilotnih letelica, u narednom periodu se očekuje porast ulaganja i u razvoj bespilotnih letelica u civilnom sektoru. Bespilotne letelice su imale značajnu ulogu u zadacima koje su obavljale multinacionalne snage u toku rata u Bosni i Hercegovini i agresije NATO-a na SRJ, pa je poznavanje karakteristika bespilotnih letelica, za pripadnike Vojske, od velikog značaja. U sažetom tabelarnom pregledu prikazani su podatci o bespilotnim letelicama uglavnom proizvođača iz zapadnih zemalja, što ne znači da ih ne proizvode i druge zemlje, posebno Ruska federacija kao i neke susedne zemlje (Bugarska, Hrvatska. / The increasingly frequent use of unmanned aircraft will continue unabated throughout this decade. About that the impression is that the development of combat drones will rise. Although in the past period the focus was on the development of unmanned military vehicles (where large funds were invested, and the civil sector used mainly the development of military drones, in the coming period, investment in the development of unmanned aircraft in the civil sector is expected . Unmanned aircraft played a significant role in the tasks performed by multinational forces during the war in Bosnia and Herzegovina and NATO aggression in the FR Yugoslavia, so the knowledge of the characteristics of drones for members of the Army is of great importance. The summary table shows the data on unmanned aircraft mainly manufactured from Western countries, which does not mean that they are not produced by other countries, especially the Russian Federation as well as some neighboring

  3. Unmanned Ground Vehicle Tactical Behaviors Technology Assessment

    National Research Council Canada - National Science Library

    Childers, Marshal A; Bodt, Barry A; Hill, Susan G; Camden, Richard; Dean, Robert M; Dodson, William F; Sutton, Lyle G; Sapronov, Leonid

    2009-01-01

    During 4-14 February 2008, the U.S. Army Research Laboratory and General Dynamics Robotic Systems conducted an unmanned systems tactical behaviors technology assessment at three training areas of Ft. Indiantown Gap, PA...

  4. Unmanned Ground Systems Roadmap

    Science.gov (United States)

    2011-07-01

    quality metric tracking history . 1.4.3.4 Technical Management Division The mission of the RS JPO Technical Management (Tech Mgt) Division is to...missions dictate radio capabilities. IP version 4 ( IPv4 ) is the common IP standard used on IP addressable devices of UGVs, however, Unmanned Ground...Systems Roadmap UNCLASSIFIED 26 UNCLASSIFIED July 2011 IPv4 addresses are projected to run out and UGV systems will need to migrate to IP version 6

  5. A Review of Deep Learning Methods and Applications for Unmanned Aerial Vehicles

    Directory of Open Access Journals (Sweden)

    Adrian Carrio

    2017-01-01

    Full Text Available Deep learning is recently showing outstanding results for solving a wide variety of robotic tasks in the areas of perception, planning, localization, and control. Its excellent capabilities for learning representations from the complex data acquired in real environments make it extremely suitable for many kinds of autonomous robotic applications. In parallel, Unmanned Aerial Vehicles (UAVs are currently being extensively applied for several types of civilian tasks in applications going from security, surveillance, and disaster rescue to parcel delivery or warehouse management. In this paper, a thorough review has been performed on recent reported uses and applications of deep learning for UAVs, including the most relevant developments as well as their performances and limitations. In addition, a detailed explanation of the main deep learning techniques is provided. We conclude with a description of the main challenges for the application of deep learning for UAV-based solutions.

  6. Risk-Based Aviation Security: Diffusion and Acceptance

    Science.gov (United States)

    2012-03-01

    The authors 32 recommended use of DOI for builders of social networking sites to examine the attributes of the model to see how they...November 23, 2011, from http://www.stltoday.com/news/ multimedia /full-body- scanners-arrive-at-lambert-airport/image_898152d8-f8ac-5c61-8fd6...Department of Homeland Security: Progress report on implementation of mission and management functions (GAO-07-454). Retrieved August 31, 2011, from

  7. Integrating Pavement Crack Detection and Analysis Using Autonomous Unmanned Aerial Vehicle Imagery

    Science.gov (United States)

    2015-03-27

    INTEGRATING PAVEMENT CRACK DETECTION AND ANALYSIS USING AUTONOMOUS UNMANNED AERIAL VEHICLE...protection in the United States. AFIT-ENV-MS-15-M-195 INTEGRATING PAVEMENT CRACK DETECTION AND ANALYSIS USING AUTONOMOUS UNMANNED AERIAL...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT-ENV-MS-15-M-195 INTEGRATING PAVEMENT CRACK DETECTION AND ANALYSIS USING AUTONOMOUS

  8. Approach for Autonomous Control of Unmanned Aerial Vehicle Using Intelligent Agents for Knowledge Creation

    Science.gov (United States)

    Dufrene, Warren R., Jr.

    2004-01-01

    This paper describes the development of a planned approach for Autonomous operation of an Unmanned Aerial Vehicle (UAV). A Hybrid approach will seek to provide Knowledge Generation thru the application of Artificial Intelligence (AI) and Intelligent Agents (IA) for UAV control. The application of many different types of AI techniques for flight will be explored during this research effort. The research concentration will be directed to the application of different AI methods within the UAV arena. By evaluating AI approaches, which will include Expert Systems, Neural Networks, Intelligent Agents, Fuzzy Logic, and Complex Adaptive Systems, a new insight may be gained into the benefits of AI techniques applied to achieving true autonomous operation of these systems thus providing new intellectual merit to this research field. The major area of discussion will be limited to the UAV. The systems of interest include small aircraft, insects, and miniature aircraft. Although flight systems will be explored, the benefits should apply to many Unmanned Vehicles such as: Rovers, Ocean Explorers, Robots, and autonomous operation systems. The flight system will be broken down into control agents that will represent the intelligent agent approach used in AI. After the completion of a successful approach, a framework of applying a Security Overseer will be added in an attempt to address errors, emergencies, failures, damage, or over dynamic environment. The chosen control problem was the landing phase of UAV operation. The initial results from simulation in FlightGear are presented.

  9. UNMANNED AIR VEHICLE STABILIZATION BASED ON NEURAL NETWORK REGULATOR

    Directory of Open Access Journals (Sweden)

    S. S. Andropov

    2016-09-01

    Full Text Available A problem of stabilizing for the multirotor unmanned aerial vehicle in an environment with external disturbances is researched. A classic proportional-integral-derivative controller is analyzed, its flaws are outlined: inability to respond to changing of external conditions and the need for manual adjustment of coefficients. The paper presents an adaptive adjustment method for coefficients of the proportional-integral-derivative controller based on neural networks. A neural network structure, its input and output data are described. Neural networks with three layers are used to create an adaptive stabilization system for the multirotor unmanned aerial vehicle. Training of the networks is done with the back propagation method. Each neural network produces regulator coefficients for each angle of stabilization as its output. A method for network training is explained. Several graphs of transition process on different stages of learning, including processes with external disturbances, are presented. It is shown that the system meets stabilization requirements with sufficient number of iterations. Described adjustment method for coefficients can be used in remote control of unmanned aerial vehicles, operating in the changing environment.

  10. Space nuclear reactor shields for manned and unmanned applications

    International Nuclear Information System (INIS)

    McKissock, B.I.; Bloomfield, H.S.

    1990-01-01

    Missions which use nuclear reactor power systems require radiation shielding of payload and/or crew areas to predetermined dose rates. Since shielding can become a significant fraction of the total mass of the system, it is of interest to show the effect of various parameters on shield thickness and mass for manned and unmanned applications. Algorithms were developed to give the thicknesses needed if reactor thermal power, separation distances and dose rates are given as input. The thickness algorithms were combined with models for four different shield geometries to allow tradeoff studies of shield volume and mass for a variety of manned and unmanned missions. The shield design tradeoffs presented in this study include the effects of: higher allowable dose rates; radiation hardened electronics; shorter crew exposure times; shield geometry; distance of the payload and/or crew from the reactor; and changes in the size of the shielded area. Specific NASA missions that were considered in this study include unmanned outer planetary exploration, manned advanced/evolutionary space station and advanced manned lunar base. (author)

  11. Space nuclear reactor shields for manned and unmanned applications

    International Nuclear Information System (INIS)

    Mckissock, B.I.; Bloomfield, H.S.

    1989-01-01

    Missions which use nuclear reactor power systems require radiation shielding of payload and/or crew areas to predetermined dose rates. Since shielding can become a significant fraction of the total mass of the system, it is of interest to show the effect of various parameters on shield thickness and mass for manned and unmanned applications. Algorithms were developed to give the thicknesses needed if reactor thermal power, separation distances, and dose rates are given as input. The thickness algorithms were combined with models for four different shield geometries to allow tradeoff studies of shield volume and mass for a variety of manned and unmanned missions. Shield design tradeoffs presented in this study include the effects of: higher allowable dose rates; radiation hardened electronics; shorter crew exposure times; shield geometry; distance of the payload and/or crew from the reactor; and changes in the size of the shielded area. Specific NASA missions that were considered in this study include unmanned outer planetary exploration, manned advanced/evolutionary space station, and advanced manned lunar base

  12. Bayesian paradox in homeland security and homeland defense

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Wang, Wenjian

    2011-06-01

    In this paper we discuss a rather surprising result of Bayesian inference analysis: performance of a broad variety of sensors depends not only on a sensor system itself, but also on CONOPS parameters in such a way that even an excellent sensor system can perform poorly if absolute probabilities of a threat (target) are lower than a false alarm probability. This result, which we call Bayesian paradox, holds not only for binary sensors as discussed in the lead author's previous papers, but also for a more general class of multi-target sensors, discussed also in this paper. Examples include: ATR (automatic target recognition), luggage X-ray inspection for explosives, medical diagnostics, car engine diagnostics, judicial decisions, and many other issues.

  13. International Symposium on Unmanned Aerial Vehicles

    CERN Document Server

    Oh, Paul; Piegl, Les

    2009-01-01

    Unmanned Aircraft Systems (UAS) have seen unprecedented levels of growth during the last decade in both military and civilian domains. It is anticipated that civilian applications will be dominant in the future, although there are still barriers to be overcome and technical challenges to be met. Integrating UAS into, for example, civilian space, navigation, autonomy, see-detect-and-avoid systems, smart designs, system integration, vision-based navigation and training, to name but a few areas, will be of prime importance in the near future. This special volume is the outcome of research presented at the International Symposium on Unmanned Aerial Vehicles, held in Orlando, Florida, USA, from June 23-25, 2008, and presents state-of-the-art findings on topics such as: UAS operations and integration into the national airspace system; UAS navigation and control; micro-, mini-, small UAVs; UAS simulation testbeds and frameworks; UAS research platforms and applications; UAS applications. This book aims at serving as ...

  14. FY2014 Appropriations Lapse and the Department of Homeland Security: Impact and Legislation

    Science.gov (United States)

    2013-10-24

    and Programs Directorate (NPPD) • Office of Biometric Identity Management • Federal Protective Service Under the Federal Emergency Management...performance of excepted work during the period of the appropriations lapse. After appropriations are enacted, payroll centers will pay all excepted...four hours of work completely dedicated to de- activating a function, such as securing documents, completing payroll , etc.12 Presidential appointees

  15. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  16. Unmanned aerial systems for photogrammetry and remote sensing: A review

    OpenAIRE

    Colomina, Ismael; Molina, Pere

    2014-01-01

    We discuss the evolution and state-of-the-art of the use of Unmanned Aerial Systems (UAS) in the field of Photogrammetry and Remote Sensing (PaRS). UAS, Remotely-Piloted Aerial Systems, Unmanned Aerial Vehicles or simply, drones are a hot topic comprising a diverse array of aspects including technology, privacy rights, safety and regulations, and even war and peace. Modern photogrammetry and remote sensing identified the potential of UAS-sourced imagery more than thirty years ago. In the last...

  17. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  18. Intelligent Unmanned Vehicle Systems Suitable For Individual or Cooperative Missions

    Energy Technology Data Exchange (ETDEWEB)

    Matthew O. Anderson; Mark D. McKay; Derek C. Wadsworth

    2007-04-01

    The Department of Energy’s Idaho National Laboratory (INL) has been researching autonomous unmanned vehicle systems for the past several years. Areas of research have included unmanned ground and aerial vehicles used for hazardous and remote operations as well as teamed together for advanced payloads and mission execution. Areas of application include aerial particulate sampling, cooperative remote radiological sampling, and persistent surveillance including real-time mosaic and geo-referenced imagery in addition to high resolution still imagery. Both fixed-wing and rotary airframes are used possessing capabilities spanning remote control to fully autonomous operation. Patented INL-developed auto steering technology is taken advantage of to provide autonomous parallel path swathing with either manned or unmanned ground vehicles. Aerial look-ahead imagery is utilized to provide a common operating picture for the ground and air vehicle during cooperative missions. This paper will discuss the various robotic vehicles, including sensor integration, used to achieve these missions and anticipated cost and labor savings.

  19. The Department of Homeland Security’s Pursuit of Data-Driven Decision Making

    Science.gov (United States)

    2015-12-01

    security missions at a critical time. The absence of a recognized, authoritative information source from which leaders could assess the impacted property...Furthermore, as all the DHS Components except TSA were legacy agencies from other parent departments, they each brought with them their unique...and leadership styles influence the Management Directorate’s ability to engage with the Components and drive change. It explores how the lack of

  20. Advancing Unmanned Aircraft Sensor Collection and Communication Capabilities with Optical Communications

    Science.gov (United States)

    Lukaczyk, T.

    2015-12-01

    Unmanned aircraft systems (UAS) are now being used for monitoring climate change over both land and seas. Their uses include monitoring of cloud conditions and atmospheric composition of chemicals and aerosols due to pollution, dust storms, fires, volcanic activity and air-sea fluxes. Additional studies of carbon flux are important for various ecosystem studies of both marine and terrestrial environments specifically, and can be related to climate change dynamics. Many measurements are becoming more complex as additional sensors become small enough to operate on more widely available small UAS. These include interferometric radars as well as scanning and fan-beam lidar systems which produce data streams even greater than those of high resolution video. These can be used to precisely map surfaces of the earth, ocean or ice features that are important for a variety of earth system studies. As these additional sensor capabilities are added to UAS the ability to transmit data back to ground or ship monitoring sites is limited by traditional wireless communication protocols. We describe results of tests of optical communication systems that provide significantly greater communication bandwidths for UAS, and discuss both the bandwidth and effective range of these systems, as well as their power and weight requirements both for systems on UAS, as well as those of ground-based receiver stations. We justify our additional use of Delay and Disruption Tolerant Networking (DTN) communication protocols with optical communication methods to ensure security and continuity of command and control operations. Finally, we discuss the implications for receiving, geo-referencing, archiving and displaying data streams from sensors communicated via optical communication to better enable real-time anomaly detection and adaptive sampling capabilities using multiple UAS or other unmanned or manned systems.

  1. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    Science.gov (United States)

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  2. A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

    Directory of Open Access Journals (Sweden)

    Dhiman Chowdhury

    2018-05-01

    Full Text Available During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot communicate with each other and also the terrorists cannot go through the ongoing apprehensive operation via wireless communications. This paper presents a novel framework of an unmanned aerial vehicular networking signal jammer which is oriented to block incoming and outgoing signals of all frequencies transmitted from a specifically marginalized territory scanned and explored by the aerial vehicle. During such a cyber-vigilance operation, the aerial vehicle is equipped with a transmitter and an auto-tuning band-pass filter module with automatic regulation of center frequencies according to the surrounding networking signals, which are considered to be the suppressing noise parameters. In order to restrict the signal blocking operation within the militant hub, the aerial vehicle with the network terminator is controlled to navigate within a particular boundary of a residential area and its navigation is continuously mapped and stored for effective evacuation process directed to save the innocent stranded people. A very low frequency (VLF metal detector has been designed to trace the explosives and buried landmines inside the exploration arena. An algorithm for 3-D mapping of the metal traces detected by the aerial navigator has been presented in this paper. Signal blocking, metal tracing and stable confined movements have been tested where the testbed is provided with signals of different frequencies along with variation in dimensions of the testing region to evaluate the reliability of the proposed framework.

  3. Bio-inspired computation in unmanned aerial vehicles

    CERN Document Server

    Duan, Haibin

    2014-01-01

    Bio-inspired Computation in Unmanned Aerial Vehicles focuses on the aspects of path planning, formation control, heterogeneous cooperative control and vision-based surveillance and navigation in Unmanned Aerial Vehicles (UAVs) from the perspective of bio-inspired computation. It helps readers to gain a comprehensive understanding of control-related problems in UAVs, presenting the latest advances in bio-inspired computation. By combining bio-inspired computation and UAV control problems, key questions are explored in depth, and each piece is content-rich while remaining accessible. With abundant illustrations of simulation work, this book links theory, algorithms and implementation procedures, demonstrating the simulation results with graphics that are intuitive without sacrificing academic rigor. Further, it pays due attention to both the conceptual framework and the implementation procedures. The book offers a valuable resource for scientists, researchers and graduate students in the field of Control, Aeros...

  4. Tracking Controller Design for Diving Behavior of an Unmanned Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Yi-Hsiang Tseng

    2013-01-01

    Full Text Available The study has investigated the almost disturbance decoupling problem of nonlinear uncertain control systems via the fuzzy feedback linearization approach. The significant dedication of this paper is to organize a control algorithm such that the closed-loop system is active for given initial condition and bounded tracking trajectory with the input-to-state stability and almost disturbance decoupling performance. This study presents a feedback linearization controller for diving control of an unmanned underwater vehicle. Unmanned underwater vehicle proposes difficult control subject due to its nonlinear dynamics, uncertain models, and the existence of disturbances that are difficult to measure. In general, while investigating the diving dynamics of an unmanned underwater vehicle, the pitch angle is always assumed to be small. This assumption is a strong restricting constraint in many interesting practical applications and will be relaxed in this study.

  5. Unmanned Aerial Vehicle (UAV) Photogrammetry Produces ...

    African Journals Online (AJOL)

    Marinus Boon

    Department of Geography, Environmental Management and Energy Studies, University of ... The technique also only requires a few control measurements and the ... The number of Unmanned Aerial Systems (UAS) referenced in the 2013 ... model aircraft airfield east of the R25 road, just south of the M6 intersection, up until ...

  6. Department of Homeland Security

    Science.gov (United States)

    ... DHS Idea Combating Human Trafficking Visa Waiver Program Immigration Case Status REAL ID Forms Online Safety Online ... the National Terrorism Advisory System (NTAS) Find Training Opportunities File a Travel Complaint (DHS TRIP) Do you ...

  7. State-of-the-Art System Solutions for Unmanned Underwater Vehicles

    Directory of Open Access Journals (Sweden)

    A. E. Yilmaz

    2009-12-01

    Full Text Available Unmanned Underwater Vehicles (UUVs have gained popularity for the last decades, especially for the purpose of not risking human life in dangerous operations. On the other hand, underwater environment introduces numerous challenges in navigation, control and communication of such vehicles. Certainly, this fact makes the development of these vehicles more interesting and engineering-wise more attractive. In this paper, we first revisit the existing technology and methodology for the solution of aforementioned problems, then we try to come up with a system solution of a generic unmanned underwater vehicles.

  8. Unmanned Aerial Vehicles: Background and Issues for Congress

    National Research Council Canada - National Science Library

    Geer, Harlan; Bolkcom, Christopher

    2005-01-01

    .... Furthermore, the military effectiveness of UAVs in recent conflicts such as Iraq (1990) and Kosovo (1999) opened the eyes of many to both the advantages and disadvantages provided by unmanned aircraft...

  9. THE NORTHERN BORDER A FORGOTTEN NATIONAL SECURITY THREAT

    Science.gov (United States)

    2017-04-06

    Deputy Director of the DEA, Jack Riley.70 However, they have been seen recently expanding their physical and permanent presence in Canada. In 2015...balanced approach. Notes 1 Jane A. Bullock, George D. Haddow, and Damon P. Coppola, Homeland Security: The Essentials (Waltham, MA : Butterworth -Heinemann...Michoacán Family (La Familia Michoacána or LFM), Knights Templar (Los Caballeros Templarios or LCT), and Los Zetas.” Jack Riley, Acting Deputy

  10. Unmanned Aerial Vehicles unique cost estimating requirements

    Science.gov (United States)

    Malone, P.; Apgar, H.; Stukes, S.; Sterk, S.

    Unmanned Aerial Vehicles (UAVs), also referred to as drones, are aerial platforms that fly without a human pilot onboard. UAVs are controlled autonomously by a computer in the vehicle or under the remote control of a pilot stationed at a fixed ground location. There are a wide variety of drone shapes, sizes, configurations, complexities, and characteristics. Use of these devices by the Department of Defense (DoD), NASA, civil and commercial organizations continues to grow. UAVs are commonly used for intelligence, surveillance, reconnaissance (ISR). They are also use for combat operations, and civil applications, such as firefighting, non-military security work, surveillance of infrastructure (e.g. pipelines, power lines and country borders). UAVs are often preferred for missions that require sustained persistence (over 4 hours in duration), or are “ too dangerous, dull or dirty” for manned aircraft. Moreover, they can offer significant acquisition and operations cost savings over traditional manned aircraft. Because of these unique characteristics and missions, UAV estimates require some unique estimating methods. This paper describes a framework for estimating UAV systems total ownership cost including hardware components, software design, and operations. The challenge of collecting data, testing the sensitivities of cost drivers, and creating cost estimating relationships (CERs) for each key work breakdown structure (WBS) element is discussed. The autonomous operation of UAVs is especially challenging from a software perspective.

  11. Layered autonomous overwatch: the necessity and feasability of multiple unmanned systems in combat support

    Science.gov (United States)

    Monckton, Simon; Digney, Bruce; Broten, Greg; Penzes, Steve

    2007-04-01

    Unmanned systems simultaneously reduce risk and magnify the impact of soldier-operators. For example, in Afghanistan UAVs routinely provide overwatch to manned units while UGVs support IED identification and disposal roles. Expanding these roles requires greater autonomy with a coherent unmanned "system of systems" approach that leverages one platform's strengths against the weakness of another. Specific collaborative unmanned systems such as shared sensing, communication relay, and distributed computing to achieve greater autonomy are often presented as possible solutions. By surveying currently deployed systems, this paper shows that the spectrum of air and ground systems provide an important mixture of range, speed, payload, and endurance with significant implications on mission structure. Rather than proposing UxV teams collaborating towards specific autonomous capabilities, this paper proposes that basic physical and environmental constraints will drive tactics towards a layered, unmanned battlespace that provides force protection and reconnaissance in depth to a manned core.

  12. Conversion Timing of Seafarer’s Decision-making for Unmanned Ship Navigation

    Directory of Open Access Journals (Sweden)

    Ruolan Zhang

    2017-09-01

    Full Text Available The aim of this study is to construct an unmanned ship swarms monitoring model to improve autonomous decision-making efficiency and safety performance of unmanned ship navigation. A framework is proposed to determine the relationship between on-board decision-making and shore side monitoring, the process of ship data detection, tracking, analysis and loss, and the application of decision-making algorithm, to discuss the different risk responses of specific unmanned ship types under various latent hazard environments, particularly in terms of precise conversion timing in switching over to remote control and full manual monitoring, to ensure safe navigation when the capability of automatic risk response inadequate. This frame-work makes it easier to train data and the adjustment for machine learning based on Bayesian risk prediction. It can be concluded that the automation level can be increased and the workload of shore-based seafarers can be reduced easily.

  13. Autonomous Agricultural Application using Unmanned Aircraft, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Interest in Unmanned Aircraft Systems (UAS) for civilian use has increased greatly in recent years and is expected to grow significantly in the future. NASA is...

  14. Graduate Education for Unmanned Vehicles and Undersea Warfare: NPS Teaching, Research and Partnership Strategies

    OpenAIRE

    Brutzman, Don

    2005-01-01

    Panel Discussion, NDIA conference, Unmanned Maritime Vehicle (UMV)Test & Evaluation Conference

Held in Conjunction with 
Autonomous Underwater Vehicle (AUV) Fest 2005

“Accelerating Deployment of Unmanned Maritime Vehicles Through Advancements in Test & Evaluation”

Keyport, WA 14-16 June 2005

  15. Evaluating the accuracy of vehicle tracking data obtained from Unmanned Aerial Vehicles

    Directory of Open Access Journals (Sweden)

    Giuseppe Guido

    2016-10-01

    Full Text Available This paper presents a methodology for tracking moving vehicles that integrates Unmanned Aerial Vehicles with video processing techniques. The authors investigated the usefulness of Unmanned Aerial Vehicles to capture reliable individual vehicle data by using GPS technology as a benchmark. A video processing algorithm for vehicles trajectory acquisition is introduced. The algorithm is based on OpenCV libraries. In order to assess the accuracy of the proposed video processing algorithm an instrumented vehicle was equipped with a high precision GPS. The video capture experiments were performed in two case studies. From the field, about 24,000 positioning data were acquired for the analysis. The results of these experiments highlight the versatility of the Unmanned Aerial Vehicles technology combined with video processing technique in monitoring real traffic data.

  16. Multimodal biometric digital watermarking on immigrant visas for homeland security

    Science.gov (United States)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  17. ICAROUS - Integrated Configurable Algorithms for Reliable Operations Of Unmanned Systems

    Science.gov (United States)

    Consiglio, María; Muñoz, César; Hagen, George; Narkawicz, Anthony; Balachandran, Swee

    2016-01-01

    NASA's Unmanned Aerial System (UAS) Traffic Management (UTM) project aims at enabling near-term, safe operations of small UAS vehicles in uncontrolled airspace, i.e., Class G airspace. A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight operations. This paper describes a new capability referred to as ICAROUS (Integrated Configurable Algorithms for Reliable Operations of Unmanned Systems), which is being developed under the UTM project. ICAROUS is a software architecture comprised of highly assured algorithms for building safety-centric, autonomous, unmanned aircraft applications. Central to the development of the ICAROUS algorithms is the use of well-established formal methods to guarantee higher levels of safety assurance by monitoring and bounding the behavior of autonomous systems. The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and contingency control functions. ICAROUS also provides a highly configurable user interface that enables the modular integration of mission-specific software components.

  18. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    Science.gov (United States)

    2013-12-01

    Qualitative Research: A Metaphorical Approach,” Journal of Advanced Nursing 47, no. 6 (Sep 2004): 654. 10...Advanced Nursing 47, no. 6 (Sep 2004): 649–655. Cooper, Melinda. “Complexity Theory After The Financial Crisis.” Journal of Cultural Economy 4 (2011...93. Snowden, David. “Cynefin Framework.” YouTube video, 8:38. Posted July 11, 2010 by Cognitive Edge. http://www.youtube.com/watch?v=N7oz366X0-8

  19. Engineering of Fast and Robust Adaptive Control for Fixed-Wing Unmanned Aircraft

    Science.gov (United States)

    2017-06-01

    evaluate the use of adaptive control on fixed-wing unmanned aircraft . The growing demand for unmanned systems will inherit the costs associated with...aerospace environment . 2.2 Classical Feedback vs Adaptive Control Control of a system can be categorized into two required elements; the requirement to...stabilize the system in the presence of: 1. disturbances that affect the controlled states and outputs (pitch rate perturbation caused by environmental

  20. Neutron and Gamma Imaging for National Security Applications

    Science.gov (United States)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.