WorldWideScience

Sample records for homeland security unmanned

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Homeland Security: Unmanned Aerial Vehicles and Border Surveillance

    Science.gov (United States)

    2010-07-08

    outfit the Predator B with a synthetic aperture radar (SAR) system17 and a moving target indicator (MTI) radar. Adding SAR and MTI to the Predator B’s...Predator Squadrons,” Inside the Air Force, June 7, 2002. 17 For more information about Synthetic Aperture Radar, see http://www.sandia.gov/radar...contributed to the seizing of more than 22,000 pounds of marijuana and the apprehension of 5,000 illegal immigrants,” others disagree.24 “Unmanned aircraft

  3. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  4. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...

  5. Changing Homeland Security: In 2010, Was Homeland Security Useful?

    Science.gov (United States)

    2011-02-01

    Education Consortium, September 2007). 8 James Ramsay , Daniel Cutrer, and Robert Raffel, “Development of an Outcomes-Based Undergraduate Curriculum in... Gordon , “Changing Homeland Security: Teaching the Core,” Homeland Security Affairs II, no. 1 (April 2006) http://www.hsaj.org/?article=2.1.1. 13 Kuhn

  6. Changing Homeland Security: Ten Essential Homeland Security Books

    National Research Council Canada - National Science Library

    Bellavita, Christopher

    2007-01-01

    .... The list is personal and provisional. The discipline is too new to have a canon. We need to continuously examine what is signal and what is background noise in homeland security's academic environment...

  7. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  8. Homeland Security Affairs Journal (press release)

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Homeland Defense and Security

    2013-01-01

    Homeland Security Affairs (HSA) is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  9. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  10. Fluid Mechanics and Homeland Security

    Science.gov (United States)

    Settles, Gary S.

    2006-01-01

    Homeland security involves many applications of fluid mechanics and offers many opportunities for research and development. This review explores a wide selection of fluids topics in counterterrorism and suggests future directions. Broad topics range from preparedness and deterrence of impending terrorist attacks to detection, response, and recovery. Specific topics include aircraft hardening, blast mitigation, sensors and sampling, explosive detection, microfluidics and labs-on-a-chip, chemical plume dispersal in urban settings, and building ventilation. Also discussed are vapor plumes and standoff detection, nonlethal weapons, airborne disease spread, personal protective equipment, and decontamination. Involvement in these applications requires fluid dynamicists to think across the traditional boundaries of the field and to work with related disciplines, especially chemistry, biology, aerosol science, and atmospheric science.

  11. Irradiation applications for homeland security

    International Nuclear Information System (INIS)

    Desrosiers, Marc F.

    2004-01-01

    In October 2001, first-class mail laced with anthrax was sent to political and media targets resulting in several deaths, illnesses, significant mail-service disruption, and economic loss. The White House Office of Science and Technology Policy established a technical task force on mail decontamination that included three key agencies: National Institute of Standards and Technology with responsibility for radiation dosimetry and coordinating and performing experiments at industrial accelerator facilities; the Armed Forces Radiobiology Research Institute with responsibility for radiobiology; and the US Postal Service with responsibility for radiation-processing quality assurance and quality control. An overview of the anthrax attack decontamination events will be presented as well as expectations for growth in this area and the prospects of other homeland security areas where irradiation technology can be applied

  12. Comparative U.S.-Israeli Homeland Security

    National Research Council Canada - National Science Library

    Larsen, Jeffrey A; Pravecek, Tasha L

    2006-01-01

    .... It begins with the threats experienced by each nation, examining the respective homeland security organizational structures and ways of preventing attacks and responding to attacks that do occur...

  13. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  14. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  15. Homeland security: what are the advantages and disadvantages of different local homeland security organizational structures?

    OpenAIRE

    Fitzpatrick, William Mark

    2015-01-01

    Approved for public release; distribution is unlimited After the attacks of September 11, 2001, and the creation of the federal Department of Homeland Security in 2002, many local agencies formed their own homeland security entity. Since that time, significant economic downturns have resulted in reductions in the amount of homeland security funding available to local jurisdictions. Another issue involves the lack of a common definition of homeland security and what it entails and how daily...

  16. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  17. Homeland Security: The Department of Defense's Role

    National Research Council Canada - National Science Library

    Bowman, Steve

    2003-01-01

    ...) more closely with federal, state, and local agencies in their homeland security activities. DoD resources are unique in the government, both in their size and capabilities, and can be applied to both deter and respond to terrorist acts...

  18. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  19. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  20. Homeland Security: Scope of the Secretary's Reorganization Authority

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2005-01-01

    ...). Section 872 of the Homeland Security Act gives the Secretary of Homeland Security the authority to reorganize "functions" and "organizational units" within the Department either independently, 60...

  1. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  2. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    ... cyber attack. Under 5 U.S.C. 552b(c)(9)(B), disclosure of this information would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate the successful.... The closed portions of the meeting will address threats to our homeland security, results of a cyber...

  3. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  4. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  5. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  6. Homeland Security. Management Challenges Facing Federal Leadership

    Science.gov (United States)

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  7. Homeland Security - Can It be Done?

    Science.gov (United States)

    2003-04-07

    and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes

  8. Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April

    OpenAIRE

    2006-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...

  9. Measuring the Foundation of Homeland Security

    Science.gov (United States)

    2007-03-01

    Pirak Kevin Eack Susan Pyle Chuck Eaneff Joseph Saitta Susan Fernandez Shelly Schechter Helen Fitzpatrick Rick Schwein Jay...multiple disciplines. The scope of this literature review is to cast a broad net and then narrow to specific literature related to Homeland Security...Suez Canal. His successes as a planner, diplomat and promoter made him the most celebrated man in Europe. Because of these successes, De Lesseps

  10. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  11. Top Ten Challenges Facing the Next Secretary of Homeland Security

    National Research Council Canada - National Science Library

    2008-01-01

    In an effort to assist with the first Presidential administration transition of the Department of Homeland Security, the Homeland Security Advisory Council has identified ten key challenges that will...

  12. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  13. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  14. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  15. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  16. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  17. Radiation Detection for Homeland Security Applications

    Science.gov (United States)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will

  18. Proceedings and Presentations from the 2015 Homeland Security Education Summit

    OpenAIRE

    2015-01-01

    Proceedings: 9th Annual Homeland Defense and Security Education Summit The 9th Annual Homeland Defense and Security Education Summit was held on September 25-26, 2015 at the Hyatt Regency Hotel in Orlando Florida. The theme of the event was Evolving Homeland Security…

  19. Proposing C4ISR Architecture Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Farah-Stapleton, Monica F; Dimarogonas, James; Eaton, Rodney; Deason, Paul J

    2004-01-01

    This presentation presents how a network architecture methodology developed for the Army's Future Force could be applied to the requirements of Civil Support, Homeland Security/Homeland Defense (CS HLS/HLD...

  20. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  1. Metro Optical Networks for Homeland Security

    Science.gov (United States)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  2. Environment and homeland security in France

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2011-01-01

    The author comments the impact of extreme events related to global warming and climate change on the French homeland security. He comments the evolution of temperature during the last century, the various transformations notably predicted by IPCC reports, and the various climate evolutions. Then, he discusses impacts of climate change on different economic sectors. He notably addresses the impact on coast lines (risks of submersion and erosion, more particularly for overseas territories), the impact extreme events may have on soft water (a temperature rise would impact the operation of nuclear plants; sewage and water networks will be threatened by more intense rainfalls), the positive and negative impacts on forests (high productivity but loss of diversity, development of parasites, risks of forest fires), and the impacts on various economic activities (agriculture, food supply, tourism, insurance) and on health

  3. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  4. Martin Continues His Homeland Security Profession with New UASI Position

    OpenAIRE

    Issvoran, Heather

    2014-01-01

    Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.

  5. Detecting objects in radiographs for homeland security

    Science.gov (United States)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  6. Changing Homeland Security: What Should Homeland Security Leaders Be Talking About?

    Science.gov (United States)

    2006-07-01

    constructionism , middle-of-the-road moderation, and radical reconstructionism.14 BELLA VIT A, CH A NGI NG HOMELA ND SECU R ITY 6...nation by paying more attention to the social and economic conditions that give rise to and support “premeditated, politically motivated violence...threat.24 Left and right wing domestic terrorists are still active.25 Homeland security needs both short- and long-term perspectives. From a social

  7. A survey of COTS wireless transceiver solutions for unmanned/unattended homeland defense systems

    Science.gov (United States)

    Wurth, Timothy J.; Wells, Jeffrey S.; Trimble, Michael L.

    2004-08-01

    As the war on terrorism continues abroad, the need to maintain security at home remains a major concern. Every aspect of the security effort can benefit from rapid information transfer. Advances in Commercial-Off-the-Shelf (COTS) radios make them valuable in applications ranging from deployed sensors on unsecured borders, to organizing an emergency response team. Additionally, the reduced cost and availability of these transceivers make them a viable alternative to custom developments. As an example, COTS radios can serve as the communication element in Unattended Ground Sensor (UGS) and munitions systems. Other applications include networked sonobuoys and networked RFID tracking. An additional advantage of COTS solutions is that they are available in a small form factor. They have extremely small mechanical outlines and are easily installed in systems requiring miniature designs and light payloads such as man-pack emplaced radios for the Army"s Future Combat System (FCS), as well as missions carried out by Unmanned Aerial Vehicles (UAV). The availability of the COTS radios result in a low-cost alternative for communication links that are applicable to military and Homeland Defense projects. They provide an easily obtainable, low-cost radio alternative enabling quick design cycles to meet mission timeliness. COTS solutions eliminate months from a typical design cycle and have many features already implemented such as ad-hoc routing and encryption. This enables robust hardware to be fielded quickly when a new need arises. The focus of this paper is to identify different COTS modules that can efficiently and cost effectively be applied to these and other various applications.

  8. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    and largely ignores the social aspects that influence an individual’s beliefs, attitudes and, behaviors.53 Self-efficacy is defined by Albert Bandura ...master’s thesis Naval Postgraduate School, Monterey, CA), 39–52 53 Ibid., 53. 54 Albert Bandura , “Self-efficacy: Toward a Unifying Theory of...Hometown Security: Advancing the Homeland Security Paradigm, Homeland Security Affairs V (2009). http://www.hsaj.org/?fullarticle=5.2.2. Bandura

  9. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  10. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    After more than seven years of funding through The Centers for Disease Control and Prevention, local public health agencies have made inconsistent progress in fulfilling their Homeland Security objectives...

  11. Managing Materials and Wastes for Homeland Security Incidents

    Science.gov (United States)

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  12. Communications and Integration Enhancements to Improve Homeland Security

    National Research Council Canada - National Science Library

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  13. Homeland Security: Scope of the Secretary's Reorganization Authority

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2005-01-01

    .... While many of the proposed changes may be effectuated administratively, some might require legislative action due to limits on reorganization authority under the Homeland Security Act of 2002 (P.L. 107-296...

  14. Japan as a Paradigm for U.S. Homeland Security

    National Research Council Canada - National Science Library

    Ruth, Allen C

    2006-01-01

    ...) is in full swing and the United States is engaged around the world. These factors provide valid reasons for the United States to research other countries' homeland security paradigms to provide a contrast in methods of combating terrorism...

  15. A governor's guide to emergency management. Volume two : homeland security

    Science.gov (United States)

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  16. The Development and Recognition of Homeland Security Law

    National Research Council Canada - National Science Library

    McDaniel, Michael C

    2007-01-01

    .... Just as Congress passed thousands of pages of legislation in response to the events of 9/11, the Department of Homeland Security, created by one of those new laws, is churning out thousands of pages...

  17. The homeland security enterprise where do we fit?

    OpenAIRE

    Marlowe, Kirk S.

    2009-01-01

    CHDS State/Local Homeland security is a responsibility to be shared across the nation. Resource demands, differing cultures, and varying motivations result in frustration and confusion that conflict with the nation's need to collaborate and cooperate. As such, the homeland security enterprise appears to be imploding from turf battles, suspicion, poor communication, competitive funding, and mistrust, which cause stakeholders to wonder where they fit in this complex, interdependent env...

  18. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    recreation, national defense, and tourism . To understand the maritime homeland security efforts put into place after 9/11 better, a study of the practices...fire service venturing beyond its fire suppression or emergency medical services role and asserted the value of having firefighters better integrated...national defense, and tourism , so too must be the approach to maritime homeland security. This research examined only the role of state and local law

  19. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Resilience Is a Complex Adaptive System of Systems ( CASoS ) ....60 4. Resilience Is Experienced and Demonstrated in Different Ways ..60 5. Resilience Is...The inclusion of a resilience module into existing homeland security training programs broadens the practitioner’s knowledge base from a basic level...psychology offer several considerations for the homeland security practitioner. The first consideration maintains that a de -emphasis on the

  20. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  1. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  2. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Security June 2006, NIMS Revision Version 2 March 2007, NWDC Domestic Disaster Relief Operations Planning, 15 May 2006, AFRL-Supported Studies on Large- Scale Coordination, A Sociotechnical Systems...

  3. Homeland Security: Air Passenger Prescreening and Counterterrorism

    National Research Council Canada - National Science Library

    Elias, Bart; Krouse, William; Rappaport, Ed

    2005-01-01

    ... of their persons or baggage, or to prevent them from boarding an aircraft in the event of a terrorist watch list hit, is likely to be a difficult proposition for the federal agencies tasked with aviation security...

  4. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  5. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  6. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  7. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  8. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION

  9. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  10. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  11. Emergency management and homeland security: Exploring the relationship.

    Science.gov (United States)

    Kahan, Jerome H

    2015-01-01

    In the years after the 9/11 tragedy, the United States continues to face risks from all forms of major disasters, from potentially dangerous terrorist attacks to catastrophic acts of nature. Professionals in the fields of emergency management and homeland security have responsibilities for ensuring that all levels of government, urban areas and communities, nongovernmental organizations, businesses, and individual citizens are prepared to deal with such hazards though actions that reduce risks to lives and property. Regrettably, the overall efficiency and effectiveness of the nation's ability to deal with disasters is unnecessarily challenged by the absence of a common understanding on how these fields are related in the workforce and educational arenas. Complicating matters further is the fact that neither of these fields has developed agreed definitions. In many ways, homeland security and emergency management have come to represent two different worlds and cultures. These conditions can have a deleterious effect on preparedness planning for public and private stakeholders across the nation when coordinated responses among federal, state, and local activities are essential for dealing with consequential hazards. This article demonstrates that the fields of emergency management and homeland security share many responsibilities but are not identical in scope or skills. It argues that emergency management should be considered a critical subset of the far broader and more strategic field of homeland security. From analytically based conclusions, it recommends five steps that be taken to bring these fields closer together to benefit more from their synergist relationship as well as from their individual contributions.

  12. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal.... Postal Service Mail to Jeffery Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security...

  13. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal..., Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445...

  14. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting... Analysis Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  15. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications...

  16. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  17. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  18. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  19. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  20. Balanced Scorecard: A Strategic Tool in Implementing Homeland Security Strategies

    OpenAIRE

    Caudle, Sharon

    2008-01-01

    This article appeared in Homeland Security Affairs (October 2008), v.4 no.3 Starting in the early 1990s, Robert S. Kaplan and David P. Norton advocated a 'balanced scorecard' translating an organization's mission and existing business strategy into specific strategic objectives that could be linked in cause and effect relationships and measured operationally. The balanced scorecard stressed drivers of future organizational performance -- capabilities, resources, and business processes -- a...

  1. Unmanned Aircraft Systems: A Logical Choice for Homeland Security Support

    Science.gov (United States)

    2011-12-01

    UAS] has contributed to the seizure of more than 15,000 pounds of marijuana and the apprehension of more than 4,000 undocumented people.”6 Also, CBP...technology includes transponders, electro-optical, infrared radar, and synthetic aperture radar. Although each type of technology has advantages and...addition, the video and synthetic aperture radar capabilities on UAS can be used to provide imagery of river basins in support of flood response efforts

  2. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  3. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY... Fullano, Associate Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission...

  4. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  5. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Science.gov (United States)

    2011-09-28

    ... 1974; Department of Homeland Security Federal Emergency Management Agency--012 Suspicious Activity... establish a new system of records titled, ``Department of Homeland Security/Federal Emergency Management... Department of Homeland Security/Federal Emergency Management Agency to collect, maintain, and retrieve...

  6. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  7. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  8. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Science.gov (United States)

    2012-11-02

    ... the White House Homeland Security Partnership Council #0; #0; #0; Presidential Documents #0; #0; #0;#0... White House Homeland Security Partnership Council By the authority vested in me as President by the... States. Sec. 2. White House Homeland Security Partnership Council and Steering Committee. (a) White House...

  9. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  10. Exploring Security Vulnerabilities of Unmanned Aerial Vehicles

    NARCIS (Netherlands)

    Rodday, Nils Miro; de Oliveira Schmidt, R.; Pras, Aiko

    We are currently observing a significant increase in the popularity of Unmanned Aerial Vehicles (UAVs), popularly also known by their generic term drones. This is not only the case for recreational UAVs, that one can acquire for a few hundred dollars, but also for more sophisticated ones, namely

  11. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  12. How to Fund Homeland Security without Federal Dollars: State and Local Funding of Homeland Security Initiatives in Light of Decreased Support by the Federal Government

    National Research Council Canada - National Science Library

    Emler, Jay S

    2008-01-01

    .... This thesis, therefore, examined alternatives states and local units of government might use to fund homeland security initiatives, ranging from conventional alternatives such as, asset forfeiture...

  13. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  14. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  15. Wireless sensors and sensor networks for homeland security applications.

    Science.gov (United States)

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  16. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  17. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  18. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  19. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its third meeting on October...

  20. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Security, Reliability, and Interoperability Council (CSRIC III) scheduled for December 5, 2012, at Federal...

  1. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fourth meeting on...

  2. Twitter, Facebook, and Ten Red Balloons: Social Network Problem Solving and Homeland Security

    OpenAIRE

    Ford, Christopher M.

    2011-01-01

    This article appeared in Homeland Security Affairs (February 2011), v.7 no.1 This essay, the winner of the Center for Homeland Defense and Security (CHDS) Essay Contest in 2010, looks at how homeland security could benefit from crowd-sourced applications accessed through social networking tools such as Twitter and Facebook. Christopher M. Ford looks at the apparent efficacy of two such endeavors: the Defense Advanced Research Projects Agency'۪s (DARPA) competition to find ten 8-foot balloo...

  3. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  4. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  5. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    Science.gov (United States)

    2015-06-01

    to properly understand homeland security threats and their origin directly impacts our ability to prevent or mitigate these threats. “Homeland...of new cognitive approaches or policy tools to eliminate or mitigate homeland security threats, perhaps even at the level of their root causes. A key...to self-similar ‘fractal’ structure. The frequency spectrum of 1/f noise or flicker noise with a power-law spectrum S (f) ≈ f⁻β.” Bak, Tang, and

  6. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Science.gov (United States)

    2010-01-01

    ... Procedures for certification of approved products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... application for renewal must be made using the “Application for Certification of an Approved Product for...

  7. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  8. 75 FR 9238 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-03-01

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  9. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  10. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  11. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  12. A multisignal detection of hazardous materials for homeland security

    Directory of Open Access Journals (Sweden)

    Alamaniotis Miltiadis

    2009-01-01

    Full Text Available The detection of hazardous materials has been identified as one of the most urgent needs of homeland security, especially in scanning cargo containers at United States ports. To date, special nuclear materials have been detected using neutron or gamma interrogation, and recently the nuclear resonance fluorescence has been suggested. We show a new paradigm in detecting the materials of interest by a method that combines four signals (radiography/computer tomography, acoustic, muon scattering, and nuclear resonance fluorescence in cargos. The intelligent decision making software system is developed to support the following scenario: initially, radiography or the computer tomography scan is constructed to possibly mark the region(s of interest. The acoustic interrogation is utilized in synergy to obtain information regarding the ultrasonic velocity of the cargo interior. The superposition of the computer tomography and acoustic images narrows down the region(s of interest, and the intelligent system guides the detection to the next stage: no threat and finish, or proceed to the next interrogation. If the choice is the latter, knowing that high Z materials yield large scattering angle for muons, the muon scattering spectrum is used to detect the existence of such materials in the cargo. Additionally, the nuclear resonance fluorescence scan yields a spectrum that can be likened to the fingerprint of a material. The proposed algorithm is tested for detection of special nuclear materials in a comprehensive scenario.

  13. A multisignal detection of hazardous materials for homeland security

    International Nuclear Information System (INIS)

    Alamaniotis, M.; Terrill, S.; Perry, J.; Gao, R.; Tsoukalas, L.; Jevremovic, T.

    2009-01-01

    The detection of hazardous materials has been identified as one of the most urgent needs of homeland security, especially in scanning cargo containers at United States ports. To date, special nuclear materials have been detected using neutron or gamma interrogation, and recently the nuclear resonance fluorescence has been suggested. We show a new paradigm in detecting the materials of interest by a method that combines four signals (radiography/computer tomography, acoustic, muon scattering, and nuclear resonance fluorescence) in cargos. The intelligent decision making software system is developed to support the following scenario: initially, radiography or the computer tomography scan is constructed to possibly mark the region(s) of interest. The acoustic interrogation is utilized in synergy to obtain information regarding the ultrasonic velocity of the cargo interior. The superposition of the computer tomography and acoustic images narrows down the region(s) of interest, and the intelligent system guides the detection to the next stage: no threat and finish, or proceed to the next interrogation. If the choice is the latter, knowing that high Z materials yield large scattering angle for muons, the muon scattering spectrum is used to detect the existence of such materials in the cargo. Additionally, the nuclear resonance fluorescence scan yields a spectrum that can be likened to the fingerprint of a material. The proposed algorithm is tested for detection of special nuclear materials in a comprehensive scenario. (author)

  14. Communicating Health Risks under Pressure: Homeland Security Applications

    International Nuclear Information System (INIS)

    Garrahan, K.G.; Collie, S.L.

    2006-01-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  15. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    Science.gov (United States)

    2013-06-01

    create a coast-to-coast, interoperable digital emergency communications network.36 Accordingly, Homeland Security Act 2002 and Homeland Security...or fixed monitor that depicts friendly forces on an easy-to-read digitized geospatial map. The number of assets being tracked directly determines...Common Defense diminished since Colombian security forces killed notorious Medellin cartel leader Pablo Escobar in 1993.74 There undeniably is an

  16. Fortress America: The Aesthetics of Homeland Security in the Public Realm

    Science.gov (United States)

    2017-09-01

    matured and evolved as a profession and is now an integral part of all urban design. UK citizens benefit from aesthetical public spaces where security...only can homeland security architecture restrict access to public spaces, it might not actually make the public safer. The indirect costs of poorly...change. Until public agencies hold homeland security architecture projects to the same public benefit requirements as other projects, the hostile

  17. The Road Less Traveled: Exploring the Experiences and Successes of Women Leaders in Homeland Security

    Science.gov (United States)

    2013-03-01

    SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL March 2013 Author: Jonna West Approved by...local agencies with homeland security related agencies. For purposes of this study , agencies included the U.S. DHS and its component agencies, state...circles. In fact, often when the topic does come up, it is generally followed by discussions about feminism in general, and is often accompanied by

  18. Future Role of Fire Service in Homeland Security

    National Research Council Canada - National Science Library

    Cloud, Rosemary

    2008-01-01

    .... The problem is that the world has changed. Increasing terrorist threats against our homeland and the potential for pandemic or other natural disasters are shifting the mission and placing new unconventional demands on the fire department...

  19. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Science.gov (United States)

    2012-08-30

    ... border. The Public Safety and Homeland Security Bureau (Bureau), by this action, affords interested... INFORMATION CONTACT: Brian Marenco, Policy and Licensing Division, Public Safety and Homeland Security Bureau... 2007, the Commission delegated authority to Public Safety and Homeland Security Bureau to propose and...

  20. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  1. United States and Israeli Homeland Security: A Comparative Analysis of Emergency Preparedness Efforts

    National Research Council Canada - National Science Library

    Pockett, Consuella B

    2005-01-01

    This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland Security's Emergency Preparedness and Response directorate and the Israel Defense Forces Home Front Command...

  2. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  3. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  4. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  5. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  6. Planning for Success: Constructing a First Responder Planning Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Jankowski, Thaddeus K., Sr

    2005-01-01

    .... This thesis argues that the fire service and others in the first responder community will be able to contribute to homeland security missions much more effectively, and efficiently, by switching...

  7. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  8. HOMELAND SECURITY: Intergovernmental Coordination and Partnership Will Be Critical to Success

    National Research Council Canada - National Science Library

    2002-01-01

    .... Moreover, formation of a department should not be considered a replacement for the timely issuance of a national homeland security strategy, which is needed to guide implementation of the complex...

  9. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    Science.gov (United States)

    2017-06-01

    Approved for public release. Distribution is unlimited. SAUDI ARABIA’S COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY Majed M...examined in the previous chapter with examples from the case studies related to terrorist attacks and Saudi Arabia’s responses. Furthermore, the...COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY by Majed M. Bin Madhian June 2017 Thesis Advisor: James Russell Co-Advisor

  10. Homeland Security-Related Education and the Private Liberal Arts College

    OpenAIRE

    Moore, Gregory; Hatzadony, John G.; Cronin, Kelley; Breckenridge, Mary B.

    2010-01-01

    This article appeared in Homeland Security Affairs (May 2010), v.6 no.2 Small private liberal arts colleges enjoy certain advantages when developing new academic programs, such as in homeland security-related education. These institutions offer students the opportunity to acquire a broad-based education in order to gain a holistic view of the world, a critical need in this age of global challenges. Smaller colleges can also adapt more quickly to changes in the marketplace and are able to d...

  11. 2006 Homeland Security Symposium and Exposition. Held in Arlington, VA on 29-31 March 2006

    Science.gov (United States)

    2006-03-31

    Consequences , Vulnerabilities, and Threats) Prioritize Implement Protective Programs Measure Effectiveness 9March 2006 Major NIPP Theme: Sector Partnership... effect of exposure • Full understanding of the levels of exposure that mark the onset of miosis • Refined human operational exposure standard for GB...Untitled Document 2006 Homeland Security Symposium and Exposition.html[7/7/2016 11:38:26 AM] 2006 Homeland Security Symposium and Exposition

  12. Cybersecurity Lanes in the Road for the Department of Homeland Security

    Science.gov (United States)

    2016-06-01

    imposing censorship here in the United States.”66 According to President Obama the main goal of the attack was for North Korea to impose restrictions on...was Congress passing Public Law 107–56 in October 2001, titled “The Uniting and Strengthening America by Providing Appropriate Tools Required to...Department of Homeland Security, modified October 2014, http://www.dhs.gov/creation-department-homeland-security. 80 Uniting and Strengthening America by

  13. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  14. The Reality Of The Homeland Security Enterprise Information Sharing Environment

    Science.gov (United States)

    2017-12-01

    Related Information to Protect the Homeland (GAO 15- 290) (Washington, DC: U.S. Government Accountability Office, 2015), http://www.gao.gov/ assets...Government Accountability Office [GAO], Information Sharing Environment Better Road Map Needed to Guide Implementation and Investments (GAO-11-455...and its ISE PM would have clearer accountability for information sharing lapses and a faster ability to reform or develop domestic information -sharing

  15. E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom

    Science.gov (United States)

    2010-04-01

    thesis is a prima facie , Strength, Weakness, Opportunity and Threat (SWOT) analysis of both the NSC/DoD and the HSC/DHS security/defense...all true Muslims have an obligation to engage in violent acts with the aim of relieving the world of corrupt values and social demagoguery. Extremist...9426085 on December 26, 2009). 47 meet the obligations associated with the globalization of democracy, America must align resources in a well

  16. An exploratory risk perception study of attitudes toward homeland security systems.

    Science.gov (United States)

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  17. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    published books and peer reviewed journal articles. The Congressional Research Service being the key source on congressional procedure and theory ...Transportation Committee 1 Senate Homeland Security & Governmental Affairs Committee 15 Senate Small Business & Entrepreneurship 1 Senate Special...military contracting procedures in a war zone are not necessarily oversight of national security functions, reviews of FEMA contracting practices

  18. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  19. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... cybersecurity awareness, education, talent management, and professional development and training. NICCS Portal... Education Office, will submit the following Information Collection Request (ICR) to the Office of Management... contemplated: Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security...

  20. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  1. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    national security and the interagency process ( Marcella , 2010). All these documents reviewed focused mainly on national security and overseas...administration, they were considered “the heart and soul of the process” ( Marcella , 2010). While subtle differences exist across administrations, the IPC...and build consensus across the government for action ( Marcella , 2010). During the second term of the Bush administration and during the first years

  2. 78 FR 39301 - Committee name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-07-01

    ... early if the committee has completed its business. ADDRESSES: The meeting will be held at Ronald Reagan... research; campus and community resiliency, security and preparedness; faculty exchanges; and cybersecurity... Cybersecurity) will give progress reports. The HSAAC Subcommittee on Cybersecurity may present draft...

  3. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  4. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Science.gov (United States)

    2011-07-06

    ... the Terrorist Screening Database System of Records relates to official DHS national security and law... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 [Docket No. DHS-2011-0060] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--030 Use of the...

  5. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  6. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    Science.gov (United States)

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  7. 8 CFR 2.1 - Authority of the Secretary of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ... Secretary's discretion, delegate any such authority or function to any official, officer, or employee of the Department of Homeland Security, including delegation through successive redelegation, or to any employee of the United States to the extent authorized by law. Such delegation may be made by regulation...

  8. Myth, Metaphor, and Imagination: Framing Homeland Security as Art and Archetype

    Science.gov (United States)

    2013-03-01

    Culture to Identify the Post 9/11 Homeland Security Zeitgeist” (Master’s thesis, Naval Postgraduate School, 2008). 4 Abraham H. Maslow , The Farther...Archetypes in a Public Mental Hospital.” Doctoral dissertation, University of Southern California, 1987. Maslow , Abraham H. 1971. The Farther Reaches

  9. Homeland Security and Emergency Management Education: An Investigation into Workforce Needs

    Science.gov (United States)

    Carlson, Cameron D.

    2017-01-01

    The U.S. Department of Homeland Security (DHS) was created in the wake of the September 11th 2001 terrorist events. DHS's formation, the largest reorganization of a governmental agency in over 50 years, brought a new emphasis on the protection of the nation, its citizens and its infrastructure to government emergency management policy. Previously,…

  10. SEVIS: The Impact of Homeland Security on American Colleges and Universities

    Science.gov (United States)

    Danley, Janet V.

    2010-01-01

    This chapter covers the impact of homeland security mandates on institutions and international students and scholars. The author traces the history of interest by the Immigration and Naturalization Service (INS) in developing a management system for international students and scholars that eventually resulted in the birth of Student and Exchange…

  11. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  12. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  13. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    Science.gov (United States)

    2013-05-24

    Secretary of Homeland Security also has the responsibility for establishing International Security Cooperation with the countries of Canada and Mexico ...and goals”84 to improve its culture and morale issues. However, further study is required to determine ways to: de -conflict the overlap of...National Preparedness Description is one of the requirements for Presidental Policy Directive-8. 55 the Joint Staff integrates internal and external

  14. Multimodal biometric digital watermarking on immigrant visas for homeland security

    Science.gov (United States)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  15. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  16. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  17. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false All other CBP regulations issued under the authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY...

  18. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Science.gov (United States)

    2011-11-23

    ... http://www.regulations.gov . FOR FURTHER INFORMATION CONTACT: For general questions and privacy issues... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal Records System of Records AGENCY: Privacy...

  19. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Policy, U.S. Department of Homeland Security, Washington, DC 20528. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0040] Privacy Act of... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY...

  20. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  1. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  2. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  3. State and Local Homeland Security Officials: Who Are They and What Do They Do?

    Science.gov (United States)

    2011-09-01

    importance of social networking and its direct impact upon the effectiveness of their work during an emergency. (Marcus, 2005, as adapted by Bell...strict constructionists who maintain that homeland security is about terrorism, middle-of-the-road moderates who sense that an all-hazards approach... method . As the interviews were conducted, data was analyzed and patterns emerged, which then provide insight into the population being studied. The

  4. A Model for Effective Organization and Communication of Homeland Security Activity at the State Level

    Science.gov (United States)

    2007-03-01

    whether managing the functional segments of a major corporation, i.e. sourcing, product development, inbound/ outbound logistics , or after-market services...homeland security concerns. While none specifically addresses the mechanics or logistics of the reorganization of state governments, it does assert...and around casino and hotels . Respond to all threats and hazards. Admit lawful bettors and visitors. Promote legal gaming.41 Department of

  5. Energizing the Enterprise: An Incentive-Based Approach to Homeland Security

    Science.gov (United States)

    2010-12-01

    8217" (master’s thesis, Naval Postgraduate School, 2007), 79–82. 8 desensitization and complacency often hamper long-term results, necessitating additional...for contributing to homeland security, it may exact a cost from the offering entity. Additionally, some incentives may require advertising to make...people aware of their existence. Many of these advertisements , however, might be able to be combined with existing awareness campaign messages. 2

  6. Employing the intelligence cycle process model within the Homeland Security Enterprise

    OpenAIRE

    Stokes, Roger L.

    2013-01-01

    CHDS State/Local The purpose of this thesis was to examine the employment and adherence of the intelligence cycle process model within the National Network of Fusion Centers and the greater Homeland Security Enterprise by exploring the customary intelligence cycle process model established by the United States Intelligence Community (USIC). This thesis revealed there are various intelligence cycle process models used by the USIC and taught to the National Network. Given the numerous differ...

  7. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  8. In Support of the Common Defense: Homeland Defense and Security Journal. Volume 1

    Science.gov (United States)

    2012-04-01

    as the United Kingdom, France, and Norway to name a few. Sharia law is Islamic law. While most people understand that the Quran is the Bible of Islam...grotesquely, Satanism . The Cult serves as a stabilizing religious force by using traditional cultural norms to justify the new narco-culture.35...irp/offdocs/pdd/pdd-39. pdf (accessed November 3, 2010). 4. Executive Order 13228 of October 8, 2001, Establishing the Office of Homeland Security and

  9. Domestic Aerial Surveillance and Homeland Security: Should Americans Fear the Eye in the Sky?

    Science.gov (United States)

    2014-03-01

    In this case, an individual in North Dakota barricaded himself inside his property after officials ordered him to return six cows that wondered onto...www.hsdl.org/?view&did=737816. 24 Donald F. Kettl, System under Stress : Homeland Security and American Politics (Washington, DC: CQ, 2007), 113-115...police used a thermal imaging device to detect abnormal levels of heat radiating from the home of Danny Kyllo. Officials entered his home without a

  10. The Impact of Organizational Culture on the Sharing of Homeland Security Information

    Science.gov (United States)

    2008-04-04

    transform an organization through 8 U.S. Government Accountability Office, “Homeland Security: Efforts...www.whitehouse.gov/omb/ egov /documents/FEA_Practice_Guidance.pdf (accessed September 23, 2007), 4-1. 10 U.S. Government Accountability Office, GAO-04-777, 12...between the federal government and the state and local governments , and the transformation of disparate cultures into a new executive department – the

  11. Gamma-ray imaging. Applications in nuclear non-proliferation and homeland security

    International Nuclear Information System (INIS)

    Vetter, Kai; Mihailescu, Lucian

    2010-01-01

    This paper provides the motivation and describes implementations of gamma-ray imaging for homeland security applications and more general for national and international nuclear security. As in nuclear medicine and astrophysics, the goal of gamma-ray imaging is the detection and localization of nuclear materials, however, here in a terrestrial environment with distances between nuclear medicine and astrophysics, i.e. in the range of 1-100 meters. Due to the recently increased threat of nuclear terrorism, the detection of illicit nuclear materials and the prevention of nuclear proliferation through the development of advanced gamma-ray imaging concepts and technologies has become and active research field. (author)

  12. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  13. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Science.gov (United States)

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of...: United States Coast Guard Auxiliary Database (AUXDATA). Security classification: Unclassified. System...

  14. Homeland Security: Compendium of Recommendations Relevant to House Committee Organization and Analysis of Considerations for the House

    National Research Council Canada - National Science Library

    Koempel, Michael L

    2005-01-01

    .... The original report was not changed; its summary follows: The 9/11 Commission and other commissions and think tanks studying homeland security recommended congressional committee reorganization to increase Congress's policy and oversight coordination...

  15. Integrated homeland security system with passive thermal imaging and advanced video analytics

    Science.gov (United States)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  16. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  17. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    culture, morale, and job satisfaction levels of employees .28 Gerstein argues the development of a Homeland Security personnel system and career maps...and culture, low morale, and job satisfaction levels of employees . DHS has been following a similar approach to the DOD in terms of professional...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  18. The FBI is Leading the Way by Making the Private Sector an Integral Part of the Counterterrorism Homeland Security Enterprise

    Science.gov (United States)

    2012-09-01

    This thesis discusses the building of a sustainable business process wherein the private sector is integrated into the homeland security apparatus...As the threat our nation and her allies face continues to evolve, so must our responses. Integrating the private sector into the homeland security...attack. The private sector brings with it a plethora of talents and resources. Because it has not traditionally been seen as a partner the private sector has

  19. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  20. Enabling private and public sector organizations as agents of homeland security

    Science.gov (United States)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  1. Homeland security and virtual reality: building a Strategic Adaptive Response System (STARS).

    Science.gov (United States)

    Swift, Christopher; Rosen, Joseph M; Boezer, Gordon; Lanier, Jaron; Henderson, Joseph V; Liu, Alan; Merrell, Ronald C; Nguyen, Sinh; Demas, Alex; Grigg, Elliot B; McKnight, Matthew F; Chang, Janelle; Koop, C Everett

    2005-01-01

    The advent of the Global War on Terrorism (GWOT) underscored the need to improve the U.S. disaster response paradigm. Existing systems involve numerous agencies spread across disparate functional and geographic jurisdictions. The current architecture remains vulnerable to sophisticated terrorist strikes. To address these vulnerabilities, we must continuously adapt and improve our Homeland Security architecture. Virtual Reality (VR) technologies will help model those changes and integrate technologies. This paper provides a broad overview of the strategic threats, together with a detailed examination of how specific VR technologies could be used to ensure successful disaster responses.

  2. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  3. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  4. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  5. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  6. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... addressing privacy concerns. The fifteen- year retention period will allow CBP to access the data when needed... security, law enforcement and counterterrorism missions, while addressing privacy concerns. Legal or...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs and Border...

  7. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  8. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  9. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    Cong., 2nd sess., April 20, 1950. 13 8 U.S.C. 1104 . 14 8 U.S.C. 1201. AILA InfoNet Doc. No. 11071267. (Posted 07/12/11) Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS automated

  10. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  11. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    Protection’s office responsible for securing the United States’ land border in the Detroit area. PoD provides a wide rage of cargo processing functions...a wide range of threats. Improper trademark labeling, tariffs, import quotas, agricultural issues, narcotics, human trafficking, and terrorism are...unloaded a truck, CBP agents search through the cargo. They open boxes, use hand-held radiation detectors, canines , and x-ray machines to inspect the

  12. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  13. Homeland Security: Compendium of Recommendations Relevant to House Committee Organization and Analysis of Considerations for the House, and 109th and 110th Congresses: Epilogue

    National Research Council Canada - National Science Library

    Koempel, Michael L

    2007-01-01

    ...: The 9/11 Commission and other commissions and think tanks studying homeland security recommended congressional committee reorganization to increase Congress's policy and oversight coordination...

  14. Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications

    International Nuclear Information System (INIS)

    Reijonen, Jani

    2006-01-01

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented

  15. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ... civil rights, civil liberties, such as profiling on the basis of race, ethnicity, or religion, by.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it); Allegation... Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive...

  16. The Journal of the Naval Postgraduate School Center for Homeland Defense and Security. Volume 6. Issue 3

    Science.gov (United States)

    2010-09-01

    genetic relationships between kin.33 Regardless of the underlying mechanism, individual symbiotic relationships can confer multiple benefits to the...allocation guidelines for homeland security and emergency management policymakers. The framework provides an operationally relevant rubric for...S. Wells, The Journey of Man: A Genetic Odyssey (Princeton, NJ: Princeton University Press, 2002). 4 A. Jakubowicz, “Anglo-multiculturalism

  17. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... Flexibility Act, 5 U.S.C. 605(b), as amended by the Small Business Regulatory Enforcement and Fairness Act of... Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS). ACTION: Final... consolidate all Federal regulations on drug-free workplace requirements for financial assistance into one...

  18. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  19. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Science.gov (United States)

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  20. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Science.gov (United States)

    2013-11-21

    ... Emergency Management Agency, 500 C Street SW., Washington, DC 20475. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0077] Privacy Act of..., Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy...

  1. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  2. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  3. 78 FR 28867 - Privacy Act of 1974; Department of Homeland Security/U.S. Immigration and Customs Enforcement-014...

    Science.gov (United States)

    2013-05-16

    ... related to travel and identity documents; latent and patent finger and palm prints; and audio and video... Homeland Security Investigations (HSI) that provides a broad range of forensic, intelligence, and... finger and palm prints; and audio and video files in support of law enforcement investigations and...

  4. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  5. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    Science.gov (United States)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  6. The use of stimulated electron emission (SEE) in homeland security applications

    Science.gov (United States)

    Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.

    2012-06-01

    Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

  7. Design of a sensor network system with a self-maintenance function for homeland security applications

    International Nuclear Information System (INIS)

    Fujiwara, Takeshi; Takahashi, Hiroyuki; Iyomoto, Naoko

    2008-01-01

    In this study, we develop a new concept of a robust wireless sensor network for homeland security applications. The sensor system consists of intelligent radiation sensors that can communicate each other through the wireless network. This structure can cover a wide area with a flexible geometry which is suitable for detecting a moving object with a detectable radiation source. Also, it has a tolerance against both the partial node's failure and packet errors; realized by a Self-Maintenance function. The Self-maintenance function is a function that enables an artifact to find, diagnosis and fix the trouble automatically and maintain itself. So far some approaches have been tried to realize robust monitoring system by applying the idea of multiplex system, based on ''2 out of 3'', but this requires a large amount of the hardware and is not suitable for sensor network systems. We designed a sensor network system with Self-Maintenance function based on qualitative reasoning technique for robust wireless sensor network system, and an instrument network based on ZigBee has been set up for investigations. CsI(Tl) gamma-ray detectors are used as sensors. The network system picks up correlation signals from sensors even some of sensors send false signals, which can be used as a reliable detection system for practical use. (author)

  8. Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system

    Science.gov (United States)

    Antony, Richard T.; Karakowski, Joseph A.

    2010-04-01

    A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.

  9. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  10. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    Energy Technology Data Exchange (ETDEWEB)

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  11. Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security. Volume 1

    Science.gov (United States)

    2003-11-01

    were used to develop a web-based "deployment picture." (A little money -a few million dollars-can go a long way in the combatant commands). OSD critical...AND MISSIONS f1 HOMELAND SECURJTY 91 APP8VD&XH Dr. Mark Harper U.S. Naval Academy Mr. Art Money Private Consultant Mr. Walter Morrow, Jr. MIT Lincoln...Protection BrigGen Irv Halter Discussion Mr. John Lauder Overview of NRO support to Homeland Security Mr. Brian Hack and Mr. Alan NRO Comms - NRO backbone

  12. Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security

    Science.gov (United States)

    Yilmaz, Bahadır.

    2013-06-01

    Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.

  13. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  14. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    Science.gov (United States)

    2012-12-01

    ALPR Automated License Plate Readers DHS Department of Homeland Security DOJ Department of Justice EOA Ecosystem-Oriented Architectures FEMA...through the use of technology, including the use of automated license plate readers ( ALPR ), ballistics evidence from crime scenes and confiscated...interest, their associates, and the use of ALPR technology to track criminal suspects and their routes of travel. Other recommendations included: the

  15. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-09-19

    ... Portal is a national online resource for cybersecurity awareness, education, talent management, and... Management and Budget (OMB) for review and clearance in accordance with the Paperwork Reduction Act of 1995... of Management and Budget. Comments should be addressed to OMB Desk Officer, Department of Homeland...

  16. The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

    Science.gov (United States)

    2010-03-19

    trends. This report was designed to support the BEST’s and other operational components in planning and conducting outbound firearms smuggling...operations throughout the homeland and overseas through executing procurement, budget, logistics , and training functions. The Executive Information and...shooting and bombing rampage at two hotels , a railway station, hospital, Jewish Center, cafe, and cinema. 164 were killed. All of these attacks

  17. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    Science.gov (United States)

    2016-08-01

    and opinions regarding potential drawbacks to date. While the drawbacks noted are significant, we also identified several poten- tial benefits to...defend, as it deals entirely in hypothet- ical situations and is based solely on the opinions and conjecture of those interviewed. Nonetheless, stream...of Staff, Homeland Defense, Joint Publica - tion 3-27, Washington, DC: Joint Chiefs of Staff, July 29, 2013, Ap- pendix A, pp. A-1 – A-6. 9

  18. Controlling disasters: Local emergency management perceptions about Federal Emergency Management and Homeland Security actions after September 11, 2001.

    Science.gov (United States)

    Hildebrand, Sean

    This article examines local emergency manager's beliefs regarding control over tasks during various stages of the hazard cycle since federal policies went into effect following the September 11 attacks. The study considers whether a disparity exists between the actions of local officials during each phase of the "hazard cycle" and the policy expectations of the federal government, which call for greater federal control over activities in emergency management and homeland security. To do so, hypothesis testing investigates the jurisdiction's use of comprehensive emergency management (CEM) practices, the perceived "clarity" of the federal policy demands, and if the local actors feel coerced to comply with federal policy demands so that grant funding is not compromised. Using a model developed from "third-generation" policy implementation research, the results show that the odds of local officials citing federal control over these actions have very limited statistical significance. This signals that the perceived lack of local input into the development of these federal policies and the policies' limited use of traditional CEM measures may not be in concert with what local actors perform in the field. Simply put, the respondents claim to understand the federal policy demands, support the concept of federal control as the policies describe, yet follow their own plans or traditional CEM principles, even if such actions do not support the federal policy demands. These results align with pre-existing research in the emergency management field that show issues with efforts to centralize policies under the Department of Homeland Security and Federal Emergency Management Agency.

  19. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Science.gov (United States)

    2011-06-14

    ... business practices. Information will be submitted to DHS/NPPD through the Chemical Security Assessment Tool... programs. DHS/ TSA/TTAC will compare the information of affected individuals collected by DHS (via CSAT) to... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses...

  20. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  1. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  2. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  3. FY2014 Appropriations Lapse and the Department of Homeland Security: Impact and Legislation

    Science.gov (United States)

    2013-10-24

    and Programs Directorate (NPPD) • Office of Biometric Identity Management • Federal Protective Service Under the Federal Emergency Management...performance of excepted work during the period of the appropriations lapse. After appropriations are enacted, payroll centers will pay all excepted...four hours of work completely dedicated to de- activating a function, such as securing documents, completing payroll , etc.12 Presidential appointees

  4. Compliance Issues and Homeland Security with New Federal Regulations for Higher Education Institutions

    Science.gov (United States)

    Valcik, Nicolas A.

    2010-01-01

    Research advancements into different fields of study have increased the risks for accidents, criminal acts, or a potential breach of national security, and the types of hazardous materials (HAZMAT) stored and used at universities and colleges are under new scrutiny. Before, a chemistry laboratory might only have basic substances such as sulfur,…

  5. 76 FR 44452 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Science.gov (United States)

    2011-07-26

    ..., including 5 U.S.C. 552a(c)(3), which entitles individuals to an accounting of disclosures of their records... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who...

  6. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-09-29

    ...)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the... recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also...

  7. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... preamble, DHS amends Chapter I of Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF...

  8. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Science.gov (United States)

    2010-03-01

    ... subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could... information. Disclosure of the accounting would therefore present a serious impediment to ICE's Visa Security... individuals under certain circumstances, such as where the access or disclosure of such information would...

  9. 77 FR 1387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/Federal...

    Science.gov (United States)

    2012-01-10

    ... request is made, for the following reasons: (a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual... national security. Disclosure of the accounting would also permit the individual who is the subject of a...

  10. 76 FR 42005 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The...

  11. Visa Security Policy: Roles of the Departments of State and Homeland Sec

    Science.gov (United States)

    2010-03-08

    report pursuant to S. Res.137., committee print, 81st Cong., 2nd sess., April 20, 1950. 11 8 U.S.C. 1104 . 12 8 U.S.C. 1201. Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS

  12. 2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday

    Science.gov (United States)

    2008-01-16

    www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of

  13. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  14. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  15. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  16. The Department of Homeland Security’s Pursuit of Data-Driven Decision Making

    Science.gov (United States)

    2015-12-01

    security missions at a critical time. The absence of a recognized, authoritative information source from which leaders could assess the impacted property...Furthermore, as all the DHS Components except TSA were legacy agencies from other parent departments, they each brought with them their unique...and leadership styles influence the Management Directorate’s ability to engage with the Components and drive change. It explores how the lack of

  17. Bigfoot or Big Mistake: Is CBP’s Expanding Footprint Helping or Hurting Homeland Security

    Science.gov (United States)

    2017-03-31

    Faculty of the Joint Advanced Warfighting School in partial satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning...ship. The Container Security Initiative is currently operational in 58 ports in 30 countries around the world. This accounts for 80% of incoming ...be viewed as a jobs program and method to inject money into the system. National borders are what create price differentiation and supply and demand

  18. Extra-light gamma-ray imager for safeguards and homeland security

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Oleg P.; Semin, Ilya A.; Potapov, Victor N.; Stepanov, Vyacheslav E. [National Research Centre Kurchatov Institute, Moscow, 123182, (Russian Federation)

    2015-07-01

    Gamma-ray imaging is the most important way to identify unknown gamma-ray emitting objects in decommissioning, security, overcoming accidents. Over the past two decades a system for producing of gamma images in these conditions became more or less portable devices. But in recent years these systems have become the hand-held devices. This is very important, especially in emergency situations, and measurements for safety reasons. We describe the first integrated hand-held instrument for emergency and security applications. The device is based on the coded aperture image formation, position sensitive gamma-ray (X-ray) detector Medipix2 (detectors produces by X-ray Imaging Europe) and tablet computer. The development was aimed at creating a very low weight system with high angular resolution. We present some sample gamma-ray images by camera. Main estimated parameters of the system are the following. The field of view video channel ∼ 490 deg. The field of view gamma channel ∼ 300 deg. The sensitivity of the system with a hexagonal mask for the source of Cs-137 (Eg = 662 keV), is in units of dose D ∼ 100 mR. This option is less then order of magnitude worse than for the heavy, non-hand-held systems (e.g., gamma-camera Cartogam, by Canberra.) The angular resolution of the gamma channel for the sources of Cs-137 (Eg = 662 keV) is about 1.20 deg. (authors)

  19. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  20. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  1. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  2. Department of Homeland Security

    Science.gov (United States)

    ... DHS Idea Combating Human Trafficking Visa Waiver Program Immigration Case Status REAL ID Forms Online Safety Online ... the National Terrorism Advisory System (NTAS) Find Training Opportunities File a Travel Complaint (DHS TRIP) Do you ...

  3. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  4. Department of Defense Involvement in Homeland Security: The Militarization of the Southwestern Border in the U.S

    National Research Council Canada - National Science Library

    Thompson, Michael A

    2008-01-01

    .... The Department of Defense (DoD) was given the lead role in Homeland Defense and it directed the U.S. Northern Command (USNORTHCOM) to implement plans and policies to defend against future terrorist attacks...

  5. 76 FR 70735 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... identify potential national security concerns, criminality, and fraud to ensure that serious or complex... duplicate and related accounts and identify potential national security concerns, criminality, and fraud to... identify national security concerns, criminality, and fraud to ensure that serious or complex cases receive...

  6. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  7. 76 FR 60385 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2011-09-29

    ... for Disclosures) because release of the accounting of disclosures could alert the subject of an... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... ongoing law enforcement, national security or fraud investigation; to avoid disclosure of investigative...

  8. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ..., date of birth, and social security number. Organization's name; Citizenship; Country of origin, if... servers, magnetic disc, tape, digital media, and CD-ROM. Retrievability: Records may be retrieved by...

  9. 75 FR 79947 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Science.gov (United States)

    2010-12-21

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... particularly to any potential plans to collect cybersecurity information from private entities regarding cyber... security threats and would not include the Bank Secrecy Act (BSA) related SARs filed with FinCEN. The ISE...

  10. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... agency to publish in the Federal Register a description denoting the type and character of each system of... DHS IT resources; IP address of access; Logs of Internet activity; and Records on the authentication... and Technology (NIST) Security Standards from Authentication to Certification and Accreditation...

  11. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    ... AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with... Security Office of Health Affairs to collect and maintain records on individuals who receive emergency care... consistent, quality medical care. To support MQM, OHA operates the electronic Patient Care Record (ePCR), an...

  12. 76 FR 70638 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S...

    Science.gov (United States)

    2011-11-15

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The authority...

  13. 78 FR 69983 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S...

    Science.gov (United States)

    2013-11-22

    ...) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... relating to DHS activities from disclosure to subjects or others related to these activities. Specifically...

  14. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-12-28

    ...)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the... recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting could also...

  15. 78 FR 58254 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2013-09-23

    ...)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert... the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also...

  16. 77 FR 47767 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2012-08-10

    ... subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could... as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting...

  17. 78 FR 20680 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-04-05

    ... USCIS ELIS employees receive training and agree to USCIS-wide system rules of behavior before being...., involvement with national security threats, criminal offenses, Communist party, torture, genocide, killing... eligibility for requested benefits. Disclosure to consumer reporting agencies: None. Policies and practices...

  18. A Surveillance Society and the Conflict State: Leveraging Ubiquitous Surveillance and Biometrics Technology to Improve Homeland Security

    Science.gov (United States)

    2002-09-01

    of Industrial Organizations AIDS: Acquired Immune Deficiency Syndrome ANSI: American National Standards Institute APHIS: Animal, Plant, and Health...between a specific person and an impostor than any other type of identification technique. They provide the additional, convenient security...preferable to an impostor being able to defeat the system (Ashbourn, p. 56). Retina scanning systems are resistant to fraud since duplicate artificial

  19. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Science.gov (United States)

    2010-02-03

    ...'s or entity's name; Digital photograph; Date of birth, place of birth, and age; Social security number; Duty/work address and telephone number; Alias; Race and ethnicity; Citizenship; Fingerprints; Sex... servers, magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by...

  20. 78 FR 70313 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-11-25

    ... performing or working on a contract, service, grant, cooperative agreement, or other assignment for DOS, when...; Date of Birth; Gender; A-Number; Social Security number; Immigration Status; Date of Arrival in the U.S... disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with...

  1. 76 FR 69749 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-029 Notice of...

    Science.gov (United States)

    2011-11-09

    ... person making the disclosure. I. To an organization or individual in either the public or private sector... vetting of individuals pursuant to its mission for protecting and securing the maritime sector. The..., date and place of birth, gender, country of citizenship, travel/mariner document type, number and...

  2. Homeland calling

    DEFF Research Database (Denmark)

    Juul, Kristine

    2007-01-01

    A great deal of those immigrants that settled in Denmark in the 1970s and 1980s have maintained strong bonds to their communities of origin. These bonds play an important role in shaping the identities and in maintaining relationships between migrants in the receiving communities. But while...... on the institutions and practices that act to transmit relations between country of origin and the new homeland. Focus is particularly on the efforts that the Yugoslav and Serbian states have made to maintain migrants political and economic loyalty and on the effects that this has had on migrants perceptions on key...

  3. Advancing U.S. Foreign Policy Through Homeland Security: The Logic for International Training and Professional Exchanges

    Science.gov (United States)

    2013-12-01

    pyramid .83 The 80 White House, National Security Strategy. 81 Ibid. 82 Joseph S. Nye, The Powers to...Lead (New York: Oxford University Press, Inc., 2008), 18 83 Ibid., 2. 34 pyramid style of leadership (as seen in Figure 5) fits well in a...Poland $2.20 Lebanon $2.50 Czech Republic $1.90 Iraq $2.00 Ukraine $1.90 Tunisia $1.95 Georgia $1.81 Egypt $1.90 Romania $1.76 Morocco $1.80

  4. Human health risk assessment database, "the NHSRC toxicity value database": supporting the risk assessment process at US EPA's National Homeland Security Research Center.

    Science.gov (United States)

    Moudgal, Chandrika J; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  5. Human health risk assessment database, 'the NHSRC toxicity value database': Supporting the risk assessment process at US EPA's National Homeland Security Research Center

    International Nuclear Information System (INIS)

    Moudgal, Chandrika J.; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-01-01

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007

  6. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  7. Design Validation of a {sup 10}B{sub 4}C Coated RSP with Multi-layered structure for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Su Hyun; Kim, Jong Yul; Lee, Joo Hyun; Moon, Mung Kook [KAERI, Daejeon (Korea, Republic of); Lim, Chang Hwy [Korea Research Institute of Ships and Ocean Engineering, Daejeon (Korea, Republic of); Lim, Ki Seo [Myongji University, Yongin (Korea, Republic of)

    2016-05-15

    It is a national priority to prevent radiological threats including radiological terrorism and smuggling nuclear material and devices. For this purpose, many governments and relevant organizations have been exploiting radiation detection technology. Especially, radiation portal monitor (RPM) is a widely used type of radiation detectors when it comes to homeland security and commonly deployed at strategic sites like airports and ports. In the most cases, they could be divided into two types of primary screening and secondary screening. In the latter case, hand-held detectors are mainly used for a closer inspection. On the other hand, RPMs for the primary screening, our concern, are stationary mounted type and comprise gamma-ray detector and neutron detector in many cases. The expected performance of the design of a RSP(Radiation Sensor Panel) has been demonstrated. According to the results of the simulation, three RSPs should be needed to meet the criterion mentioned in subsection 2.1. The design still can be validated when taking into account that the geometrical acceptance will be increased since it has been planned that the RPM is going to installed with four RSPs.

  8. STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    Science.gov (United States)

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    2009-05-01

    The U.S. Department of Homeland Security's Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to defeat explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.

  9. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data

  10. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  11. Detection of unmanned aerial vehicles using a visible camera system.

    Science.gov (United States)

    Hu, Shuowen; Goldman, Geoffrey H; Borel-Donohue, Christoph C

    2017-01-20

    Unmanned aerial vehicles (UAVs) flown by adversaries are an emerging asymmetric threat to homeland security and the military. To help address this threat, we developed and tested a computationally efficient UAV detection algorithm consisting of horizon finding, motion feature extraction, blob analysis, and coherence analysis. We compare the performance of this algorithm against two variants, one using the difference image intensity as the motion features and another using higher-order moments. The proposed algorithm and its variants are tested using field test data of a group 3 UAV acquired with a panoramic video camera in the visible spectrum. The performance of the algorithms was evaluated using receiver operating characteristic curves. The results show that the proposed approach had the best performance compared to the two algorithmic variants.

  12. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  13. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    International Nuclear Information System (INIS)

    Bentz, A.

    2008-01-01

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  14. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  15. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  16. A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

    Directory of Open Access Journals (Sweden)

    Dhiman Chowdhury

    2018-05-01

    Full Text Available During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot communicate with each other and also the terrorists cannot go through the ongoing apprehensive operation via wireless communications. This paper presents a novel framework of an unmanned aerial vehicular networking signal jammer which is oriented to block incoming and outgoing signals of all frequencies transmitted from a specifically marginalized territory scanned and explored by the aerial vehicle. During such a cyber-vigilance operation, the aerial vehicle is equipped with a transmitter and an auto-tuning band-pass filter module with automatic regulation of center frequencies according to the surrounding networking signals, which are considered to be the suppressing noise parameters. In order to restrict the signal blocking operation within the militant hub, the aerial vehicle with the network terminator is controlled to navigate within a particular boundary of a residential area and its navigation is continuously mapped and stored for effective evacuation process directed to save the innocent stranded people. A very low frequency (VLF metal detector has been designed to trace the explosives and buried landmines inside the exploration arena. An algorithm for 3-D mapping of the metal traces detected by the aerial navigator has been presented in this paper. Signal blocking, metal tracing and stable confined movements have been tested where the testbed is provided with signals of different frequencies along with variation in dimensions of the testing region to evaluate the reliability of the proposed framework.

  17. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  18. The "Global" Homeland: International Perspectives on Counterterrorism and Homeland Security

    National Research Council Canada - National Science Library

    Tussing, Bert

    2004-01-01

    .... Yet, we are not in this alone. Other nations, international organizations such as NATO and the European Union, and transnational law enforcement agencies such as Europol and Interpol are deeply committed to the counter terror effort...

  19. Homeland Defense and Homeland Security: Creating Unity of Effort

    Science.gov (United States)

    2009-02-12

    law enforcement. Canada-based Asian DTOs are increasingly producing high-potency marijuana in the United States at indoor sites and have relocated...highest-ever recorded levels for coca and domestic marijuana eradication, and a reduction in the domestic production of methamphetamine since 2004

  20. Bayesian paradox in homeland security and homeland defense

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Wang, Wenjian

    2011-06-01

    In this paper we discuss a rather surprising result of Bayesian inference analysis: performance of a broad variety of sensors depends not only on a sensor system itself, but also on CONOPS parameters in such a way that even an excellent sensor system can perform poorly if absolute probabilities of a threat (target) are lower than a false alarm probability. This result, which we call Bayesian paradox, holds not only for binary sensors as discussed in the lead author's previous papers, but also for a more general class of multi-target sensors, discussed also in this paper. Examples include: ATR (automatic target recognition), luggage X-ray inspection for explosives, medical diagnostics, car engine diagnostics, judicial decisions, and many other issues.

  1. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    ... Fax; Business Web site address; Business history; Physical Address(es); Mailing Address(es); Owner... Protection's Customs-Trade Partnership Against Terrorism program. Businesses accepted into the program... on higher risk businesses and thereby assists the agency in achieving its mission to secure the...

  2. U.S. Proliferation Policy and the Campaign Against Transnational Terror: Linking the U.S. Non-Proliferation Regime to Homeland Security Efforts

    Science.gov (United States)

    2013-12-01

    virulent strains escaping from laboratories with inadequate biosecurity and biosafety regimes into a world with insufficient public health surveillance...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298 (Rev. 2–89...of codification and legal measures to stop terrorist use and to a lesser degree to the international double standard on beliefs regarding the

  3. Changing Napoleonic Leadership In The Department Of Homeland Security: The Identification Of Toxic Leadership Behaviors And How To Facilitate Change To Those Behaviors

    Science.gov (United States)

    2016-02-06

    when the subject of emotional intelligence is brought up, some leaders take a “ machismo ” attitude towards it, in an attempt to discount, ignore, or...Eisenhower School for national Security and Resource StrategyNational Defense University, 2013, 101. 5 Ibid, 101. 6 “ Machismo | an Attitude, Quality, or...webster.com/dictionary/ machismo . 7 McFarland, Walter, and Susan Goldsworthy. Choosing Change: How Leaders and Organizations Drive Results One Person at a

  4. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  5. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  6. Unmanned Aircraft Systems Integration in the National Airspace System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — There is an increasing need to fly Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) to perform missions of vital importance to national security...

  7. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  8. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    Our work is based on the review of documents and interviews conducted at more than two dozen federal departments and agencies, including central management agencies such as OMB, the general Services Administration (GSA...

  9. A Homeland Security Net Assessment Needed Now!

    Science.gov (United States)

    2015-12-01

    George Washington University. Cilluffo argues that the DHS responds to most threats reactively and has only a limited capability for assessing...also the director of the NSA and the two organizations are both located at Fort Meade , Maryland, the two commands have dif- ferent missions and operate...12. 75. David Clark, Thomas Berson, and Herbert S. Lin, eds., At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues

  10. Intelligence Sharing, Fusion Centers, and Homeland Security

    National Research Council Canada - National Science Library

    Newbill, III, Raymond R

    2008-01-01

    The final report by the bipartisan National Commission on Terrorist Attacks (2004) concluded that the attacks on September 11, 2001 were partly successful because information was not shared properly between agencies...

  11. Building Collaborative Capacity for Homeland Security

    Science.gov (United States)

    2004-11-01

    Kesner, I. F. (1993). Top Managerial Prestige, Power and Tender Offer Response - a Study of Elite Social Networks and Target Firm Cooperation During...Organization Science, 12(3), 372-388. Galaskiewicz, J., & Burt, R. S. (1991). Interorganization Contagion in Corporate Philanthropy . Administrative

  12. Homeland Security Behind the Redwood Curtain

    Science.gov (United States)

    2007-09-01

    the kind you can burn songs onto using your home computer. “I know that it’s illegal to copy music and all that but I want you to have this CD. I...expects from his government, responds with the words of Jack Johnson on track eight of the album , In Between Dreams (2005): It’s such a tired game

  13. Homeland Security: Defending U.S. Airspace

    National Research Council Canada - National Science Library

    Bolkcom, Christopher

    2005-01-01

    The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S...

  14. Homeland Security: Defending U.S. Airspace

    National Research Council Canada - National Science Library

    Bolkcom, Christopher

    2006-01-01

    The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S...

  15. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    as these have already been used successfully in school attacks such as those used in the Columbine massacre . Aum Shinrikyo, now known as Aleph, 36...terrorist siege. Equally disturbing was the school massacre in "Netiv Meir," an elementary school in Ma’a lot, Israel, on May 15, 1974, the twenty-sixth...Immediate Consumer The immediate consumer will be School District 207, which is comprised of three large high schools with a combined student enrollment

  16. A Balanced Approach to Funding Homeland Security

    Science.gov (United States)

    2014-12-01

    Conflict Resolution 20 (1976): 143–172. 232 Fathali M. Moghaddam, Multiculturalism and Intergroup Relations (Washington, DC: American Psychological...M. Multiculturalism and Intergroup Relations. Washington, DC: American Psychological Association Press, 2008. Moghaddam, Fathali M., and James M...Technical Information Center Ft. Belvoir, Virginia 2. Dudley Knox Library Naval Postgraduate School Monterey, California 85

  17. Homeland Security Intelligence: To What End

    Science.gov (United States)

    2010-09-01

    decision making is generous (Treverton & Gabbard , 2008; Reveron 2007). This literature commonly falls into roughly one of two categories, 1) the...Treverton, G.F. & Gabbard , C.B. (2008). Assessing the tradecraft of intelligence analysis. Arlington VA: RAND. Turner, M. (2005). Why secret intelligence

  18. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-12-20

    ... abandoned and help prevent future marine pollution. This rulemaking supports the Coast Guard's broad role... overloading or operating these vessels in hazardous weather conditions. This rulemaking would support the Coast Guard's broad role and responsibility of maritime safety. Timetable: Action Date FR Cite NPRM 08...

  19. 75 FR 2880 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-01-19

    ... the Secretary's primary advisory body with the goal of providing strategic, timely and actionable... portions of the meeting will include updates on operational challenges, intelligence briefings, and pre... procedures. HSAC members will receive classified and sensitive intelligence briefings during the closed...

  20. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2008-01-01

    .... Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets...

  1. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2007-01-01

    .... Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets...

  2. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2006-01-01

    .... Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets...

  3. ETV - HOMELAND SECURITY EVALUATION OF CYANIDE DETECTORS

    Science.gov (United States)

    EPA's Environmental Technology Verification (ETV) Program was established in 1995 to objectively verify the performance of technologies that measure / monitor the quality of our environment, both for background or at suspected contamination site. The ETV program has established...

  4. The Submersible Threat to Maritime Homeland Security

    Science.gov (United States)

    2013-09-01

    successfully utilized both semi-submersible and fully-submersible vessels during naval engagements. David boats were cigar -shaped, steam driven, wooden vessels...Capabilities: Maximum diving depth of 40 feet. Features an Auto-Hover system, built-in SONAR, Fly-By-Wire Joystick, Electronic Buoyancy Control...Features include a Fly-By-Wire Joystick, Electronic Buoyancy Control, and Electrical Systems Monitor. Cost: $ 59,000 (USD) (International VentureCraft Corp

  5. Critical Infrastructure Information Disclosure and Homeland Security

    National Research Council Canada - National Science Library

    Moteff, John D; Stevens, Gina M

    2003-01-01

    Critical infrastructures have been defined as those systems and assets so vital to the United States that the incapacity of such systems and assets would have a debilitating impact on the United States...

  6. Complacency: A Threat to Homeland Security

    Science.gov (United States)

    2014-06-01

    Nichols, 2002). Folk psychology has also been implicated in loftier endeavors, such as trying to make sense of Descartes ’ reasons for thinking...and others state, bears the hallmarks of the over-rationalist thinking that has dominated since the triumphs of Newton and Descartes (Rosenhead

  7. 2009 Homeland Security Symposium and Exhibition

    Science.gov (United States)

    2009-09-10

    electronified check, ACH or Draft • Opportunity for Merchant and Merchant employee collusion • Remote Deposit Collection (RDC) • eCommerce – a world of new...police _$; _ Units US Coast Guard _$; _ Units Urban Search & Rescue _$; _ Units Rural Search & Rescue _$; _ Units Public/ University hospitals

  8. A Few Thoughts on Homeland Security

    National Research Council Canada - National Science Library

    Fink, Rick

    2002-01-01

    ... before. This involvement, treaties, policies and media perceptions have resulted in the alienation of other nations, non-state actors and groups who can only attack the United States by asymmetric means including terrorism...

  9. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... childhood arrivals program. The HSAC will also receive a report from the Sustainability and Efficiency Task Force, review and discuss the task forces' report, and formulate recommendations for the Department. The.... HSAC conference call details and the Sustainability and Efficiency Task Force report will be provided...

  10. Homeland Security Office: Issues and Options

    National Research Council Canada - National Science Library

    Lee, Rensselaer

    2002-01-01

    ... attacks as a federal focal point for coordinating domestic efforts against terrorism. Former Governor Tom Ridge of Pennsylvania, a close friend and political ally of the President, was appointed to head the OHS...

  11. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  12. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  13. Unmanned Systems in Perspective

    Science.gov (United States)

    2014-05-22

    36Gertler, 41-42. 37Gertler, 42; Spencer Ackerman, “Exclusive Pics: The Navy’s Unmanned, Autonomous ‘ UFO ’,” Wired, 31 July 2012, http...Pics: The Navy’s Unmanned, Autonomous ‘ UFO ’.” Wired, 31 July 2012. http://www.wired.com/dangerroom/2012/07/x47b (accessed 1 March 2014). Air Force

  14. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    Science.gov (United States)

    2015-06-01

    administration of legal immigration services, safety and stewardship of the nation’s waterways and marine transportation system, as well as other legacy...relating to prostitution , bookmaking, gambling, child pornography, or obscenity  White collar incidents elating to computer crimes  Controlled substance

  15. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    Science.gov (United States)

    2013-12-01

    Qualitative Research: A Metaphorical Approach,” Journal of Advanced Nursing 47, no. 6 (Sep 2004): 654. 10...Advanced Nursing 47, no. 6 (Sep 2004): 649–655. Cooper, Melinda. “Complexity Theory After The Financial Crisis.” Journal of Cultural Economy 4 (2011...93. Snowden, David. “Cynefin Framework.” YouTube video, 8:38. Posted July 11, 2010 by Cognitive Edge. http://www.youtube.com/watch?v=N7oz366X0-8

  16. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    Science.gov (United States)

    2014-12-01

    and welcoming to the community, to both internal and external customers . Every community, through its language, cultural diversity, and local actions...respect, pride, hope, compassion, and loyalty . Participants used AI methods to focus on their high point experiences in the Navy. After discovering...local restaurants , the 15 parishes were provided hot meals, culturally appropriate, and at a lower cost than the government. This case demonstrates

  17. The control of a parallel hybrid-electric propulsion system for a small unmanned aerial vehicle using a CMAC neural network.

    Science.gov (United States)

    Harmon, Frederick G; Frank, Andrew A; Joshi, Sanjay S

    2005-01-01

    A Simulink model, a propulsion energy optimization algorithm, and a CMAC controller were developed for a small parallel hybrid-electric unmanned aerial vehicle (UAV). The hybrid-electric UAV is intended for military, homeland security, and disaster-monitoring missions involving intelligence, surveillance, and reconnaissance (ISR). The Simulink model is a forward-facing simulation program used to test different control strategies. The flexible energy optimization algorithm for the propulsion system allows relative importance to be assigned between the use of gasoline, electricity, and recharging. A cerebellar model arithmetic computer (CMAC) neural network approximates the energy optimization results and is used to control the parallel hybrid-electric propulsion system. The hybrid-electric UAV with the CMAC controller uses 67.3% less energy than a two-stroke gasoline-powered UAV during a 1-h ISR mission and 37.8% less energy during a longer 3-h ISR mission.

  18. Unmanned Ground Systems Roadmap

    Science.gov (United States)

    2011-07-01

    quality metric tracking history . 1.4.3.4 Technical Management Division The mission of the RS JPO Technical Management (Tech Mgt) Division is to...missions dictate radio capabilities. IP version 4 ( IPv4 ) is the common IP standard used on IP addressable devices of UGVs, however, Unmanned Ground...Systems Roadmap UNCLASSIFIED 26 UNCLASSIFIED July 2011 IPv4 addresses are projected to run out and UGV systems will need to migrate to IP version 6

  19. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  20. 33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... disseminating appropriate security information to port stakeholders. ... Maritime Security (AMS) Committee. 103.310 Section 103.310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  1. Application of military uncooled infrared sensors to homeland defense

    Science.gov (United States)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  2. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  3. Enemies within: Christian Extremism, a Threat to the Homeland

    Science.gov (United States)

    2016-06-10

    promotes fear of Muslim radical groups that perpetuate violence in the name of religion , while ignoring the threat Christian extremism poses on...those within the homeland that threaten the very liberty and freedom intended by the founding fathers for all Americans. This thesis and many more...the safety and freedom of Americans are protected. 15. SUBJECT TERMS Christian Extremism 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  4. South African Homelands as Frontiers

    DEFF Research Database (Denmark)

    of frontier zones, the homelands emerge as areas in which the future of the South African postcolony is being renegotiated, contested and remade with hyper-real intensity. This is so because the many fault lines left over from apartheid (its loose ends, so to speak) – between white and black; between...... in these settings that the postcolonial promise of liberation and freedom must face its test. As such, the book offers highly nuanced and richly detailed analyses that go to the heart of the diverse dilemmas of post-apartheid South Africa as a whole, but simultaneously also provides in condensed form an extended...

  5. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  6. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-02-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0002] President's National Security... National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, February 21, 2013... matters related to national security and emergency preparedness telecommunications policy. Agenda: The...

  7. Unmanned and Unarmed

    DEFF Research Database (Denmark)

    Kristensen, Kristian Søby; Pradhan-Blach, Flemming; Schaub Jr, Gary John

    , the American, British, French, and Danish experiences highlight difficulties developing, acquiring, and operating UAVs. The Danish government should consider the tasks that UAVs are best-suited to perform, the costs associated with the entire UAV system, and the operational, doctrinal, and other challenges...... that must be addressed to integrate UAV capabilities into the Danish armed forces. These are not trivial considerations. Larger UAVs are very complex systems with which the Danish armed forces have limited experience, and introducing radically new technology always comes with substantial risks. Should...... Denmark decide to procure larger unmanned systems, such as Reapers or Global Hawks, it should cooperate with Allies to purchase, operate, and integrate these capabilities as smoothly as possible and mitigate these risks. It should also establish a joint unit dedicated to house, train, educate, and operate...

  8. Morphing unmanned aerial vehicles

    International Nuclear Information System (INIS)

    Gomez, Juan Carlos; Garcia, Ephrahim

    2011-01-01

    Research on aircraft morphing has exploded in recent years. The motivation and driving force behind this has been to find new and novel ways to increase the capabilities of aircraft. Materials advancements have helped to increase possibilities with respect to actuation and, hence, a diversity of concepts and unimagined capabilities. The expanded role of unmanned aerial vehicles (UAVs) has provided an ideal platform for exploring these emergent morphing concepts since at this scale a greater amount of risk can be taken, as well as having more manageable fabrication and cost requirements. This review focuses on presenting the role UAVs have in morphing research by giving an overview of the UAV morphing concepts, designs, and technologies described in the literature. A presentation of quantitative information as well as a discussion of technical issues is given where possible to begin gaining some insight into the overall assessment and performance of these technologies. (topical review)

  9. Controlling Unmanned Vehicles : the Human Factors Solution

    NARCIS (Netherlands)

    Erp, J.B.F. van

    2000-01-01

    Recent developments and experiences have proven the usefulness and potential of Unmanned Vehicles (UVs). Emerging technologies enable new missions, broadening the applicability of UVs from simple remote spies towards unmanned combat vehicles carrying lethal weapons. However, despite the emerging

  10. Collaborative Unmanned Vehicles for Maritime Domain Awareness

    National Research Council Canada - National Science Library

    Healey, A. J; Horner, D. P; Kragelund, S. P

    2005-01-01

    Unmanned vehicles are becoming a critical component of military operations. As the vehicles develop in capability, there will be a trend for heterogeneous classes of unmanned vehicles to be able to work in a more collaborative fashion...

  11. Risk Assessment for an Unmanned Merchant Ship

    Directory of Open Access Journals (Sweden)

    Ø.J. Rødseth

    2015-09-01

    Full Text Available The MUNIN project is doing a feasibility study on an unmanned bulk carrier on an intercontinental voyage. To develop the technical and operational concepts, MUNIN has used a risk-based design method, based on the Formal Safety Analysis method which is also recommended by the International Mari-time Organization. Scenario analysis has been used to identify risks and to simplify operational scope. Systematic hazard identification has been used to find critical safety and security risks and how to address these. Technology and operational concept testing is using a hypothesis-based test method, where the hypotheses have been created as a result of the risk assessment. Finally, the cost-benefit assessment will also use results from the risk assessment. This paper describes the risk assessment method, some of the most important results and also describes how the results have been or will be used in the different parts of the project.

  12. Analysis of Unmanned Systems in Military Logistics

    Science.gov (United States)

    2016-12-01

    performance measures: customer satisfaction , flexibility, visibility, and trust. If we apply this explanation of Li and Schulze (2011) to the military...unmanned systems, initially, we aimed to define current and proposed unmanned applications in civilian-sector logistics and current military...aimed to define current and proposed unmanned applications in civilian-sector logistics and current military logistics challenges. Then, justifying

  13. Unmanned Maritime Systems Incremental Acquisition Approach

    Science.gov (United States)

    2016-12-01

    REPORT TYPE AND DATES COVERED MBA professional report 4. TITLE AND SUBTITLE UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION APPROACH 5. FUNDING...Approved for public release. Distribution is unlimited. UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION APPROACH Thomas Driscoll, Lieutenant...UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION APPROACH ABSTRACT The purpose of this MBA report is to explore and understand the issues

  14. Handbook of unmanned aerial vehicles

    CERN Document Server

    Vachtsevanos, George

    2015-01-01

    The Handbook of Unmanned Aerial Vehicles is a reference text for the academic and research communities, industry, manufacturers, users, practitioners, Federal Government, Federal and State Agencies, the private sector, as well as all organizations that are and will be using unmanned aircraft in a wide spectrum of applications. The Handbook covers all aspects of UAVs, from design to logistics and ethical issues. It is also targeting the young investigator, the future inventor and entrepreneur by providing an overview and detailed information of the state-of-the-art as well as useful new concepts that may lead to innovative research. The contents of the Handbook include material that addresses the needs and ‘know how’ of all of the above sectors targeting a very diverse audience. The Handbook offers a unique and comprehensive treatise of everything one needs to know about unmanned aircrafts, from conception to operation, from technologies to business activities, users, OEMs, reference sources, conferences, ...

  15. Natural interaction for unmanned systems

    Science.gov (United States)

    Taylor, Glenn; Purman, Ben; Schermerhorn, Paul; Garcia-Sampedro, Guillermo; Lanting, Matt; Quist, Michael; Kawatsu, Chris

    2015-05-01

    Military unmanned systems today are typically controlled by two methods: tele-operation or menu-based, search-andclick interfaces. Both approaches require the operator's constant vigilance: tele-operation requires constant input to drive the vehicle inch by inch; a menu-based interface requires eyes on the screen in order to search through alternatives and select the right menu item. In both cases, operators spend most of their time and attention driving and minding the unmanned systems rather than on being a warfighter. With these approaches, the platform and interface become more of a burden than a benefit. The availability of inexpensive sensor systems in products such as Microsoft Kinect™ or Nintendo Wii™ has resulted in new ways of interacting with computing systems, but new sensors alone are not enough. Developing useful and usable human-system interfaces requires understanding users and interaction in context: not just what new sensors afford in terms of interaction, but how users want to interact with these systems, for what purpose, and how sensors might enable those interactions. Additionally, the system needs to reliably make sense of the user's inputs in context, translate that interpretation into commands for the unmanned system, and give feedback to the user. In this paper, we describe an example natural interface for unmanned systems, called the Smart Interaction Device (SID), which enables natural two-way interaction with unmanned systems including the use of speech, sketch, and gestures. We present a few example applications SID to different types of unmanned systems and different kinds of interactions.

  16. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  17. Da Vincis Children Take Flight: Unmanned Aircraft Systems in the Homeland

    Science.gov (United States)

    2014-03-01

    ensuring disaster resilience .”60 Interest in UAS might include support for monitoring the nation’s extensive borders to disaster damage assessments or...straddle science and academia and will be important partners in UAS testing and development. 6. Illegal and Gray Areas Drug runners , terrorists and...other illicit enterprises: Often entrepreneurial themselves, drug runners are already using UAS to transfer products across borders. Terrorists are

  18. Covering the Homeland: National Guard Unmanned Aircraft Systems Support for Wildland Firefighting and Natural Disaster Events

    National Research Council Canada - National Science Library

    Moose, Robert G

    2008-01-01

    .... The 2007 fire season saw over 85,000 wildland fires consume more than 9.3 million acres. In Southern California alone wildfires forced over half a million people to evacuate their homes destroyed over 3,079 structures and caused...

  19. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  20. U.S. Geological Survey Emerging Applications of Unmanned Aircraft Systems

    Science.gov (United States)

    Hutt, M. E.

    2012-12-01

    In anticipation of transforming the research methods and resource management techniques employed across the Department of the Interior, the U.S. Geological Survey (USGS) Unmanned Aircraft Systems (UAS) Project Office is conducting missions using small UAS- sUAS platforms (technology in support of scientific, resource and land management missions. UAS technology is currently being used by USGS and our partners to monitor environmental conditions, analyze the impacts of climate change, respond to natural hazards, understand landscape change rates and consequences, conduct wildlife inventories and support related land management and law enforcement missions. Our ultimate goal is to support informed decision making by creating the opportunity, via UAS technology, to gain access to an increased level of persistent monitoring of earth surface processes (forest health conditions, wildfires, earthquake zones, invasive species, etc.) in areas that have been logistically difficult, cost prohibitive or technically impossible to obtain consistent, reliable, timely information. USGS is teaming with the Department of the Interior Aviation Management Directorate to ensure the safe and cost effective adoption of UAS technology. While the USGS is concentrating on operating sUAS, the immense value of increased flight time and more robust sensor capabilities available on larger platforms cannot be ignored. We are partnering with several groups including the Department of Homeland Security, National Aeronautics and Space Administration, Department of Defense, and National Oceanic and Atmospheric Administration for access to data collected from their fleet of high altitude, long endurance (HALE) UAS. The HALE systems include state of the art sensors including Electro-Optical, Thermal Infrared and Synthetic Aperture Radar (SAR). The data being collected by High Altitude, Long Endurance (HALE) systems is can be routinely shared in near real time at several DOI- USGS locations. Analysis

  1. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  2. RISK DEFINITION IN CIVIL UNMANNED AVIATION

    Directory of Open Access Journals (Sweden)

    Volodymyr Kharchenko

    2016-12-01

    Full Text Available Objective: The risks in unmanned civil aviation are considered as one of the most important. In the article is proved applicability of ensuring the flight safety of aircraft and considered the basic risks of manned civil aviation. Methods: Analyzed statistical data on aviation accidents, organized probabilities distribution of aviation accidents for manned and unmanned civil aviation to identify factors that influence the occurrence of emergency situations in manned and unmanned aviation. Results: We proposed typology of risk components in civil aviation and systematized methods and techniques to reduce risks. Over the analogies defined possible risks, their causes and remedies in civil unmanned aircraft. Weight coefficients distribution was justified between risk types for development of recommendations on risk management in unmanned civil aviation. Discussion: We found that the most probable risk in manned civil aviation is the human factor, organization of air traffic control, design flaws of unmanned aviation system as a whole, as well as maintenance of unmanned aviation system.

  3. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  4. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  5. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...

  6. Unmanned Intratheater Airlift

    Science.gov (United States)

    2010-12-01

    Regardless of the benefits , the heavy reliance upon and utilization of VTOL assets has not come without a cost. Harsh environments and constant...effectively secured a place for RPAs in the modern and future battlefields. System Requirements To realize a maximum benefit from a remotely piloted...autonomous operations, a bingo point will be determined so that the mission will be aborted or modified if the com- munication link with the GCS is lost. In

  7. Validation of Computer Models for Homeland Security Purposes

    International Nuclear Information System (INIS)

    Schweppe, John E.; Ely, James; Kouzes, Richard T.; McConn, Ronald J.; Pagh, Richard T.; Robinson, Sean M.; Siciliano, Edward R.; Borgardt, James D.; Bender, Sarah E.; Earnhart, Alison H.

    2005-01-01

    At Pacific Northwest National Laboratory, we are developing computer models of radiation portal monitors for screening vehicles and cargo. Detailed models of the radiation detection equipment, vehicles, cargo containers, cargos, and radioactive sources have been created. These are used to determine the optimal configuration of detectors and the best alarm algorithms for the detection of items of interest while minimizing nuisance alarms due to the presence of legitimate radioactive material in the commerce stream. Most of the modeling is done with the Monte Carlo code MCNP to describe the transport of gammas and neutrons from extended sources through large, irregularly shaped absorbers to large detectors. A fundamental prerequisite is the validation of the computational models against field measurements. We describe the first step of this validation process, the comparison of the models to measurements with bare static sources

  8. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    rooted in our subconscious reasoning and behavior, and has been essential to our evolution and survival as a species. Carlo Jaeger et al...assessment; priority setting; implementation of protective measures; and the ongoing measurement of program effectiveness and the reprogramming of results as

  9. HOMELAND SECURITY: Effective Intergovernmental Coordination Is Key to Success

    National Research Council Canada - National Science Library

    Dalton, Patricia

    2002-01-01

    .... My comments are based on a body of GAO's work on terrorism and emergency preparedness and policy options for the design of federal assistance,2 our review of many other studies,2 and the Comptroller...

  10. Expanding the Role of Emergency Medical Services in Homeland Security

    Science.gov (United States)

    2013-03-01

    this technology has the potential to provide a psychological advantage to be ahead of the event and to provide life saving and public calming...Brown, Larry E. Beutler, James N. Breckenridge, and Philip G. Zimbardo. Psychology of Terrorism. New York: Oxford University Press, 2007. Brown...Physicians and the National Association of State EMS Directors, 2011. Chapman, Wendy W., John N. Dowling, Atar Baer, David L. Buckeridge, Dennis

  11. Congressional Oversight of Homeland Security: Help or Hinderance?

    Science.gov (United States)

    2012-12-01

    1956, the SASC identified what they viewed as a duplication of efforts between the Army and the Air Force. The Army had sought to fund a Nike ...The “ Nike -Talos dispute” was only one of several disagreements between services Congress mediated in the late 1950s.218 As Thomas McNaugher wrote in

  12. Department of Homeland Security Policy for Defense of Cyberspace

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2003-01-01

    .... A closer look at commercial enterprises includes web browsing, chat rooms, e-mail, e-commerce, overhauls of business practices and organizations, telecommunication operations, and management of power...

  13. Computer Modeling of Radiation Portal Monitors for Homeland Security Applications

    International Nuclear Information System (INIS)

    Pagh, Richard T.; Kouzes, Richard T.; McConn, Ronald J.; Robinson, Sean M.; Schweppe, John E.; Siciliano, Edward R.

    2005-01-01

    Radiation Portal Monitors (RPMs) are currently being used at our nation's borders to detect potential nuclear threats. At the Pacific Northwest National Laboratory (PNNL), realistic computer models of RPMs are being developed to simulate the screening of vehicles and cargo. Detailed models of the detection equipment, vehicles, cargo containers, cargos, and radioactive sources are being used to determine the optimal configuration of detectors. These models can also be used to support work to optimize alarming algorithms so that they maximize sensitivity for items of interest while minimizing nuisance alarms triggered by legitimate radioactive material in the commerce stream. Proposed next-generation equipment is also being modeled to quantify performance and capability improvements to detect potential nuclear threats. A discussion of the methodology used to perform computer modeling for RPMs will be provided. In addition, the efforts to validate models used to perform these scenario analyses will be described. Finally, areas where improved modeling capability is needed will be discussed as a guide to future development efforts

  14. Enhancing Public Helicopter Safety as a Component of Homeland Security

    Science.gov (United States)

    2016-12-01

    Risk Assessment Tool GPS Global Positioning System IFR instrument flight rules ILS instrument landing system IMC instrument meteorological...daily operations. Additionally, the effectiveness of the standards is evaluated by determining if these standards would have prevented the accidents...trends, such as human behavior and lack of standards, that are common in public safety helicopter accidents. Public safety aviation agencies can use this

  15. Bioterrorism Countermeasure Development: Issues in Patents and Homeland Security

    National Research Council Canada - National Science Library

    Schacht, Wendy H; Thomas, John R

    2006-01-01

    ... potential biological threats. These bills proposed reforms to current policies and practices associated with intellectual property, particularly patents, and the marketing of pharmaceuticals and related products...

  16. Spent Nuclear Fuel Transportation Risk Assessment Methodology for Homeland Security

    International Nuclear Information System (INIS)

    Teagarden, Grant A.; Canavan, Kenneth T.; Nickell, Robert E.

    2006-01-01

    In response to increased interest in risk-informed decision making regarding terrorism, EPRI was selected by U.S. DHS and ASME to develop and demonstrate a nuclear sector specific methodology for owner / operators to utilize in performing a Risk Analysis and Management for Critical Asset Protection (RAMCAP) assessment for the transportation of spent nuclear fuel (SNF). The objective is to characterize SNF transportation risk for risk management opportunities and to provide consistent information for DHS decision making. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. Worst reasonable case scenarios characterize risk for a benchmark set of threats and consequence types. A trial application was successfully performed and implementation is underway by one utility. (authors)

  17. Strengthening Homeland Security through Improved Foreign Language Capability

    Science.gov (United States)

    2011-12-01

    several languages.‖ See Merriam-Webster Online, s.v. ―linguist,‖ accessed 16 MAY 11, http://www.merriam-webster.com/ dictionary /linguist. 7 Ambrose...proficiency.362 Given that one observer has aptly characterized America as ―Profoundly Monolingual ,‖363 such changes in public opinion are unlikely...93 language proficiency,365 organizations will continue to produce less-than-professional- level linguists, and America may prove itself monolingual

  18. Homeland Security Organizations: Design Contingencies in Complex Environments

    Science.gov (United States)

    2011-09-01

    intelligence agencies did not anticipate the adaptation of al-Qaeda from a central command structure to the current collection of regional franchises ...suspicious activities by terrorist groups throughout the summer, culminating in the December explosion at the Great Western Forum sports venue in...Great Western Forum sports arena in Inglewood, California. The target of the attack was an event organized to honor military personnel who had served

  19. Department of Homeland Security Cyber Resilience Review (Case Study)

    Science.gov (United States)

    2014-01-23

    operational stress and c-Ues. TheCRRseek:stoelidtthecurrentstateof cyber seruritymanagementpracticesfromkeyc.yber .securitypersonnel...Institutionalization in the CRR Processes  are   acculturated ,   defined,   measured,   and   governed   Maturity indictor levels (MIL) are used in...processes that •  produce consistent results over time •  are retained during times of stress Level 0-Incomplete Level 1-Performed Level 2

  20. Nuclear and Solar Energy: Implications for Homeland Security

    Science.gov (United States)

    2008-12-01

    sequestration, conservation, and telecommuting to several energy production changes to include both solar and nuclear options.FF80FF Stephen Pacala...nations from developing a weapons program when motivated to do so. India provides a useful historic example. India’s weapons program began with a...civilian power programs, for sufficiently motivated governments.FF162FF However, those who make such arguments

  1. Basic Practices Aiding High-Performance Homeland Security Regional Partnerships

    National Research Council Canada - National Science Library

    Caudle, Sharon

    2006-01-01

    ....1 A national priority under the Goal is the use of geographic regions across the nation to share risk, engage in joint planning, and share resources to develop and sustain risk-based capability levels...

  2. 7 CFR 2.32 - Director, Office of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ... relating to anti-terrorism and agriculture-related emergency preparedness planning both national and... primary USDA representative for anti-terrorism activities. (vi) Oversight and coordination of the...) Establish and administer a communication center within the Department to collect and disseminate information...

  3. Public Health Specializations and Education Needs to Support Homeland Security

    National Research Council Canada - National Science Library

    Landguth, David C

    2006-01-01

    ... of terrorism and natural disasters. Understanding the deficiencies that exist by public health specialization, and identifying the knowledge base required for each specialization will help the United States to meet its future...

  4. Southwest Hispanic Community -- The Absence of Homeland Security Threats

    Science.gov (United States)

    2012-12-01

    or insurgent threats unique to that community are revealed. A mixed method research methodology using components of “ ethnography ,” along with other... qualitative analysis methods, will be utilized. Ethnography includes both quantitative and qualitative methods to determine the sociocultural contexts...1 B. RESEARCH QUESTIONS .............................................................................4

  5. Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts

    National Research Council Canada - National Science Library

    Decker, Raymond

    2001-01-01

    .... Mail and postal workers. As requested, my testimony will focus on the work we have done over the past five years on combating terrorism and our recommendations advocating a risk management approach for such programs...

  6. U.S. Biodefense & Homeland Security: Toward Detection & Attribution

    Science.gov (United States)

    2006-12-01

    in Planning the Unthinkable: How New Powers Will use Nuclear, Biological, and Chemical Weapons, ed. Peter R. Lavoy, Scott D. Sagan , and James J...another year, and then only due to public statements issued by Bhagwan Shree Rajneesh. Carla Chamberlain, the nurse who ran the county public health...that the dressing had been contaminated during or after its preparation.”107 4. Suspicions & Initial Epidemiological Reports Both Carla Chamberlain

  7. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    International Nuclear Information System (INIS)

    Burns, Kimberly A.

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination. Monte Carlo calculations were performed to simulate healthcare workers in the operating room or trauma room at a hospital. The Monte Carlo Neutral Particle transport code MCNP5 was used for the modeling. The human body was modeled using Medical Internal Radiation Dose (MIRD-V) anthropomorphic phantoms originally developed at Oak Ridge National Laboratory (ORNL) under the specifications of International Commission on Radiation Protection (ICRP) Publication 23 and later altered at Georgia Tech (17). This study considered two possible contamination scenarios: uniform external contamination with no internal contamination and inhaled radioactive material without any external contamination. For both scenarios, the patients isotopes considered were 60 Co, 137 Cs, 131 I, 192 Ir, and 241 Am. For the externally contaminated patient, a uniform volume source two millimeters thick was placed around the skin of each anthropomorphic phantom to simulate a uniform source on the surface of the body. For the internally contaminated patients, the Dose and Risk Calculation software, DCAL, was used to determine the distribution of the isotopes in the internal organs. For both of the scenarios, the healthcare provider was placed 20-cm from the middle of the torso of the contaminated patient. The amount of energy deposited to the tissues and organs of the healthcare provider due to the internally and externally contaminated patients and in the patient in the case of external contamination was determined. The effective dose rate was calculated using the masses of the tissues and organ and tissue weighting factors from ICRP Publication 60. The effective dose rate for the healthcare provider for internally and externally contaminated patients are given in Table I and Table II after averaging over the five phantoms used in the modeling. The internal contamination level is based on one Annual Limit on Intake (ALI) and the external contamination level was taken to be 37 GBq/m 2 . The effective dose to an externally contaminated patient depending on the patient's body type is shown in Table III. The time it takes to receive the NRC dose limit for radiation workers (50mSv) and the EPA guidelines for lifesaving (250mSv) is sufficient for the stabilization of a patient with life-threatening injuries prior to decontamination. For a patient externally contaminated with 37GBq/m 2 of 60 Co, the healthcare provider receives a 250 mSv in 8.3 hours. The externally contaminated patient would receive 1581 mSv in 8.3 hours.

  8. Overview of Infrastructure Science and Analysis for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-07-21

    This presentation offers an analysis of infrastructure science with goals to provide third-party independent science based input into complex problems of national concern and to use scientific analysis to "turn down the noise" around complex problems.

  9. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  10. Proposing C4ISR Architecture Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Farah-Stapleton, Monica F; Dimarogonas, James; Eaton, Rodney; Deason, Paul J

    2004-01-01

    .... The architecture definitions and specifications of the inter- and intra-agency links would be usable in real-world operations as well as enabling the representation of CS HLS/HLD scenarios within...

  11. Homeland Security: There’s an App for That

    Science.gov (United States)

    2017-03-01

    bombings at the country’s train station and airport, mobile and terrestrial radio networks began to fail.5 The Belgian officers were using the mobile...suicide bombings at the country’s train station and airport, mobile and terrestrial radio networks began to fail. One officer deployed to the event...63 Alberts and Hayes, Power to the Edge, 199. 64 Thom Dick, “Will a Smartphone Replace Your Mobile Radio?” EMS World, July 1, 2016, http

  12. The Affordable Care Act: A Prescription for Homeland Security Preparedness?

    Science.gov (United States)

    2014-09-01

    Colorado, Connecticut, Georgia, Maryland, Minnesota, New Mexico , New York, Oregon, and Tennessee 22 identify outbreaks, it communicates and...rubella  Meningococcal  Pneumococcal  Tetanus, diphtheria, pertussis  Varicella Expanding insurance to a larger percentage of the population...either did not exist or were newly implemented. Foreign-born victims (88) had no history of inoculation, and hailed from Guatemala, Colombia, Mexico

  13. Membrane Inlet Mass Spectrometry for Homeland Security and Forensic Applications

    Science.gov (United States)

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; France, Neil

    2015-02-01

    A man-portable membrane inlet mass spectrometer has been built and tested to detect and monitor characteristic odors emitted from the human body and also from threat substances. In each case, a heated membrane sampling probe was used. During human scent monitoring experiments, data were obtained for inorganic gases and volatile organic compounds emitted from human breath and sweat in a confined space. Volatile emissions were detected from the human body at low ppb concentrations. Experiments with compounds associated with narcotics, explosives, and chemical warfare agents were conducted for a range of membrane types. Test compounds included methyl benzoate (odor signature of cocaine), piperidine (precursor in clandestine phencyclidine manufacturing processes), 2-nitrotoluene (breakdown product of TNT), cyclohexanone (volatile signature of plastic explosives), dimethyl methylphosphonate (used in sarin and soman nerve agent production), and 2-chloroethyl ethyl sulfide (simulant compound for sulfur mustard gas). Gas phase calibration experiments were performed allowing sub-ppb LOD to be established. The results showed excellent linearity versus concentration and rapid membrane response times.

  14. Safety Risk Management for Homeland Defense and Security Responders

    National Research Council Canada - National Science Library

    Meyers, Tommey H

    2005-01-01

    .... Coast Guard and the U.S. Navy. This revealed that Operational Risk Management (ORM), a risk-based decision-making tool that systematically balances risk and mission completion, and Crew Resource Management (CRM...

  15. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... 3002 Definitions of Words and Terms Add an additional office within components--the Office of Selective... (b) of HSAR section 3003.1004 advises contracting officers that special posters and instructions may... DHS Hotline Poster described in the clause at FAR 52.203-14. Part 3004 Administrative Matters Revise...

  16. Risk Unbound: Threat, Catastrophe, and the End of Homeland Security

    Science.gov (United States)

    2015-09-01

    October 10, 2010). 106 Percy Bysshe Shelley, Prometheus Unbound: A Lyrical Drama in Four Acts (London, UK: J.M Dent and Company, 1898), Act iii, Scene...make us safe. 156 THIS PAGE INTENTIONALLY LEFT BLANK 157 LIST OF REFERENCES Acker, P., and C. Larrington. The Poetic Edda: Essays on...Brookhaven.” Paper. Boston, MA: Massachusetts Institute of Technology, 2003. Percy Bysshe Shelley. Prometheus Unbound: A Lyrical Drama in Four Acts. London

  17. Does Homeland Security Constitute an Emerging Academic Discipline?

    Science.gov (United States)

    2013-03-01

    the Only Means of Survival in This Age of Complexity,” July 10, 2011, http://www.telegraph.co.uk/ finance /comment/8628701/Co-operation-is-the-only...The same can be said for virtually every area and industry (e.g., finance , law, government, manufacturing, etc.). The following represents the...with the discipline—just as alchemy eventually became chemistry and medicine. Regardless, what society is witnessing currently is the emergence of an

  18. CADRE Quick-Look: Homeland Security-NORTHCOM's Coalition War

    National Research Council Canada - National Science Library

    Conway, John L

    2005-01-01

    .... Coalition warfare has many facets: it involves the blending of different cultures, multiple languages dialects, and disparate weapon systems, as well as differing perceptions of end states and how to...

  19. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    Science.gov (United States)

    2009-09-01

    me and helped me sustain my drive. In particular, I would like to thank Chief Phil Ruscetti, Deputy Fire Commissioner Gene Ryan, and Lieutenant Bill...that are selfish , the community well-being became a driving force to collaborate. Beginning in 1965 with the Texas Regional Planning Act,197...military, and the fire service. Deputy Commissioner Gene Ryan of the Chicago Fire Department was searching for a management tool to bring these

  20. Changing Homeland Security: The Issue-Attention Cycle

    National Research Council Canada - National Science Library

    Bellavita, Christopher

    2005-01-01

    .... But eventually -- as happened after the Madrid bombings in 2004 -- public vigilance will wane. This can be seen as an affirmation of the profound trust Americans place in their public safety professionals...

  1. Ensuring Successful Personnel Management in the Department of Homeland Security

    Science.gov (United States)

    2002-01-01

    of Public- Private Sector Wages Allowing for Endogenous Choices of Both Government and Union Status,” Journal of Labor Economics , Vol. 6, 1988...Differential in the United States,” Journal of Labor Economics , Vol. 8, No. 2, 1990. Rosenthal, Douglas, Margaret Barton, Douglas Reynolds, and Beverly Dugan

  2. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Kimberly A. [Georgia Inst. of Technology, Atlanta, GA (United States)

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

  3. Bioterrorism Countermeasure Development: Issues in Patents and Homeland Security

    National Research Council Canada - National Science Library

    Schacht, Wendy H; Thomas, John R

    2006-01-01

    ...; S. 975, the Project Bioshield II Act; and S. 1873, the Biodefense and Pandemic Vaccine and Drug Development Act, would have generated additional incentives for the creation of new products and processes by the private sector to counteract...

  4. The Development and Recognition of Homeland Security Law

    Science.gov (United States)

    2007-03-01

    Facilitation” ( CTPAT )90; “AML/CFT compliance91”; Bioshield92; two votes for Legislative and/or Government relations; “Implications for Intellectual...import/commercial_enforcement/ ctpat / [Accessed 24 December 2006]. 91 Anti-Money Laundering and Combating the Financing of Terrorism. For more

  5. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-06-25

    ... close early if the committee has completed its business. ADDRESSES: The meeting will be held at Ronald... Masters levels; how to apply the TSA Associates Program model to other segments of the DHS workforce who... trends in international education; how colleges and universities use specific capabilities, tools, and...

  6. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-10-09

    ... close early if the committee has completed its business. ADDRESSES: The meeting will be held at Ronald... degree at the associate's, bachelor's and master's levels; how to apply the TSA Associates Program model..., policies and procedures to the academic community; how DHS can accommodate and support emerging trends in...

  7. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-03-04

    ... early if the committee has completed its business. ADDRESSES: The meeting will be held at Ronald Reagan... Administration (TSA) Associates Program model to other segments of the DHS workforce who wish to pursue a... accommodate and support emerging trends in international education; how colleges and universities use specific...

  8. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    payoff asset, yet many states do not maintain them. Judging by more than 50 years of actuarial data, states such as Arizona, Florida, Hawaii, Illinois...good enough” solution; see Horst W. J. Rittel, “Dilemmas in a General Theory of Planning.” Policy Sciences 4 (1973): 155–69. 155 “Bush to Address...disasters-solving-the-72-hour-problem#_ftn2. 68 Rittel, Horst W. J. “Dilemmas in a General Theory of Planning.” Policy Sciences 4 (1973): 155–69

  9. War in the Atlantic: A Historical Case of Homeland Security

    Science.gov (United States)

    2015-09-01

    defeat the Allied forces, and Admiral Henning von Holtzendorff presented a paper calling for renewed, unrestricted attacks on British commercial...by the defensive posture of the Royal Navy. He noted that the navy had drawn tremendous resources during the war, but had not contributed decisively...Under these propositions, Britain and France chose a defensive posture at the beginning of the war, including a British naval blockade to restrict

  10. Integrating sensing across a broader spectrum to support homeland security

    Science.gov (United States)

    O'Brien, Thomas W.; Finkelstein, Marc

    2003-08-01

    All objects and activities give off energy in some part of the spectrum, may leave tell-tail signs from their previous activities (e.g., earth scaring or vapor trails), or leave information about relationships that they may have with other entities and activities (e.g., networks). Many of these phenomenologies are either not picked up by current stovepiped sensors, or the data supplied by those sensors are not fully exploited to properly observe them. In either case, new sensor data as well as the better exploitation of existing data could be used to provide, or at least cross cue or correlate with other sensor data to detect, identify, geolocate or track different kind of problems. Current sensors are often designed for specific purposes and are capable of sensing only limited parts of the spectrum. Significantly broadening the sensing spectrum will be an essential element of solving the emerging class of new "hard problems". There are many other observables available that could be exploited to assist in that process. Thus one could broaden the sensing to observe those phenomenologies associated with combustion effluents; thermal radiation; magnetic anomalies; seismic movement; acoustics; unintended electromagnetic emissions, changing weather conditions, logistics support indicators, debris trails; impressed observables (such as tagging); and others. What's needed is a disciplined, analytical process that can map observables to sensors, and ultimately to mission utility. The process, described in this SPIE presentation will address a specific example on the flow from the establishment of requirements to prosecutable observables, to objectives, to identification of sensors and assets, to the allocation of sensors and assets to observables, all based on optimizing mission utility.

  11. The Strategic Value of Humanitarian Immigration Policy Toward Homeland Security

    National Research Council Canada - National Science Library

    Kliska, Jennifer

    2008-01-01

    The United States faces a terrorist threat provoked by an extremist ideology. A greater, more strategic, contribution to the global good would reduce anger toward the United States and enhance constructive alliances...

  12. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    Gross Domestic Product GMO Genetically Modified Organisms HDL High Density Lipo Protein xiv HFCS High Fructose Corn Syrup LDL Low Density Lipo...index and as little of any processed or modified GMO grains. There is a means to return the nation to a healthier food state and also increase local

  13. The Italian Army’s Role in Homeland Security

    Science.gov (United States)

    2003-04-07

    Operazione “Vespri Siciliani”. Ciclo delle lezioni apprese (Civitavecchia: Scuola di Guerra, Maggio 1998) and Operazione “Forza Paris”. Ciclo delle lezioni...di un Esercito di qualita`.” Rivista Militare 6 (Novembre-Dicembre 2002): II. 61 Scuola di Guerra, Operazione “Vespri Siciliani”. Ciclo delle lezioni...A/2. 64 Scuola di Guerra, Operazione “Vespri Siciliani”. Ciclo delle lezioni apprese, C-13. 65 Scuola di Guerra, Operazione “Forza Paris”. Ciclo

  14. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    Science.gov (United States)

    2012-03-01

    James Monroe in 1823 ( Martin , n.d.). There is also political doctrine, such as egalitarianism a “political doctrine that holds that all people...be able to engage a larger stakeholder community and avoid the need for a huge new bureaucracy (Linde, O’Brien, Lindstrom , Spiegeleire, Vayrynen...Presentation, Osan Air Force Base, South Korea. 74 Linde, E., O’Brien, K., Lindstrom , G., Spiegeleire, S., Vayrynen, M., & de Vries, H. (2002

  15. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    Science.gov (United States)

    2012-12-01

    August 2004 Not recorded Subway near Madison Square Garden August 2004 New York City Police Department Pakistani diplomat August 2004 FBI...40 Charlie Savage and Scott Shane, “Intelligence Improperly Collected on U.S. Citizens,” New York Times, December 16, 2009...http://www.nytimes.com/2009/12/17/us/17disclose.html. 41 Savage , “Intelligence Improperly Collected on U.S. Citizens,” http://www.nytimes.com/2009/12

  16. Homeland Security: Protecting Airspace in the National Capital Region

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    .... While the administration is currently seeking to make the airspace restrictions in the National Capital Region permanent, Congress has pushed for an easing of restrictions on GA aircraft at Ronald...

  17. Will Climate Change the Future of Homeland Security

    Science.gov (United States)

    2016-09-01

    sports events. “The majority of facilities have open public access and house the business activities and commercial transactions that dominate the U.S...solar flares. These types of events can knock out the power grid and disable electric/electronic devices.”310 b. Economic and Political Drivers The

  18. The Homeland Security Enterprise: Where Do We Fit?

    Science.gov (United States)

    2009-09-01

    derivative. ( Junod , 2009, p. 1) Seeing that a single incident influences the whole, how do we make sense of our individual place in the larger complex...Quotations, 10th ed. 1919e. [Walt Whitman] Retrieved April 27, 2009, from http://www.bartleby.com/100/503.34.html Junod , Tom (2009) What the hell

  19. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  20. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    .... This thesis argues that several factors contribute to this lack of success, including funding structures and guidelines, the reluctance on the part of other responder agencies to include Public...

  1. Securing Nuclear and Radiological Material in the Homeland

    Science.gov (United States)

    2007-03-01

    Gorge in order to continue efforts to produce anthrax bacteria, ricin, and botulinum toxin. 3- Jan -05 French Government “Al-Qaeda Made Biological...claim that the amount of uranium was insufficient for the construction of a nuclear device. 25- Jan -04 German government Craig Whitlock, “Germnay...Mass Destruction and Al- Qa’ida,” Al- Akhbar (Cairo),18 January 2004. 1/23/2004 Chemical U.S. forces found 3kg of cyanide at the Baghdad house of

  2. Leveraging Social Media to Engage the Public in Homeland Security

    Science.gov (United States)

    2009-09-01

    amygdala , an almond-shaped mass located deep within the temporal lobes that are central to the brain’s fear circuit. In response, the amygdala set off a... hijackers did not ban the use of cell phones, so they began to collect information. Through calls to loved ones, emails and text messages passengers...learned the fate of the other hijacked airplanes and decided to respond and defend the White House, the United States Capitol and potentially saved

  3. Improving Information Exchange and Coordination Amongst Homeland Security Organizations

    National Research Council Canada - National Science Library

    Goan, Terrance; Mayk, Israel

    2005-01-01

    Command and Control for coordinated response to domestic terrorist attack will require the ability of Federal, state, and local agencies to maintain awareness of the status, capabilities, requirements...

  4. Legislating Civil Service Reform: The Homeland Security Act of 2002

    National Research Council Canada - National Science Library

    Brook, Douglas A; King, Cynthia L; Anderson, David; Bahr, Joshua

    2006-01-01

    .... It includes a review of the recent history of civil service reform, a chronology of the major events leading up to passage of the legislation, and a detailed examination of the rhetorical framing...

  5. Applications of ultra-compact accelerator technologies for homeland security

    International Nuclear Information System (INIS)

    Sampayan, S.; Caporaso, G.; Chen, Y.J.; Falabella, S.; Guethlein, G.; Harris, J.R.; Hawkins, S.; Holmes, C.; Krogh, M.; Nelson, S.; Nunnally, W.; Paul, A.C.; Poole, B.; Rhodes, M.; Sanders, D.; Selenes, K.; Shaklee, K.; Sitaraman, S.; Sullivan, J.; Wang, L.; Watson, J.

    2007-01-01

    We report on a technology development to address explosive detector system throughout with increased detection probability. The system we proposed and are studying consists of a pixelized X-ray based pre-screener and a pulsed neutron source quantitative post verifier. Both technologies are derived from our compact accelerator development program for the Department of Energy Radiography Mission that enables gradients >10MV/m. For the pixelized X-ray source panel technology, we have performed initial integration and testing. For the accelerator, we are presently integrating and testing cell modules. For the verifier, we performed MCNP calculations that show good detectability of military and multi-part liquid threat systems. We detail the progress of our overall effort, including research and modeling to date, recent high voltage test results and concept integration

  6. Quantifying a Negative: How Homeland Security Adds Value

    Science.gov (United States)

    2015-12-01

    access to future victims. The Law Enforcement agency could then identifying and quantifying the value of future crimes. For example, if a serial ... killer is captured with evidence of the next victim or an established pattern of victimization, network theory could be used to identify the next

  7. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  8. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  9. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  10. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  11. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  12. Bespilotne letjelice : Unmanned aerial vehicles

    Directory of Open Access Journals (Sweden)

    Vlado Jurić

    2016-12-01

    Full Text Available Bespilotne letjelice imaju širok spektar uporabe, i svrha im svakim danom sve više dobiva na značaju. Konstrukcija im se poboljšava, pronalaze se materijali koji su optimalniji za obavljanje funkcija s kojima se trebaju suočiti. Pravna regulativa za bespilotne letjelice do 150 kg težine na polijetanju (MTOW se razlikuje od države do države. : Unmanned aerial vehicles have a wide range of applications, and their purpose is every day more important. Construction has been improving, finding the materials that are optimal for carrying out the functions which need to be cope with. Legal regulations for unmanned aircrafts up to 150 kg take-off weight (MTOW varies from country to country.

  13. Unmanned operation of Hydro Power Plants

    International Nuclear Information System (INIS)

    Regula, E.

    2008-01-01

    Intentions to launch unmanned operation are no news, the very first occurred in Hydro Power Plants (HPP) at the time when the first computer technology was implemented into process of power generation, i.e. no later than in 1960 s . ENEL entering Slovenske elektrarne not only revived but significantly accelerated the implementation process of unmanned operation. Experience of ENEL says that unmanned operation means better reliability of the HPP and this is the priority. (author)

  14. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  15. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  16. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  17. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  18. 33 CFR 127.705 - Security systems.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  19. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  20. Unmanned Aerial Vehicles unique cost estimating requirements

    Science.gov (United States)

    Malone, P.; Apgar, H.; Stukes, S.; Sterk, S.

    Unmanned Aerial Vehicles (UAVs), also referred to as drones, are aerial platforms that fly without a human pilot onboard. UAVs are controlled autonomously by a computer in the vehicle or under the remote control of a pilot stationed at a fixed ground location. There are a wide variety of drone shapes, sizes, configurations, complexities, and characteristics. Use of these devices by the Department of Defense (DoD), NASA, civil and commercial organizations continues to grow. UAVs are commonly used for intelligence, surveillance, reconnaissance (ISR). They are also use for combat operations, and civil applications, such as firefighting, non-military security work, surveillance of infrastructure (e.g. pipelines, power lines and country borders). UAVs are often preferred for missions that require sustained persistence (over 4 hours in duration), or are “ too dangerous, dull or dirty” for manned aircraft. Moreover, they can offer significant acquisition and operations cost savings over traditional manned aircraft. Because of these unique characteristics and missions, UAV estimates require some unique estimating methods. This paper describes a framework for estimating UAV systems total ownership cost including hardware components, software design, and operations. The challenge of collecting data, testing the sensitivities of cost drivers, and creating cost estimating relationships (CERs) for each key work breakdown structure (WBS) element is discussed. The autonomous operation of UAVs is especially challenging from a software perspective.

  1. Unmanned Mobile Monitoring for Nuclear Emergency Response

    Energy Technology Data Exchange (ETDEWEB)

    Choi, YoungSoo; Park, JongWon; Kim, TaeWon; Jeong, KyungMin [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Severe accidents at nuclear power plant have led to significant consequences to the people, the environment or the facility. Therefore, the appropriate response is required for the mitigation of the accidents. In the past, most of responses were performed by human beings, but it was dangerous and risky. In this paper, we proposed unmanned mobile system for the monitoring of nuclear accident in order to response effectively. For the integrity of reactor cooling and containment building, reactor cooling pipe and hydrogen distribution monitoring with unmanned ground vehicle was designed. And, for the safety of workers, radiation distribution monitoring with unmanned aerial vehicle was designed. Unmanned mobile monitoring system was proposed to respond nuclear accidents effectively. Concept of reinforcing the integrity of RCS and containment building, and radiation distribution monitoring were described. RCS flow measuring, hydrogen distribution measuring and radiation monitoring deployed at unmanned vehicle were proposed. These systems could be a method for the preparedness of effective response of nuclear accidents.

  2. International Conference on Intelligent Unmanned Systems (ICIUS)

    CERN Document Server

    Kartidjo, Muljowidodo; Yoon, Kwang-Joon; Budiyono, Agus; Autonomous Control Systems and Vehicles : Intelligent Unmanned Systems

    2013-01-01

    The International Conference on Intelligent Unmanned Systems 2011 was organized by the International Society of Intelligent Unmanned Systems and locally by the Center for Bio-Micro Robotics Research at Chiba University, Japan. The event was the 7th conference continuing from previous conferences held in Seoul, Korea (2005, 2006), Bali, Indonesia (2007), Nanjing, China (2008), Jeju, Korea (2009), and Bali, Indonesia (2010). ICIUS 2011 focused on both theory and application, primarily covering the topics of robotics, autonomous vehicles, intelligent unmanned technologies, and biomimetics. We invited seven keynote speakers who dealt with related state-of-the-art technologies including unmanned aerial vehicles (UAVs) and micro air vehicles (MAVs), flapping wings (FWs), unmanned ground vehicles (UGVs), underwater vehicles (UVs), bio-inspired robotics, advanced control, and intelligent systems, among others. This book is a collection of excellent papers that were updated after presentation at ICIUS2011. All papers ...

  3. Neural network control of a parallel hybrid-electric propulsion system for a small unmanned aerial vehicle

    Science.gov (United States)

    Harmon, Frederick G.

    2005-11-01

    Parallel hybrid-electric propulsion systems would be beneficial for small unmanned aerial vehicles (UAVs) used for military, homeland security, and disaster-monitoring missions. The benefits, due to the hybrid and electric-only modes, include increased time-on-station and greater range as compared to electric-powered UAVs and stealth modes not available with gasoline-powered UAVs. This dissertation contributes to the research fields of small unmanned aerial vehicles, hybrid-electric propulsion system control, and intelligent control. A conceptual design of a small UAV with a parallel hybrid-electric propulsion system is provided. The UAV is intended for intelligence, surveillance, and reconnaissance (ISR) missions. A conceptual design reveals the trade-offs that must be considered to take advantage of the hybrid-electric propulsion system. The resulting hybrid-electric propulsion system is a two-point design that includes an engine primarily sized for cruise speed and an electric motor and battery pack that are primarily sized for a slower endurance speed. The electric motor provides additional power for take-off, climbing, and acceleration and also serves as a generator during charge-sustaining operation or regeneration. The intelligent control of the hybrid-electric propulsion system is based on an instantaneous optimization algorithm that generates a hyper-plane from the nonlinear efficiency maps for the internal combustion engine, electric motor, and lithium-ion battery pack. The hyper-plane incorporates charge-depletion and charge-sustaining strategies. The optimization algorithm is flexible and allows the operator/user to assign relative importance between the use of gasoline, electricity, and recharging depending on the intended mission. A MATLAB/Simulink model was developed to test the control algorithms. The Cerebellar Model Arithmetic Computer (CMAC) associative memory neural network is applied to the control of the UAVs parallel hybrid

  4. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  5. 6 CFR 5.31 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  6. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  7. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  8. 33 CFR 105.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...

  9. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2010-05-26

    ... business card that directs customers to an online portal. All responses are voluntary and there is no... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  10. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2013-08-01

    ... business card that directs customers to an online portal, a customer satisfaction card with survey... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  11. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  12. Unmanned systems win unexpected support

    Energy Technology Data Exchange (ETDEWEB)

    Schneiderman, R.

    1991-09-01

    A review of unmanned aerial vehicles (UAVs) is presented in which emphasis is given to recent mission accomplishments and current directions of research. Existing and new military UAV programs are listed with reference to funding, the type of vehicle, and level of development. Several trends are established including the reliance of UVAs on global positioning satellites and advanced electronics and the growth of the UVA industry. UVAs that are in advanced stages of development or have been deployed include short-range UAV such as the Pioneer, the Pointer, the Sky Owl, and the Hunter. Key UAV systems are described such as the Advanced Tactical Airborne Reconnaissance System, the Maritime Vertical Takeoff and Landing, and other VTOL systems. Very small UVAs and Exdrones are also discussed, and a weather reconnaissance system and surveillance systems are mentioned.

  13. Airspace Integration Plan for Unmanned Aviation

    National Research Council Canada - National Science Library

    2004-01-01

    The Office of the Secretary of Defense Airspace Integration Plan for Unmanned Aviation outlines the key issues that must be addressed to achieve the goal of safe, routine use of the National Airspace System (NAS...

  14. Formation keeping of unmanned ground vehicles

    Directory of Open Access Journals (Sweden)

    Muangmin Kamonwan

    2017-01-01

    Full Text Available Controlling motions of an unmanned ground vehicle becomes more popular in real world practices. Its application is useful for household chores, military services, medical purposes, and industrial revolutions, etc. An analysis of motions by using the Fundamental Equations of Constrained Motion (FECM is one effective tool to determine the motions. Its conceptualization is done in three-step procedure as follows: (I Determining an unconstrained motion (II Assigning constraint equations and (III Computing a constrained motion. The equations of motion obtained are expressed as liner functions of acceleration. Then other kinematical information of the unmanned ground vehicles can be obtained by integration its acceleration. In this work, the FECM is used as a tool to analyze motions of a group of unmanned ground vehicles in various forms. The simulation results show that control forces obtained from the approach can regulate motions of unmanned ground vehicles to maneuver in desired formations.

  15. Unmanned Ground Vehicle Tactical Behaviors Technology Assessment

    National Research Council Canada - National Science Library

    Childers, Marshal A; Bodt, Barry A; Hill, Susan G; Camden, Richard; Dean, Robert M; Dodson, William F; Sutton, Lyle G; Sapronov, Leonid

    2009-01-01

    During 4-14 February 2008, the U.S. Army Research Laboratory and General Dynamics Robotic Systems conducted an unmanned systems tactical behaviors technology assessment at three training areas of Ft. Indiantown Gap, PA...

  16. STUDY ON SAFETY TECHNOLOGY SCHEME OF THE UNMANNED HELICOPTER

    Directory of Open Access Journals (Sweden)

    Z. Lin

    2013-08-01

    Full Text Available Nowadays the unmanned helicopter is widely used for its' unique strongpoint, however, the high failure rate of unmanned helicopter seriously limits its further application and development. For solving the above problems, in this paper, the reasons for the high failure rate of unmanned helicopter is analyzed and the corresponding solution schemes are proposed. The main problem of the failure cause of the unmanned helicopter is the aircraft engine fault, and the failure cause of the unmanned helicopter is analyzed particularly. In order to improving the safety performance of unmanned helicopter system, the scheme of adding the safety parachute system to the unmanned helicopter system is proposed and introduced. These schemes provide the safety redundancy of the unmanned helicopter system and lay on basis for the unmanned helicopter applying into residential areas.

  17. Unmanned Aircraft Systems Roadmap, 2005-2030

    Science.gov (United States)

    2005-01-01

    UCAV Unmanned Combat Air Vehicle ISS Integrated Sensor Suite UCS Unmanned Control System ITU International Telecommunications Union UFO UHF...RDC) at Groton, CT. These have included alien and drug interdiction along the Texas coast and in the Caribbean, UA launch and recovery systems...altitude aircraft and UA; and narrowband services to support mobile and handheld services as a replacement or follow-on for the UHF Follow-On ( UFO

  18. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  19. 19 CFR 19.47 - Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The...

  20. Mathematical Modeling Applied to Maritime Security

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Layered Defense: Modeling Terrorist Transfer Threat Networks and Optimizing Network Risk Reduction” Students in Ted Lewis’ Critical Infrastructure Protection course are taught how mathematic modeling can provide...

  1. Analysis of an Unmanned Aerial Vehicle Monitoring System for Resurveying of Shipping Routes

    Directory of Open Access Journals (Sweden)

    Urbahs Aleksandrs

    2016-12-01

    Full Text Available The paper gives brief description of the conventional and innovative hydrography survey methods and constraints connected with the realization. Proposed hydrographic survey system based on the use of Unmanned Aerial and Maritime systems provides functionality to conduct hydrographic measurements and environment monitoring. System can be easily adapted to fulfil marine safety and security operations, e.g. intrusion threat monitoring, hazardous pollutions monitoring and prevention operations, icing conditions monitoring.

  2. Geophex Airborne Unmanned Survey System

    International Nuclear Information System (INIS)

    Won, I.L.; Keiswetter, D.

    1995-01-01

    Ground-based surveys place personnel at risk due to the proximity of buried unexploded ordnance (UXO) items or by exposure to radioactive materials and hazardous chemicals. The purpose of this effort is to design, construct, and evaluate a portable, remotely-piloted, airborne, geophysical survey system. This non-intrusive system will provide stand-off capability to conduct surveys and detect buried objects, structures, and conditions of interest at hazardous locations. During a survey, the operators remain remote from, but within visual distance of, the site. The sensor system never contacts the Earth, but can be positioned near the ground so that weak geophysical anomalies can be detected. The Geophex Airborne Unmanned Survey System (GAUSS) is designed to detect and locate small-scale anomalies at hazardous sites using magnetic and electromagnetic survey techniques. The system consists of a remotely-piloted, radio-controlled, model helicopter (RCH) with flight computer, light-weight geophysical sensors, an electronic positioning system, a data telemetry system, and a computer base-station. The report describes GAUSS and its test results

  3. Geophex Airborne Unmanned Survey System

    Energy Technology Data Exchange (ETDEWEB)

    Won, I.L.; Keiswetter, D.

    1995-12-31

    Ground-based surveys place personnel at risk due to the proximity of buried unexploded ordnance (UXO) items or by exposure to radioactive materials and hazardous chemicals. The purpose of this effort is to design, construct, and evaluate a portable, remotely-piloted, airborne, geophysical survey system. This non-intrusive system will provide stand-off capability to conduct surveys and detect buried objects, structures, and conditions of interest at hazardous locations. During a survey, the operators remain remote from, but within visual distance of, the site. The sensor system never contacts the Earth, but can be positioned near the ground so that weak geophysical anomalies can be detected. The Geophex Airborne Unmanned Survey System (GAUSS) is designed to detect and locate small-scale anomalies at hazardous sites using magnetic and electromagnetic survey techniques. The system consists of a remotely-piloted, radio-controlled, model helicopter (RCH) with flight computer, light-weight geophysical sensors, an electronic positioning system, a data telemetry system, and a computer base-station. The report describes GAUSS and its test results.

  4. Unmanned Aerial Vehicle Systems for Disaster Relief: Tornado Alley

    Science.gov (United States)

    DeBusk, Wesley M.

    2009-01-01

    Unmanned aerial vehicle systems are currently in limited use for public service missions worldwide. Development of civil unmanned technology in the United States currently lags behind military unmanned technology development in part because of unresolved regulatory and technological issues. Civil unmanned aerial vehicle systems have potential to augment disaster relief and emergency response efforts. Optimal design of aerial systems for such applications will lead to unmanned vehicles which provide maximum potentiality for relief and emergency response while accounting for public safety concerns and regulatory requirements. A case study is presented that demonstrates application of a civil unmanned system to a disaster relief mission with the intent on saving lives. The concept utilizes unmanned aircraft to obtain advanced warning and damage assessments for tornados and severe thunderstorms. Overview of a tornado watch mission architecture as well as commentary on risk, cost, need for, and design tradeoffs for unmanned aerial systems are provided.

  5. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  6. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  7. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  8. 33 CFR 103.305 - Composition of an Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... port stakeholders having a special competence in maritime security; and (7) Port stakeholders affected... Security (AMS) Committee. 103.305 Section 103.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  9. INTEGRATING UNMANNED AIRCRAFT VEHICLES IN THE ROMANIAN NATIONAL AIRSPACE

    Directory of Open Access Journals (Sweden)

    Sorana Alina Catinca POP

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles in the Romanian civil airspace brings us back to the 1920's, when the first aircraft started to fly over the Romanian sky. Little did the legislators at that time know how to create the proper legal framework for the use of such machines so that all aspects related to their use be covered, as well as identify all potential risks and effects. Nowadays, UAVs are the new aircraft and it is a challenge for the legislators to properly identify the legal framework so that the safety and security of civil aviation are not affected. The paper will address the challenges the regulator faces in the integration of the UAVs in the Romanian civil airspace, developments and issues raised by the current regulation, as well as aspects related to the national regulations expected to enter into force at the end of 2015, beginning of 2016.

  10. 8 CFR 103.34 - Security of records systems.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Security of records systems. 103.34 Section 103.34 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.34 Security of records systems. The security of records systems...

  11. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  12. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-12-29

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1005] National Maritime Security Advisory...

  13. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-07-02

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0586] National Maritime Security Advisory...

  14. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  15. Optimization of the Flight Path of an Unmanned Aerial Vehicle

    Directory of Open Access Journals (Sweden)

    Vasyl Myklukha

    2017-09-01

    Full Text Available The article describes the features of optimizing the flight path of an unmanned aerial vehicle. The paper analyzes the composition and designation of main equipment and payload of unmanned aerial vehicle. In particular, attention is drawn to the basic requirements that relate to the unmanned aerial vehicle today.

  16. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    Corn Oil High Fructose Corn Syrup Gluten Meal Gluten Feed Starch Wet Feed Germ Meal Gluten Condensed Corn Fermented Extractives Energy...nuts. "Pigs can be picky eaters," Mr. Smith says, scooping a handful of banana chips, yogurt -covered raisins, dried papaya and cashews from one of

  17. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    Hurricanes Andrew, Hugo , and Katrina resonate as failures where there was little, if any, federal response in the initial hours, which left the depleted...was also initiated by several large scale incidents, including the Three Mile Island Disaster and Hurricanes Hugo and Andrew.67 This evolved at the...persist during large scale disasters, as was demonstrated during Hurricane Katrina and Super Storm Sandy. Catastrophe response planning at the

  18. Leveraging Knowledge Management Tools to Support Security Risk Management in the Department of Homeland Security

    Science.gov (United States)

    2011-12-01

    Clarke, S., Coakes, E., & Jack, G. 2004). The following list of KM objectives from KPMG The Power of Knowledge: A Business Guide to Knowledge Management...emerging as the pre-eminent economic resource above raw materials , and often money…fundamental sources of wealth are knowledge and communication...learned: What works and what doesn’t. Medford: Information Today, Inc. KPMG . (1999). The power of knowledge. A business guide to knowledge management

  19. Homeland Security Within State Departments of Agriculture: Success Factors and Barriers to an Effective Security Program

    Science.gov (United States)

    2010-09-01

    cyanide. Researchers determined that the acid levels naturally found in grapes likely degraded the 10 cyanide. Even though no human health...diseased products, and the cost of containment (quarantines, vaccines, diagnostics, pesticides , and other related expenses). • Lost export markets... fungus , weed or other form of terrestrial or aquatic plant or animal life or virus, bacteria or other micro-organism (except viruses, bacteria, or other

  20. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    National Research Council Canada - National Science Library

    Cockrum, Jason J

    2008-01-01

    .... Three case studies were conducted at the United States largest ports of entry. Each compared CBP overtime spending and the daily flow of imports during the seven periods the HSAS was elevated to ORANGE between 2002 and 2005...

  1. Homeland security is hometown security: comparison and case studies of vertically synchronized catastrophe response plans

    OpenAIRE

    Liquorie, Paul J.

    2015-01-01

    Approved for public release; distribution is unlimited National preparedness doctrine has constantly evolved to address the pressing hazards and threats the country faces. Although arguably centered on terrorism, the current status of national policy attempts to have an all-hazards focus. While the contemporary version provides all tiers of government more guidance and structure than ever before, it still remains largely disjointed and lacks an effective overall operational response framew...

  2. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Science.gov (United States)

    2010-04-13

    ... made to the system of records' routine uses, record sources, retention and disposal, notification... information about individuals who are their employees, job applicants, or contractors, or persons to whom they... are being vetted to qualify as federal flight deck officers. The retention and disposal section is...

  3. Cooperative path planning of unmanned aerial vehicles

    CERN Document Server

    Tsourdos, Antonios; Shanmugavel, Madhavan

    2010-01-01

    An invaluable addition to the literature on UAV guidance and cooperative control, Cooperative Path Planning of Unmanned Aerial Vehicles is a dedicated, practical guide to computational path planning for UAVs. One of the key issues facing future development of UAVs is path planning: it is vital that swarm UAVs/ MAVs can cooperate together in a coordinated manner, obeying a pre-planned course but able to react to their environment by communicating and cooperating. An optimized path is necessary in order to ensure a UAV completes its mission efficiently, safely, and successfully. Focussing on the path planning of multiple UAVs for simultaneous arrival on target, Cooperative Path Planning of Unmanned Aerial Vehicles also offers coverage of path planners that are applicable to land, sea, or space-borne vehicles. Cooperative Path Planning of Unmanned Aerial Vehicles is authored by leading researchers from Cranfield University and provides an authoritative resource for researchers, academics and engineers working in...

  4. Unmanned Vehicle Material Flammability Test

    Science.gov (United States)

    Urban, David; Ruff, Gary A.; Fernandez-Pello, A. Carlos; T’ien, James S.; Torero, Jose L.; Cowlard, Adam; Rouvreau, Sebastian; Minster, Olivier; Toth, Balazs; Legros, Guillaume; hide

    2013-01-01

    Microgravity combustion phenomena have been an active area of research for the past 3 decades however, there have been very few experiments directly studying spacecraft fire safety under low-gravity conditions. Furthermore, none of these experiments have studied sample and environment sizes typical of those expected in a spacecraft fire. All previous experiments have been limited to samples of the order of 10 cm in length and width or smaller. Terrestrial fire safety standards for all other habitable volumes on earth, e.g. mines, buildings, airplanes, ships, etc., are based upon testing conducted with full-scale fires. Given the large differences between fire behavior in normal and reduced gravity, this lack of an experimental data base at relevant length scales forces spacecraft designers to base their designs using 1-g understanding. To address this question a large scale spacecraft fire experiment has been proposed by an international team of investigators. This poster presents the objectives, status and concept of this collaborative international project to examine spacecraft material flammability at realistic scales. The concept behind this project is to utilize an unmanned spacecraft such as Orbital Cygnus vehicle after it has completed its delivery of cargo to the ISS and it has begun its return journey to earth. This experiment will consist of a flame spread test involving a meter scale sample ignited in the pressurized volume of the spacecraft and allowed to burn to completion while measurements are made. A computer modeling effort will complement the experimental effort. Although the experiment will need to meet rigorous safety requirements to ensure the carrier vehicle does not sustain damage, the absence of a crew removes the need for strict containment of combustion products. This will facilitate the examination of fire behavior on a scale that is relevant to spacecraft fire safety and will provide unique data for fire model validation. This will be

  5. ARM Unmanned Aerial Systems Implementation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Schmid, Beat [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ivey, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-11-01

    Recent advances in Unmanned Aerial Systems (UAS) coupled with changes in the regulatory environment for operations of UAS in the National Airspace increase the potential value of UAS to the U.S. Department of Energy (DOE) Atmospheric Radiation Measurement (ARM) Climate Research Facility. UAS include unmanned aerial vehicles (UAV) and tethered balloon systems (TBS). The roles UAVs and TBSs could play within the ARM Facility, particularly science questions they could help address, have been discussed in several workshops, reports, and vision documents, including: This document describes the implementation of a robust and vigorous program for use of UAV and TBS for the science missions ARM supports.

  6. Remote sensing and actuation using unmanned vehicles

    CERN Document Server

    Chao, Haiyang

    2012-01-01

    Unmanned systems and robotics technologies have become very popular recently owing to their ability to replace human beings in dangerous, tedious, or repetitious jobs. This book fill the gap in the field between research and real-world applications, providing scientists and engineers with essential information on how to design and employ networked unmanned vehicles for remote sensing and distributed control purposes. Target scenarios include environmental or agricultural applications such as river/reservoir surveillance, wind profiling measurement, and monitoring/control of chemical leaks.

  7. Adapting existing training standards for unmanned aircraft: finding ways to train staff for unmanned aircraft operations

    CSIR Research Space (South Africa)

    Burger, CR

    2011-09-01

    Full Text Available - unmanned aircraft; pilot training. I. INTRODUCTION Unmanned aircraft offer flexibility not found in manned aircraft. They can be made smaller and cheaper to operate. They offer payload advantages relative to small manned aircraft. They can also perform... certificate to non-state users. To facilitate useful operations by UAs, future operations must be subject to no more than routine notification (e.g. an ATC flight plan), just like manned aircraft already are. Before such operations can be established, some...

  8. Aviation security : status of transportation security inspector workforce.

    Science.gov (United States)

    2009-02-06

    This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...

  9. Delegation control of multiple unmanned systems

    Science.gov (United States)

    Flaherty, Susan R.; Shively, Robert J.

    2010-04-01

    Maturing technologies and complex payloads coupled with a future objective to reduce the logistics burden of current unmanned aerial systems (UAS) operations require a change to the 2-crew employment paradigm. Increased automation and operator supervisory control of unmanned systems have been advocated to meet the objective of reducing the crew requirements, while managing future technologies. Specifically, a delegation control employment strategy has resulted in reduced workload and higher situation awareness for single operators controlling multiple unmanned systems in empirical studies1,2. Delegation control is characterized by the ability for an operator to call a single "play" that initiates prescribed default actions for each vehicle and associated sensor related to a common mission goal. Based upon the effectiveness of delegation control in simulation, the U.S. Army Aeroflightdynamics Directorate (AFDD) developed a Delegation Control (DelCon) operator interface with voice recognition implementation for play selection, real-time play modification, and play status with automation transparency to enable single operator control of multiple unmanned systems in flight. AFDD successfully demonstrated delegation control in a Troops-in-Contact mission scenario at Ft. Ord in 2009. This summary showcases the effort as a beneficial advance in single operator control of multiple UAS.

  10. Cooperative Control of Multiple Unmanned Autonomous Vehicles

    Science.gov (United States)

    2005-06-03

    I I Final Report 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Cooperative Control of Multiple Unmanned Autonomous Vehicles F49620-01-1-0337 6. AUTHOR(S... Autonomous Vehicles Final Report Kendall E. Nygard Department of Computer Science and Operations Research North Dakota State University Fargo, ND 58105-5164

  11. Unmanned Aerial Vehicle (UAV) Photogrammetry Produces ...

    African Journals Online (AJOL)

    Marinus Boon

    Department of Geography, Environmental Management and Energy Studies, University of ... The technique also only requires a few control measurements and the ... The number of Unmanned Aerial Systems (UAS) referenced in the 2013 ... model aircraft airfield east of the R25 road, just south of the M6 intersection, up until ...

  12. Common Operating Picture: UAV Security Study

    Science.gov (United States)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  13. 78 FR 54392 - Security Zone, Baltimore Harbor, Baltimore's Inner Harbor; Baltimore, MD

    Science.gov (United States)

    2013-09-04

    ... Department of Homeland Security FR Federal Register NPRM Notice of Proposed Rulemaking A. Regulatory History... the maritime safety and security of the general public. B. Basis and Purpose The National Football...

  14. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  15. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order to...

  16. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability assessments. 27.240 Section 27.240 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval...

  17. Vision enhanced navigation for unmanned systems

    Science.gov (United States)

    Wampler, Brandon Loy

    A vision based simultaneous localization and mapping (SLAM) algorithm is evaluated for use on unmanned systems. SLAM is a technique used by a vehicle to build a map of an environment while concurrently keeping track of its location within the map, without a priori knowledge. The work in this thesis is focused on using SLAM as a navigation solution when global positioning system (GPS) service is degraded or temporarily unavailable. Previous work on unmanned systems that lead up to the determination that a better navigation solution than GPS alone is first presented. This previous work includes control of unmanned systems, simulation, and unmanned vehicle hardware testing. The proposed SLAM algorithm follows the work originally developed by Davidson et al. in which they dub their algorithm MonoSLAM [1--4]. A new approach using the Pyramidal Lucas-Kanade feature tracking algorithm from Intel's OpenCV (open computer vision) library is presented as a means of keeping correct landmark correspondences as the vehicle moves through the scene. Though this landmark tracking method is unusable for long term SLAM due to its inability to recognize revisited landmarks, as opposed to the Scale Invariant Feature Transform (SIFT) and Speeded Up Robust Features (SURF), its computational efficiency makes it a good candidate for short term navigation between GPS position updates. Additional sensor information is then considered by fusing INS and GPS information into the SLAM filter. The SLAM system, in its vision only and vision/IMU form, is tested on a table top, in an open room, and finally in an outdoor environment. For the outdoor environment, a form of the slam algorithm that fuses vision, IMU, and GPS information is tested. The proposed SLAM algorithm, and its several forms, are implemented in C++ using an Extended Kalman Filter (EKF). Experiments utilizing a live video feed from a webcam are performed. The different forms of the filter are compared and conclusions are made on

  18. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  19. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu, HI...

  20. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  1. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  2. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  3. 19 CFR 122.181 - Definition of Customs security area.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of...

  4. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-10-26

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the conference... President regarding their review of the Department of Homeland Security's (DHS) National Cybersecurity and...

  5. International Symposium on Unmanned Aerial Vehicles

    CERN Document Server

    Oh, Paul; Piegl, Les

    2009-01-01

    Unmanned Aircraft Systems (UAS) have seen unprecedented levels of growth during the last decade in both military and civilian domains. It is anticipated that civilian applications will be dominant in the future, although there are still barriers to be overcome and technical challenges to be met. Integrating UAS into, for example, civilian space, navigation, autonomy, see-detect-and-avoid systems, smart designs, system integration, vision-based navigation and training, to name but a few areas, will be of prime importance in the near future. This special volume is the outcome of research presented at the International Symposium on Unmanned Aerial Vehicles, held in Orlando, Florida, USA, from June 23-25, 2008, and presents state-of-the-art findings on topics such as: UAS operations and integration into the national airspace system; UAS navigation and control; micro-, mini-, small UAVs; UAS simulation testbeds and frameworks; UAS research platforms and applications; UAS applications. This book aims at serving as ...

  6. A REVIEW OF TACTICAL UNMANNED AERIAL VEHICLE DESIGN STUDIES

    OpenAIRE

    Coban, Sezer; Oktay, Tugrul

    2017-01-01

    In this study, a literaturesearch was conducted on tactical unmanned aerial vehicles. First of all, it wasclassified as an unmanned aerial vehicle. It is mentioned about thecharacteristics of ZANKA-III, which is highly autonomous, passive and activemorphing, aerodynamically perfect, tactical unmanned aerial vehicle (TUAV)ZANKA-III, supported by TUBITAK's 1001 Ardeb program 115M603 by TUBITAK and itis mentioned that they have superior characteristics from other tacticalunmanned aerial veh...

  7. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  8. OPTIMUM PROGRAMMABLE CONTROL OF UNMANNED FLYING VEHICLE

    Directory of Open Access Journals (Sweden)

    A. А. Lobaty

    2012-01-01

    Full Text Available The paper considers an analytical synthesis problem pertaining to programmable control of an unmanned flying vehicle while steering it to the fixed space point. The problem has been solved while applying a maximum principle which takes into account a final control purpose and its integral expenses. The paper presents an optimum law of controlling overload variation of a flying vehicle that has been obtained analytically

  9. Unmanned Systems Roadmap 2007-2032

    Science.gov (United States)

    2007-01-01

    advances in each of the three fields, as shown from the following selected summaries from the study: Transgenic biopolymers fall at the intersection...cowlings) for unmanned systems. As an example, the silk -producing gene of spiders has been spliced into the mammary gland gene of sheep, from whose...subsequent milk the silk protein can be extracted. Breeding herds of such sheep enable spider silk , known for its light weight and high strength, to be

  10. The prospects for Unmanned Aerial Vehicles

    OpenAIRE

    Brookes, Andrew

    2000-01-01

    In this study Andrew Brookes argues that Unmanned Aerial Vehicles (UAV) is the military fashion of the moment. Since the end of the 1990s many nations have added UAVs to their military inventories, and in 1999 half a dozen nations used UAVs over Kosovo. In the light of operational experience in Kosovo, Brookes re-evaluates the potential of this vehicle, and examines the roles, capabilities and future challenges of UAV.

  11. Applications for Navy Unmanned Aircraft Systems

    Science.gov (United States)

    2010-01-01

    comunication intelligence (COMINT) collection, and airborne electronic attack applications. If the UCAS-D program is successful in addressing many of the...position navigation and timing RF radio frequency RSTA reconnaissance, surveillance, and target acquisition SAB Scientific Advisory Board SAR synthetic...Aircraft Systems Roadmap 2005–2030 and Unmanned Systems Roadmap 2007–2032, and the 2003 Air Force Scientific Advisory Board (SAB) UAS study

  12. The Effect of Appropriately and Inappropriately Applied Automation for the Control of Unmanned Systems on Operator Performance

    Science.gov (United States)

    2009-09-01

    2.1 Participants Twelve civilians (7 men and 5 women ) with no prior experience with the Robotic NCO simulation participated in this study. The mean...operators in a multitasking environment. 15. SUBJECT TERMS design guidelines, robotics, simulation, unmanned systems, automation 16. SECURITY...model of operator performance, or a hybrid method which combines one or more of these different invocation techniques (e.g., critical events and

  13. ICAROUS: Integrated Configurable Architecture for Unmanned Systems

    Science.gov (United States)

    Consiglio, Maria C.

    2016-01-01

    NASA's Unmanned Aerial System (UAS) Traffic Management (UTM) project aims at enabling near-term, safe operations of small UAS vehicles in uncontrolled airspace, i.e., Class G airspace. A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight operations. This video describes a new capability referred to as ICAROUS (Integrated Configurable Algorithms for Reliable Operations of Unmanned Systems), which is being developed under the auspices of the UTM project. ICAROUS is a software architecture comprised of highly assured algorithms for building safety-centric, autonomous, unmanned aircraft applications. Central to the development of the ICAROUS algorithms is the use of well-established formal methods to guarantee higher levels of safety assurance by monitoring and bounding the behavior of autonomous systems. The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and autonomous detect and avoid functions. ICAROUS also provides a highly configurable user interface that enables the modular integration of mission-specific software components.

  14. Unmanned Mine of the 21st Centuries

    Science.gov (United States)

    Semykina, Irina; Grigoryev, Aleksandr; Gargayev, Andrey; Zavyalov, Valeriy

    2017-11-01

    The article is analytical. It considers the construction principles of the automation system structure which realize the concept of «unmanned mine». All of these principles intend to deal with problems caused by a continuous complication of mining-and-geological conditions at coalmine such as the labor safety and health protection, the weak integration of different mining automation subsystems and the deficiency of optimal balance between a quantity of resource and energy consumed by mining machines and their throughput. The authors describe the main problems and neck stage of mining machines autonomation and automation subsystem. The article makes a general survey of the applied «unmanned technology» in the field of mining such as the remotely operated autonomous complexes, the underground positioning systems of mining machines using infrared radiation in mine workings etc. The concept of «unmanned mine» is considered with an example of the robotic road heading machine. In the final, the authors analyze the techniques and methods that could solve the task of underground mining without human labor.

  15. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  16. (Congressional Interest) Network Information and Space Security Center

    Science.gov (United States)

    2011-09-30

    Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of

  17. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  18. Development of a Geospatial Data-Sharing Method for Unmanned Vehicles Based on the Joint Architecture for Unmanned Systems (JAUS)

    Science.gov (United States)

    2005-08-01

    the Office of the Secretary of Defense chartered the Joint Architecture for Unmanned Ground Systems ( JAUGS ) Working Group to address these concerns...The JAUGS Working Group was tasked with developing an initial standard for interoperable unmanned ground systems. In 2002, the charter of the... JAUGS Working Group was 1 2 modified such that their efforts would extend to all unmanned systems, not only ground systems. The standard was

  19. Intelligent autonomy for unmanned naval systems

    Science.gov (United States)

    Steinberg, Marc

    2006-05-01

    This paper provides an overview of the development and demonstration of intelligent autonomy technologies for control of heterogeneous unmanned naval air and sea vehicles and describes some of the current limitations of such technologies. The focus is on modular technologies that support highly automated retasking and fully autonomous dynamic replanning for up to ten heterogeneous unmanned systems based on high-level mission objectives, priorities, constraints, and Rules-of-Engagement. A key aspect of the demonstrations is incorporating frequent naval operator evaluations in order to gain better understanding of the integrated man/machine system and its tactical utility. These evaluations help ensure that the automation can provide information to the user in a meaningful way and that the user has a sufficient level of control and situation awareness to task the system as needed to complete complex mission tasks. Another important aspect of the program is examination of the interactions of higher-level autonomy algorithms with other relevant components that would be needed within the decision-making and control loops. Examples of these are vision and other sensor processing algorithms, sensor fusion, obstacle avoidance, and other lower level vehicle autonomous navigation, guidance, and control functions. Initial experiments have been completed using medium and high-fidelity vehicle simulations in a virtual warfare environment and inexpensive surrogate vehicles in flight and in-water demonstrations. Simulation experiments included integration of multi-vehicle task allocation, dynamic replanning under constraints, lower level autonomous vehicle control, automatic assessment of the impact of contingencies on plans, management of situation awareness data, operator alert management, and a mixed-initiative operator interface. In-water demonstrations of a maritime situation awareness capability were completed in both a river and a harbor environment using unmanned surface

  20. Use of Unmanned Aerial Vehicles by the Islamic State: Nature of the Threat

    Directory of Open Access Journals (Sweden)

    David Mrva

    2018-01-01

    Full Text Available The proliferation of Unmanned Aerial Vehicles (UAVs on the battlefield does not exclude terrorist actors. Recently, there is an evident increase in the number of incidents when the so-called Islamic State has used UAVs. This article tries to describe this relatively new phenomenon and present an overview of main types of the potential Islamic State’s UAV employment in Europe. Despite the fact, that the UAV use by terrorist actors will probably not have the strategic impact by itself, it constitutes a new challenge for state security agencies.