WorldWideScience

Sample records for homeland security unmanned

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  3. Department of Homeland Security

    Science.gov (United States)

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... HP - 2016 CISRM HP - 2016 CISRM Critical Infrastructure Security HP - Surge Capacity Force HP - Surge Capacity Force ...

  4. Homeland Security and Information.

    Science.gov (United States)

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  5. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...... challenge. Europe and the United States have reacted differently to the emergence of mass casualty terrorism, but must work together to cope with the diverse issue areas, sectors, professions, and relevant actors involved in such a broad-based concept. The authors suggest that Europe and the US have a lot...

  6. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... SECURITY Homeland Security Information Network Advisory Committee AGENCY: Department of Homeland Security... Applicants for Appointment to Homeland Security Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information...

  7. Homeland Security: A Selected Bibliography

    Science.gov (United States)

    2011-04-01

    March 7, 2006. 19pp. (AD-A449- 850) http://handle.dtic.mil/100.2/ADA449850 Flynn, Stephen E., and Daniel B. Prieto . Neglected Defense: Mobilizing...R41250.pdf Flynn, Stephen E., and Daniel B. Prieto . Neglected Defense: Mobilizing the Private Sector to Support Homeland Security. New York: Council...ADA478240 Clarke, Richard Alan . Your Government Failed You: Breaking the Cycle of National Security Disasters. New York: Ecco, 2008. 408pp

  8. Robotic systems for homeland security

    Science.gov (United States)

    Esser, Brian; Miller, Jon; Huston, Dryver R.; Bourn, Phil

    2004-07-01

    This paper will present the concept of utilizing various mobile robotic platforms for homeland security. Highly specialized mobile robots equipped with the proper sensors and data processing capabilities have the ability to provide security and surveillance for a wide variety of applications. Large infrastructure components, such as bridges, pipelines, dams, and electrical power grids pose severe challenges for monitoring, surveillance, and protection against man-made and natural hazards. The structures are enormous, often with awkward and dangerous configurations that make it difficult, if not impossible, for continuous human surveillance. Properly outfitted robots have the potential to provide long-term surveillance without requiring continuous human supervision. Furthermore, these robotic platforms can have disaster mitigation capabilities such as evaluation of infrastructure integrity at the disaster site. The results presented will include proof-of-concept robotic platforms equipped with various sensor arrays, as well as discussion of design criteria for numerous homeland security applications.

  9. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  10. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  11. The National Homeland Security Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — The National Homeland Security Research Center advances our nation's security by providing scientific products and expertise to improve the ability to respond to and...

  12. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    ... homeland security, results of a cyber security exercise, sharing information with others, and Southwest... would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially...

  13. Homeland security intelligence : to what end?

    OpenAIRE

    2010-01-01

    CHDS State/Local Approved for public release; distribution is unlimited In this thesis, I present potential solution sets to the question of why homeland security leaders and practitioners use intelligence to improve homeland security decisions. Specific roles and benefits of intelligence are identified, analyzed, and where applicable, extended to domestic security objectives across the homeland security community spectrum. This thesis purports and defends the theory that there are many...

  14. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... AGENCY Department of Homeland Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA... of Homeland Security. The Department of Homeland Security will work with OPP pursuant to the Homeland Security Presidential Directives and the 2009 National Infrastructure Protection Plan. DATES:...

  15. The Proposed Homeland Security Budget for 2013

    Science.gov (United States)

    2012-09-01

    United States Holocaust Memorial Museum. CBO 6 THE PROPOSED HOMELAND SECURITY BUDGET FOR 2013 CBOFigure 2. Homeland Security Funding Requested by the...Marshals Service Bureau of Alcohol, Tobacco, Firearms, and Explosives Federal Bureau of Investigation Miscellaneousa Food and Drug Administration...Administration National Security Division Food and Drug Administration Federal Bureau of Investigation Firearms, and Explosives Bureau of Alcohol, Tobacco

  16. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology Advisory...

  17. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... violent extremism domestically; the current threat environment; evolving threats in cyber security... receive a briefing on evolving threats in cyber security. This will include lessons learned and potential... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of...

  18. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ...) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the... (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Closed...

  19. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  20. 75 FR 2880 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-01-19

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Committee management... providing strategic, timely and actionable advice. ] The HSAC will meet publicly to swear in new Council members, receive observations and remarks from DHS senior leadership, and review and...

  1. U.S. Homeland Security R&D Budgets

    Energy Technology Data Exchange (ETDEWEB)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  2. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  3. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  4. Homeland Security Affairs Journal, Volume IV - 2008: Issue 3, October

    OpenAIRE

    2008-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. October 2008. The articles in this issue of Homeland Securit...

  5. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  6. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  7. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the... public. DATES: The Homeland Security Science and Technology Advisory Committee will meet January 26, 2010...

  8. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  9. 33 CFR 101.205 - Department of Homeland Security alignment.

    Science.gov (United States)

    2010-07-01

    ... alignment. 101.205 Section 101.205 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Department of Homeland Security alignment. The MARSEC Levels are aligned with the Department of Homeland... alignment. Table 101.205—Relation Between HSAS and MARSEC Levels Homeland security advisory system...

  10. Analytical Approaches to Address Homeland Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Holter, Gregory M.; Young, Jonathan

    2003-11-01

    Homeland security concerns arising since September 11, 2001, have captured national attention and sparked a number of responses at all levels of government. As events have unfolded and the nature of the situation has become better understood within the United States, the need for effective planning and response has resulted in the identification of significant analytical challenges. These challenges relate to a number of different needs, including the following: (1) estimating the probability and the potential impact of various threats, (2) identifying the need for and effectiveness of specific counter-measures, and (3) assessing the combined results of interacting activities and events. Analytical approaches traditionally used for safety engineering and risk analysis, coupled with analytical approaches borrowed from other systems analysis disciplines, can be usefully adapted to help meet these challenges. This paper identifies and discusses several illustrative examples of the analytical challenges currently being faced with respect to homeland security. Linkages are then examined between these specific challenges and traditional analytical approaches from a variety of disciplines, including safety engineering and risk analysis. Since effective cooperation among responsible agencies and organizations has been identified as an issue of concern and is essential to achieve an effective homeland security strategy and response capability, issues relating to multiple interacting activities are specifically highlighted.

  11. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  12. Applicability of Unmanned Aerial Systems to Homeland Defense Missions

    Science.gov (United States)

    2006-12-01

    criticism after bungled and untimely responses to Hurricane Hugo in 1988 and the Loma Prieta earthquake in 1989. However, a 1991 GAO study...1 A. EFFECTIVE USE OF UNMANNED AERIAL SYSTEMS ........................1 B. HISTORY OF UNMANNED AERIAL SYSTEMS AND...assistance was invaluable. xiv THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. EFFECTIVE USE OF

  13. Homeland security in the USA: past, present, and future.

    Science.gov (United States)

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.

  14. A value model for evaluating homeland security decisions.

    Science.gov (United States)

    Keeney, Ralph L; von Winterfeldt, Detlof

    2011-09-01

    One of the most challenging tasks of homeland security policymakers is to allocate their limited resources to reduce terrorism risks cost effectively. To accomplish this task, it is useful to develop a comprehensive set of homeland security objectives, metrics to measure each objective, a utility function, and value tradeoffs relevant for making homeland security investments. Together, these elements form a homeland security value model. This article develops a homeland security value model based on literature reviews, a survey, and experience with building value models. The purposes of the article are to motivate the use of a value model for homeland security decision making and to illustrate its use to assess terrorism risks, assess the benefits of countermeasures, and develop a severity index for terrorism attacks. © 2011 Society for Risk Analysis.

  15. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  16. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC) AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet on February 27th-28th, 2013 in Washington, DC....

  17. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    National Preparedness: A Case Study in the Development of Public Policy,” Sam Clovis agrees that homeland security is a national issue but...recommends that state and local governments have maximum flexibility in implementing homeland security programs ( Clovis , 2006). He sees the federal...national preparedness ( Clovis , 2006). The author goes on to recommend a framework of “Collaborative Federalism” for homeland security. A review of

  18. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security....

  19. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    Science.gov (United States)

    2014-12-01

    Exchange Commission (SEC), was a champion of plain language and realized how critical it is for financial documents. The SEC handbook remains an excellent...contagious back to the 1930s, as described in the Jacob Moreno sociograms. The language of contagion is part of pop culture today, and it is common to... contagion are also applicable to resiliency matters of homeland security. Fostering resilient behaviors in the community can have a contagious influence on

  20. Risk Unbound: Threat, Catastrophe, and the End of Homeland Security

    Science.gov (United States)

    2015-09-01

    something different of homeland security professionals. B. PROBLEM STATEMENT Three dominant pillars of homeland security theory and practice...term is that in which the price of copper and the rate of interest twenty years hence, all the obsolescence of a new invention are uncertain. About

  1. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... SECURITY Committee Name: Homeland Security Information Network Advisory Committee (HSINAC) AGENCY... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network... Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the...

  2. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Science.gov (United States)

    2010-07-29

    ... SECURITY Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday, August... meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet from... Homeland Security Information Network Advisory Committee is to identify issues and provide to...

  3. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    and largely ignores the social aspects that influence an individual’s beliefs, attitudes and, behaviors.53 Self-efficacy is defined by Albert Bandura ...master’s thesis Naval Postgraduate School, Monterey, CA), 39–52 53 Ibid., 53. 54 Albert Bandura , “Self-efficacy: Toward a Unifying Theory of...Hometown Security: Advancing the Homeland Security Paradigm, Homeland Security Affairs V (2009). http://www.hsaj.org/?fullarticle=5.2.2. Bandura

  4. A survey of COTS wireless transceiver solutions for unmanned/unattended homeland defense systems

    Science.gov (United States)

    Wurth, Timothy J.; Wells, Jeffrey S.; Trimble, Michael L.

    2004-08-01

    As the war on terrorism continues abroad, the need to maintain security at home remains a major concern. Every aspect of the security effort can benefit from rapid information transfer. Advances in Commercial-Off-the-Shelf (COTS) radios make them valuable in applications ranging from deployed sensors on unsecured borders, to organizing an emergency response team. Additionally, the reduced cost and availability of these transceivers make them a viable alternative to custom developments. As an example, COTS radios can serve as the communication element in Unattended Ground Sensor (UGS) and munitions systems. Other applications include networked sonobuoys and networked RFID tracking. An additional advantage of COTS solutions is that they are available in a small form factor. They have extremely small mechanical outlines and are easily installed in systems requiring miniature designs and light payloads such as man-pack emplaced radios for the Army"s Future Combat System (FCS), as well as missions carried out by Unmanned Aerial Vehicles (UAV). The availability of the COTS radios result in a low-cost alternative for communication links that are applicable to military and Homeland Defense projects. They provide an easily obtainable, low-cost radio alternative enabling quick design cycles to meet mission timeliness. COTS solutions eliminate months from a typical design cycle and have many features already implemented such as ad-hoc routing and encryption. This enables robust hardware to be fielded quickly when a new need arises. The focus of this paper is to identify different COTS modules that can efficiently and cost effectively be applied to these and other various applications.

  5. 75 FR 59278 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-09-27

    ... enforcement agencies concerning transportation infrastructure. Members will also receive domestic and international intelligence briefings that are focused on threats against the homeland which require responsive... vulnerabilities identified in a cyber exercise and discuss potential methods to improve a federal response...

  6. Ultrafast fiber lasers for homeland security

    Science.gov (United States)

    Okhotnikov, O. G.

    2005-09-01

    Detecting weapons concealed underneath clothing, analyzing the contents of suspicious-looking envelopes, or even spotting the onset of cancer: these are just some of the exciting prospects that have been turning terahertz wave research into one of the most important topics in photonics. Most broadband pulsed THz sources are based on the excitation of different materials with ultrashort laser pulses. So far, generation of tunable narrow-band THz radiation has been demonstrated using ultrafast solid state lasers as a source of high-intensity optical pulses. The lack of a high-power, low-cost, portable room-temperature THz source is the most significant limitation of modern THz systems. Advances in fiber laser technology can be used to further the capabilities of the homeland security. Using semiconductor saturable absorber mirrors allows for reliable mode-locked operation with different values of cavity dispersion in a broad spectrum ranged from 900 to 1600 nm. Semiconductor saturable absorbers mirrors have been used successfully to initiate and to sustain mode-locking in a wide range of core-pumped fiber lasers. The main advantage of the semiconductor saturable absorber mirrors (SESAM) is the possibility to control important parameters such as absorption recovery time, saturation fluence and modulation depth through the device design, growth conditions and post-growth processing. The SESAM as a cavity mirror in the fiber laser results in compact size, environmentally stable and simple ultrashort pulse lasers that can cover wide wavelength range and generate optical pulses with durations from picoseconds to femtoseconds. Employing SESAM technology for mode-locking, the double-clad fiber laser promises superior pulse quality, high stability and pulse energy without need for power booster that eventually degrades the pulse quality due to nonlinear distortions in the amplifier fiber. We give an overview of recent achievements in ultrafast fiber lasers; discuss basic

  7. Managing Materials and Wastes for Homeland Security Incidents

    Science.gov (United States)

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  8. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-06-25

    ... community approach and preparedness culture within student and neighboring communities; how to strengthen... relating to student and recent graduate recruitment; international students; academic research; campus and... (Student and Recent Graduate Recruitment, Homeland Security Academic Programs, Academic Research and...

  9. Using Multiple Unmanned Systems for a Site Security Task

    Energy Technology Data Exchange (ETDEWEB)

    Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

    2009-04-01

    Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

  10. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on...

  11. Solving homeland security's wicked problems: a design thinking approach

    OpenAIRE

    Wyckoff, Kristin L.

    2015-01-01

    Approved for public release; distribution is unlimited The Department of Homeland Security’s Science and Technology Directorate (DHS S&T) requires a consistent yet flexible approach to address wicked problems. A design-thinking methodology holds promise, as its tenets align with the diversity and complexity inherent within the homeland security environment. Design thinking emphasizes a human-centered and multidisciplinary approach to solution development. The research examined how design t...

  12. Homeland Security Department: FY2011 Appropriations

    Science.gov (United States)

    2010-08-27

    administers several programs, including the BioWatch program, the National Biosurveillance Integration System (NBIS), and the department’s...coordination activities are implemented); the National Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.104...Acquisition 20 61 78 Radiation Portal Monitoring Program — 8 20 Securing the Cities 20 — 20 Human Portable Radiation Detection Systems — 53 38

  13. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  14. Homeland Security Department: FY2009 Appropriations

    Science.gov (United States)

    2009-03-04

    programs throughout DHS, and administers several of them, including the BioWatch program, the National Biosurveillance Integration System (NBIS...increase of $68 million for procurement of Advanced Spectroscopic Portals (ASPs) was partly offset by a decrease of $10 million for the Securing the...Nuclear Forensics Center, and $15 million for the Radiation Portal Monitoring Program. The House continued the prohibition on full-scale procurement

  15. Homeland Security Department: FY2006 Appropriations

    Science.gov (United States)

    2005-06-29

    continuing resolution.” e. P.L. 101-130, enacted after the Loma Prieta earthquake, appropriated $1.1 billion in supplemental funding for FY1990. In...cooperate with and assist DHS in any investigation or reinvestigation. The authorization would cease to be effective once the President has selected...that investigations for DHS security clearances are done in the most timely and efficient manner once the 9/11 Act reforms take effect .” (Congressional

  16. A Homeland Security Net Assessment Needed Now!

    Science.gov (United States)

    2015-12-01

    significant such historical comparisons are for today. One of the most important developments has been the establishment of a network of 78 state...mission of directing DOD cyber opera- tions and defending military information networks . The commander of USCYBERCOM also serves as director of the...to telecoms to aviation.”71 In recent years it seems as if just about everybody in the national security and intelligence communities has jumped on

  17. Homeland Security Affairs Journal, Volume VII - 2011, 10 Years After: The 9/11 Essays

    OpenAIRE

    2011-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. 10 Years After: the 9/11 Essays. Homeland Security Affairs (...

  18. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  19. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION... Homeland Security has determined that the renewal of the charter of the Homeland Security Science...

  20. Homeland Security Research and Development Funding, Organization, and Oversight

    Science.gov (United States)

    2006-08-22

    University of Southern California; agro-security at the University of Minnesota and at Texas A&M; on behavioral and sociological aspects of terrorism at the...computational challenges for homeland security. DHS also supports a university fellowship /training program, which plans to train 200 students in 2007, down from...300 in 2006, and up to 15 postdoctoral fellows. Regarding intramural R&D, DHS may use any federal laboratory and may establish a headquarters

  1. Modeling Homeland Security: A Value Focused Thinking Approach

    Science.gov (United States)

    2013-02-21

    BIB -1 viii List of Figures Page Figure 2-1: Organization of the Department of Homeland Security...richard.deckro@afit.edu. BIB -1 Bibliography 1. Advisory Panel to Assess Domestic Response Capabilities For Terrorism Involving Weapons of...House, 2002. BIB -2 13. CERN: European Organization for Nuclear Resources. “Affinity Diagram.” Technical Support Division. November 2002

  2. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal Emergency...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue...

  3. The Role of the National Guard in Homeland Security

    Science.gov (United States)

    2007-05-01

    became the tool to militarily protect the westward expansion. In 1790, under Harmer , and in 1791 under St. Clair, forces which consisted of primarily...militia with additional regular units were defeated by Indians in the Northwest frontier. Both Harmer and St. Clair defended themselves by...and Charles W. Yost. Army Forces for Homeland Security. Santa Monica, CA: RAND Corporation, 2004. Davis, Lynn E., and Jeremy Shapiro, ed. The U.S

  4. Federal-Tribal Government Collaboration in Homeland Security

    Science.gov (United States)

    2007-09-01

    wide variety of national critical infrastructure. Dams, water impoundments and reservoirs, electrical generation plants, drinking water, and...Kalt and Singer point out, “did not and do not absorb the tribes into the United States; rather, the reverse is true. The treaties recognize and...identified as a point of need for effective homeland security actions, Kettl points out that without better collaboration between the state and local

  5. Creation of a Homeland Security Jail Information Model

    Science.gov (United States)

    2012-03-01

    In contrast, law enforcement officers at a jail have a better gestalt understanding of homeland security threats and trends in the same...and my personal familiarity with each model. In his book Beyond the Two Disciplines of Scientific Psychology , Lee Cronbach claims that...muhajir.background/index.html Cronbach, L. J. (1975). Beyond the two disciplines of scientific psychology . Washington, D.C.: American Psychologist

  6. The Homeland Security Enterprise: Where Do We Fit?

    Science.gov (United States)

    2009-09-01

    they are dependent upon the grant funding to help offset the burdens of establishing and maintaining a state of readiness. Samuel Clovis (2006...by Samuel H. Clovis , Jr., Chair of the Department of Business Administration and Economics at Morningside College in Sioux City, Iowa. 15 Like...Secretary Chertoff (2006, p. 1), Clovis (2006, p. 1) asserts future homeland security challenges “Require solutions for which the existing structures

  7. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    familysecuritymatters.org/publications/id.7744/pub_detail.asp. 2 Arthur Tulak, Robert Kraft, and Don Silbaugh, “State Defense Forces and Homeland Security...not part of an elite group of well-armed, well-trained military soldiers hardened by the trials of lethal combat—most were simply the undesirables of...Guard. Accessed September 15, 2014. http://www.tnmilitary.org/tennessee-state- guard.html. Tulak, Arthur , Robert Kraft, and Don Silbaugh. “State

  8. Role of Information Management in Advancing Homeland Security

    Science.gov (United States)

    2011-07-01

    understanding they need to make decisions. Many articles have addressed the tangled web of homeland security issues in terms of authorities, bud- gets , or...directly impact public safety. Despite significant strides since 9/11, decision makers at all levels still do not get the information they need when...Texas Law Review, Vol. 88, p. 1854. 7. Merrie Archer, “The Whole of Government Planning Process,” U.S. Department of State, Washington, D.C., 18

  9. The Fire Service’s Role in Maritime Homeland Security

    Science.gov (United States)

    2011-03-01

    homeland security partners, information sharing, planning and ferry/ cruise ship response. Leaders from other federal and local agencies that have a role...explosion on a cruise ship or ferryboat will require a fire boat, response vessels and specialized training. Currently, the ability of first...responders to work with cruise ships is at the discretion of the cruise ship operators as most of these vessels are foreign flagged and local governments

  10. Homeland security: sharing and managing critical incident information

    Science.gov (United States)

    Ashley, W. R., III

    2003-09-01

    Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.

  11. Unmanned Aircraft Systems: A Logical Choice for Homeland Security Support

    Science.gov (United States)

    2011-12-01

    AIRSPACE Some have likened the airspace above the U.S. to a soap opera plot due to its complexity and elaborate structure.59 However, understanding its...applicable to define an ELOS for UAS.” 23 Fourth, there is a public education aspect to UAS integration that analysts claim requires attention. The

  12. Application of Near-Space Passive Radar for Homeland Security

    Science.gov (United States)

    Wang, Wenqin

    2007-03-01

    To protect the homeland from terrorist attacks employing explosive devices, revolutionary advances across a wide range of technologies are required. Inspired by recent advances in near-space (defined as the region between 20 km and 100 km), this paper proposes a new passive radar system using opportunistic transmitter as an illuminator and near-space platform as a receiver. This concept differs substantially from current radars. This system can be operated as a passive bistatic or multistatic radar and hence largely immune to jamming. By placing the receiver in near-space platforms, many functions that are currently performed with satellites or airplanes could be performed much more cheaply and with much greater operational utility. These advantages make near-space passive attractive for a variety of applications, many of which fit well with the needs of homeland security. This paper details the role of near-space passive radar as sensor system that can support homeland security applications. The strengths and weakness of near-space passive radar, compared to current spaceborne and airborne radars, are detailed. The signal models and processing algorithms for near-space passive radar are provided. It is shown that the use of cost effective near-space platforms can provide the solutions that were previously thought to be out of reach to remote sensing and government customers.

  13. Exploring Security Vulnerabilities of Unmanned Aerial Vehicles

    NARCIS (Netherlands)

    Rodday, Nils Miro; O. Schmidt, de Ricardo; Pras, Aiko

    2016-01-01

    We are currently observing a significant increase in the popularity of Unmanned Aerial Vehicles (UAVs), popularly also known by their generic term drones. This is not only the case for recreational UAVs, that one can acquire for a few hundred dollars, but also for more sophisticated ones, namely pro

  14. Exploring Security Vulnerabilities of Unmanned Aerial Vehicles

    NARCIS (Netherlands)

    Rodday, Nils Miro; de Oliveira Schmidt, R.; Pras, Aiko

    2016-01-01

    We are currently observing a significant increase in the popularity of Unmanned Aerial Vehicles (UAVs), popularly also known by their generic term drones. This is not only the case for recreational UAVs, that one can acquire for a few hundred dollars, but also for more sophisticated ones, namely pro

  15. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed...-036, Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6036....

  16. System-on-chip-centric unattended embedded sensors in homeland security and defense applications

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin; Shih, Min-Yi; Walter, Kevin; Lee, Kang; Gans, Eric; Esterkin, Vladimir

    2009-05-01

    System-on-chip (SoC) single-die electronic integrated circuit (IC) integration has recently been attracting a great deal of attention, due to its high modularity, universality, and relatively low fabrication cost. The SoC also has low power consumption and it is naturally suited to being a base for integration of embedded sensors. Such sensors can run unattended, and can be either commercial off-the-shelf (COTS) electronic, COTS microelectromechanical systems (MEMS), or optical-COTS or produced in house (i.e., at Physical Optics Corporation, POC). In the version with the simplest electronic packaging, they can be integrated with low-power wireless RF that can communicate with a central processing unit (CPU) integrated in-house and installed on the specific platform of interest. Such a platform can be a human body (for e-clothing), unmanned aerial vehicle (UAV), unmanned ground vehicle (UGV), or many others. In this paper we discuss SoC-centric embedded unattended sensors in Homeland Security and military applications, including specific application scenarios (or CONOPS). In one specific example, we analyze an embedded polarization optical sensor produced in house, including generalized Lambertian light-emitting diode (LED) sources and secondary nonimaging optics (NIO).

  17. Field-Capable Biodetection Devices for Homeland Security Missions

    Energy Technology Data Exchange (ETDEWEB)

    Dougherty, G M; Clague, D S; Miles, R R

    2007-04-05

    Biodetection instrumentation that is capable of functioning effectively outside the controlled laboratory environment is critical for the detection of health threats, and is a crucial technology for Health Security. Experience in bringing technologies from the basic research laboratory to integrated fieldable instruments suggests lessons for the engineering of these systems. This overview will cover several classes of such devices, with examples from systems developed for homeland security missions by Lawrence Livermore National Laboratory (LLNL). Recent trends suggest that front-end sample processing is becoming a critical performance-determining factor for many classes of fieldable biodetection devices. This paper introduces some results of a recent study that was undertaken to assess the requirements and potential technologies for next-generation integrated sample processing.

  18. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting...

  19. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY: The Secretary of Homeland Security has determined that...

  20. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... Management Agency--006 Citizen Corps Database'' and retitle it ``Department of Homeland Security/ Federal... System name: DHS/FEMA--006 Citizen Corps Program Security classification: Unclassified. System location... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal...

  1. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS... Security Information Network Advisory Committee (HSINAC) will meet on Tuesday, June 25th, 2013 from 1 p.m...: http://www.dhs.gov/homeland-security-information-network-advisory-committee . There is a meeting...

  2. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Undue influence upon Department of Homeland... Brokers § 111.34 Undue influence upon Department of Homeland Security employees. A broker must not influence or attempt to influence the conduct of any representative of the Department of Homeland Security...

  3. Test of radiation detectors used in homeland security applications.

    Science.gov (United States)

    Pibida, L; Minniti, R; O'Brien, M; Unterweger, M

    2005-05-01

    This work was performed as part of the National Institute of Standards and Technology (NIST) program to support the development of the new American National Standards Institute (ANSI) standards N42.32-2003 and N42.33-2003 for hand-held detectors, and personal electronic dosimeters, as well as to support the Office of Law Enforcement Standards (OLES) and the Department of Homeland Security (DHS) in testing these types of detectors for their use by first responders. These instruments are required to operate over a photon energy range of 60 keV to 1.33 MeV and over a wide range of air-kerma rates. The performance and response of various radiation detectors, purchased by the NIST, was recorded when placed in 60Co, 137Cs, and x-ray beams at different air-kerma rates. The measurements described in this report were performed at the NIST x-ray and gamma-ray radiation calibration facilities. The instruments' response (exposure or dose rate readings) shows strong energy dependence but almost no dependence to different air-kerma rates. The data here reported provide a benchmark in support of current protocols that are being developed for radiation detection instrumentation used in homeland security applications. A future plan is to test these devices, plus other commercially available detectors, against ANSI standards N42.32-2003 and N42.33-2003.

  4. Nuclear Theory for Astrophysics, Stockpile Stewardship, and Homeland Security

    Science.gov (United States)

    Hayes, Anna

    2004-10-01

    A large number of problems key to astrophysics, stockpile stewardship, and homeland defense rely on knowledge of nuclear physics in regimes inaccessible to experiment. In stellar and nuclear explosions unstable nuclei and nuclear isomers are produced in copious quantities and are used to diagnose the explosion. Similarly, analysis of the unstable nuclei from the debris will be key to attribution in the event of a terrorist domestic nuclear attack. In the case of nuclear non-proliferation a number of new schemes are being considered by the IAEA to address the ever greater needs, including neutrino monitoring of the plutonium content of reactors. For all of these problems detailed nuclear theory is required. In this talk I discuss the theoretical physics needs for the type of problems of overlapping interest to astrophysics and national security.

  5. Pulse-shape discrimination scintillators for homeland security applications

    Science.gov (United States)

    Ellis, Mark E.; Duroe, Kirk; Kendall, Paul A.

    2016-09-01

    An extensive programme of research has been conducted for scintillation liquids and plastics capable of neutron-gamma discrimination for deployment in future passive and active Homeland Security systems to provide protection against radiological and nuclear threats. The more established detection materials such as EJ-301 and EJ-309 are compared with novel materials such as EJ-299-33 and p-terphenyl. This research also explores the benefits that can be gained from improvements in the analogue-to-digital sampling rate and sample bit resolution. Results are presented on the Pulse Shape Discrimination performance of various detector and data acquisition combinations and how optimum configurations from these studies have been developed into field-ready detector arrays. Early results from application-specific experimental configurations of multi-element detector arrays are presented.

  6. The Impact of Organizational Culture on the Sharing of Homeland Security Information

    Science.gov (United States)

    2008-04-04

    IMPACT OF ORGANIZATIONAL CULTURE ON THE SHARING OF HOMELAND SECURITY INFORMATION By Jeffery E. Bradey GS-15, Department of Defense...information sharing tool. 15. SUBJECT TERMS organizational culture , Homeland Security Information Network, information sharing 16. SECURITY...41 Organizational Culture .................................................................................................. 41

  7. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and Technology Directorate, DHS..., 56662-56663 that the Homeland Security Science and Technology Advisory Committee (HSSTAC) would meet on... will be held at the Department of Homeland Security (DHS), Science and Technology Directorate, 1120...

  8. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    Science.gov (United States)

    2013-05-24

    Future of Homeland Security,” FDCH Congressional Testimony (July 12, 2012): Military & Government Collection, EBSCOhost , 2, (accessed July 31, 2012...Government Collection, EBSCOhost , 1, (accessed July 31, 2012). 12 U.S. Department of Homeland Security, Department of Homeland Security Strategic Plan...Department’s Roles/Missions,” FDCH Political Transcripts (n.d.): Military & Government Collection, EBSCOhost , 8, (accessed July 31, 2012). 14 Don Harvey and

  9. Wearable high-tech gear for homeland security personnel

    Science.gov (United States)

    Venkateswarlu, Ronda; Hui Wei, Choo; Li Lian, Ngiam; Lim, E. T.; Zhu, Zijian; Yang, Mingjiang

    2006-05-01

    Recent homeland security problems in various countries indicate that fixed surveillance systems at important places are not adequate enough. As the security threats take new dimensions in future, mobile smart security personnel wearing high-tech gear will form the basic infrastructure. See first, listen first, detect first, track first, communicate first with peers, assess the threat and coordinate with security head-quarters are the functions of high-tech gear. This paper proposes a high-tech gear involving (i) hands-free and obtrusion-free textile-based wearable microphone array to capture users voice and interface with body-worn computer, (ii) microphone arrays embedded in textiles to listen and record others voices from a distance, (iii) miniature cameras embedded in the shirt to provide the user with omni vision (iv) wireless personal display as GUI hidden in textile or natural glasses, (v) GPS and body area network for positional awareness for information in the form of text or textile integrated, (vi) reconfigurable HW/SW for all the above functions configured in the form of a usual belt. The main focus of this paper is how to configure the high-tech gear with all these sophisticated functions to disappear into the natural wearables of the user giving him normal look in the public. This project is sponsored by Defence Science & Technology Agency, Ministry of Defence, Singapore. This paper covers multi-discipline technologies at system level, hence not possible to go into details of any subsystem. The main objective of this paper is to share our thoughts and get feedback. Progress and some critical design issues are discussed in this paper.

  10. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... Administration-015 Registered Traveler Operations Files (November 8, 2005, 69 FR 67735), which was written to...)-015 Registered Traveler (RT) Operations File Files (November 8, 2005, 69 FR 67735), which was written... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland...

  11. Fire Stations - FIRE_STATIONS_HSIP_IDHS_IN: Fire Stations in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — FIRE_STATIONS_HSIP_IDHS_IN is a point shapefile that contains locations of fire station, as developed for the Homeland Security Infrastructure Program (HSIP). The...

  12. Hospitals - HOSPITALS_HSIP_IDHS_IN: Hospitals in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — HOSPITALS_HSIP_IDHS_IN is a point shapefile that contains hospital locations, as developed for the Homeland Security Infrastructure Program (HSIP). The data were...

  13. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science...

  14. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    Constitution. From the requirement for Congress to appropriate money before the executive branch can spend it, to the advice and consent given by the...addressed and improve bills. a. Recommendation 14 The homeland security committees should take any parliamentary actions that will help them secure... parliamentary actions that will help them secure larger jurisdiction over homeland security topics. 101 APPENDIX B. HURRICANE KATRINA HEARINGS Date

  15. How Should Municipal Police Agencies Participate in America’s Homeland Security Strategy?

    Science.gov (United States)

    2008-12-01

    from a decidedly federal approach to a municipal orientation. After all, Thomas Ridge, former director of the department of Homeland Security, said...policy or operating procedures is 82 Remarks By Homeland Security Director Thomas Ridge to...R. Mauborgne. Blue Ocean Strategy. Massachusetts: Harvard Business School Press, 2005. Laqueur , Walter. The New Terrorism: Fanaticism and the Arms

  16. Defining the Role and Responsibility of the Fire Service Within Homeland Security

    Science.gov (United States)

    2010-03-01

    High Low Strategy Canvas : The Fire Service’s Approach to Homeland Security Eliminate Raise Reduce Create A Holistic Approach to Homeland Security Red...The starfish and the spider : The unstoppable power of leaderless organizations. London, England: Penguin Books Ltd. Bryson, J. (2004). Strategic

  17. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    Science.gov (United States)

    2007-09-01

    Rosell, Richard, “2007 Troop “C” Strategic Plan”. Hamilton: NJSP, 2007. Schwarzenegger , Arnold . California State Homeland Security Strategy...Strategy’s CMA do not contain goals. Arnold Schwartzenegger, The California Homeland Security Strategy. (Sacramento: Office of the Governor, 2005

  18. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  19. 76 FR 19107 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-011...

    Science.gov (United States)

    2011-04-06

    ...In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department of Homeland Security system of records titled, ``Department of Homeland Security Federal Emergency Management Agency--011 Training and Exercise Program Records System of Records.'' This system of records will allow the Department of Homeland Security/Federal Emergency Management Agency to collect and maintain records on its training and exercise programs. This system of records will include the personally identifiable information of current and former Federal Emergency Management Agency employees and contractors, current and former members of the first responder and emergency management communities, and others who have applied or registered to participate in or who have assisted with Federal Emergency Management Agency's training and exercise programs. The Department of Homeland Security is issuing a Notice of Proposed Rulemaking, to exempt this system of records from certain provisions of the Privacy Act, elsewhere in the Federal Register. In addition, in accordance with the Privacy Act of 1974 the Department of Homeland Security is giving notice that it proposes to consolidate the Privacy Act system of records notice titled, Department of Homeland Security/ Federal Emergency Management Agency/National Emergency Training Center--017 Student Application and Registration Records system of records (October 5, 2004, 69 FR 192) into this system of records. This newly established system will be included in the Department of Homeland Security's inventory of record systems.

  20. 75 FR 41097 - Homeland Security Acquisition Regulation; Lead System Integrators [HSAR Case 2009-003

    Science.gov (United States)

    2010-07-15

    ...The Department of Homeland Security (DHS) is issuing an interim rule amending the Homeland Security Acquisition Regulation (HSAR) to implement section 6405 of the U.S. Troop Readiness, Veterans' Care, Katrina Recovery, and Iraq Accountability Appropriations Act, 2007. This section of the Act and these implementing regulations restrict contractors from acting as lead system integrators in the......

  1. 75 FR 55335 - Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information...

    Science.gov (United States)

    2010-09-10

    ... private sector. Additionally, the Department of Homeland Security is issuing a Notice of Proposed... SECURITY Office of the Secretary Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security... the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department...

  2. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... Security Management System of Records AGENCY: Privacy Office; DHS. ACTION: Notice of Privacy Act system of... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... routine uses of this system have been reviewed and updated to reflect the personnel security...

  3. The National Guard and its Role in Homeland Security

    Science.gov (United States)

    2007-11-02

    Mobilizing Against Terrorism," CQ Weekly 57, no. 10 (6 March 99) 522 [ database on-line]; available from EBSCOhost ; accessed 8 September 2001. 34 Alan Ferber...November 2001. 6 Ibid. ś Kevin Stringer, "A Homeland Defense Mission," Military Review 80 (May/June 2000) 98 [ database on-line]; available from UMI...Implications for Homeland Defense," Abstract from Air University Research Database ; available from http://au.af.mil/au/ database /research/ay2001/affp

  4. Evaluating Novel Threats to the Homeland. Unmanned Aerial Vehicles and Cruise Missiles

    Science.gov (United States)

    2008-01-01

    available from www.rand.org as a public service of the RAND Corporation. 6Jump down to document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND...device, and selection of the desired altitude could simply require identifying on which floor of a skyscraper the device should be placed for the attack...Defense and Energy Research and Development Agency, 1977. Gormley, Dennis M., “Globalization and WMD Proliferation Networks: The Case of Unmanned Air

  5. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Science.gov (United States)

    2010-04-01

    ... authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY § 0.2 All other CBP regulations issued under the authority of the Department of Homeland Security. (a...

  6. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... and future leadership, employees, and the public about the history of the Department. DHS is... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--027 The History..., Department of Homeland Security-2004- 0004 Oral History Program: The History of the Department of Homeland...

  7. 41 CFR 102-73.196 - What types of special purpose space may the Department of Homeland Security lease?

    Science.gov (United States)

    2010-07-01

    ... purpose space may the Department of Homeland Security lease? 102-73.196 Section 102-73.196 Public... Delegations § 102-73.196 What types of special purpose space may the Department of Homeland Security lease? The Department of Homeland Security is delegated authority to lease whatever space its...

  8. Solving Homeland Security’s Wicked Problems: A Design Thinking Approach

    Science.gov (United States)

    2015-09-01

    business innovation research, futures and forecasting , prize authority, business accelerators, and engagement with industry, international...tackle homeland security’s complex problems. 14. SUBJECT TERMS design thinking, innovation , DHS S&T, Department of Homeland Security, science and...design thinking? .......................................................................................16 a. Innovation Labs

  9. An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.

  10. Intelligence-Led Risk Management for Homeland Security: A Collaborative Approach for a Common Goal

    Science.gov (United States)

    2011-12-01

    and how they will be disseminated. The intelligence analysis/production step and risk analysis/production step represent a codependent ...NEED FOR COLLABORATION IN RISK MANAGEMENT Risk management and intelligence within the homeland security context share a codependent relationship

  11. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... terrorists, drug cartel leaders or other persons known to have been involved in major crimes or terror of... to Homeland Security; and Known terrorists, drug cartel leaders or other persons known to have...

  12. Groupthink: a significant threat to the homeland security of the United States

    OpenAIRE

    Ricciuti, James E.

    2014-01-01

    Approved for public release; distribution is unlimited The groupthink psychological phenomenon prevalent in the homeland security enterprise is a significant threat to the United States. Homeland security is vulnerable to groupthink because its leaders frequently share similar backgrounds, work histories, and world-views. This similarity minimizes the chance of outside perspectives being introduced to the decision-making process, which insulates leadership from external ideas. This researc...

  13. Homeland Security Vulnerabilities Of The US National Capital Region’s Bridges

    Science.gov (United States)

    2016-06-10

    THE HOMELAND SECURITY VULNERABILITIES OF THE US NATIONAL CAPITAL REGION’S BRIDGES A thesis presented to the Faculty of the U.S...AUG 2015 – JUNE 2016 4. TITLE AND SUBTITLE The Homeland Security Vulnerabilities of the US National Capital Region’s Bridges 5a. CONTRACT...SUPPLEMENTARY NOTES 14. ABSTRACT The National Capital Region (NCR) is plagued by the same critical infrastructure vulnerabilities, disrepair, and

  14. Bureaucracies, communities and networks : interagency cooperation for Homeland Security In Monterey County

    OpenAIRE

    Scott, Gerald R.

    2003-01-01

    Approved for public release; distribution is unlimited. The federal government has undertaken a massive reorganization in order to create the Department of Homeland Security, and a parallel debate over how to organize homeland security functions has arisen at the State and Local government levels. In a time of severe budget constraints and rapidly changing threats, governments at all levels recognize the need for multiple government agencies, the private sector and nongovernmental organiza...

  15. Integrating statewide research and education resources for homeland security: the State University System of Florida Consortium on Homeland Security (Invited Paper)

    Science.gov (United States)

    Pearson, James E.; Olson, Peter J.

    2005-05-01

    The eleven universities of the State University System of Florida (SUS-FL) have established a consortium to address the full range of homeland security and domestic preparedness requirements for both Florida and the U.S. The Consortium has established the Florida Homeland Security Institute to provide an effective and efficient mechanism to coordinate, mobilize, combine, and form into teams the diverse, cross-disciplinary expertise, facilities, and established large base of technology development activities within the SUS-FL institutions and their established associates at industrial companies, governmental labs, and other universities. The Florida Consortium and Institute may provide a model for other state university systems for how to combine established resources effectively to address specific homeland security and domestic preparedness needs. This paper describes the Consortium and Institute goals, structure, and operations, with examples of how it has functioned in its brief existence as an effective mechanism for integrating the wide range of university, industry, and government capabilities within the state for addressing homeland security requirements.

  16. Curriculum Evaluation and Revision in a Nascent Field: The Utility of the Retrospective Pretest-Posttest Model in a Homeland Security Program of Study

    Science.gov (United States)

    Pelfrey, William V., Sr.; Pelfrey, William V., Jr.

    2009-01-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent…

  17. Ethernet-based integrated surveillance system for homeland security and homeland defense

    Science.gov (United States)

    Schooley, Michael G.; Thompson, Dean

    2004-09-01

    This report documents the results of an internal DRS effort to develop an Ethernet based integrated defense system to improve defense of cities, harbors, airports, power production, energy supplies, bridges, monuments, dams and so forth. Results of the integration of multiple SCOUT LPI radars and multiple Electro-optical targeting systems will be provided, illustrating the benefits of interfacing surveillance radars with imaging sensors to confirm detection and provide visual recognition and identification. An analysis of the handover errors will be provided including errors due to; sensor platforms location and orientation uncertainty, target location measurement errors, data latency and motion prediction errors, which contribute to target handoff and the re-acquisition timeline. These predictions will be compared to measured results. The system architecture will be defined including; security, support for both stationary and moving sensor platforms, remote control of sensor systems and distribution of imagery through the network and remote diagnostics, maintenance and software upgrades. Growth capabilities include secure wireless communication to/from moving platforms, integration with sonar and seismic sensors, cooperative location of friendly forces and acoustic detection and triangulation of gunshots with automated cueing of sensors and security forces to the shooters most probable location. The use of ad hoc multi-hopping wireless networking supplements hardwire networks, augments disaster response capabilities, provides high-speed communications for moving platforms and supplements GPS outage areas.

  18. An exploratory risk perception study of attitudes toward homeland security systems.

    Science.gov (United States)

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  19. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... NICCS Portal is a national online resource for cybersecurity awareness, education, talent management... following Information Collection Request (ICR) to the Office of Management and Budget (OMB) for review and... Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security Presidential Directive (HSPD)...

  20. Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding

    Science.gov (United States)

    2015-12-01

    case study of the United Kingdom’s grant allocation approach provides a comparative analysis for DHS funding. Components of the UK’s allocation...the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL December 2015...38 V. UNITED KINGDOM CASE STUDY ................................................................41 A. UNITED KINGDOM APPROACH

  1. Management of the Severely Mentally Ill and Its Effects on Homeland Security

    Science.gov (United States)

    2011-09-01

    Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from...waiting. Gang and graffiti calls Public Intoxication calls, some of which may be a result of the mentally ill. The process the go through when dealing

  2. Integrating Local Public Health Agencies into the Homeland Security Community

    Science.gov (United States)

    2007-03-01

    public health needs that require attention (such as poor prenatal health, teen pregnancy , and sexually transmitted diseases) it is not difficult to...Security objectives. It also assumes that war and terrorism are the sole results of poor health, nutrition , and housing, while ignoring other

  3. Department of Defense Homeland Security Joint Operating Concept

    Science.gov (United States)

    2004-02-01

    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while...security, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  4. Defense and Homeland Security Applications of Multi-Agent Simulations

    Science.gov (United States)

    2007-12-01

    Monterey, CA 93943-5219, U.S.A. Felix Martinez Wargaming Department Centro de Estudios Superiores Navales Mexico, D.F. 04840, MEXICO Lisa R...critical asset, Petroleos Mexicano (PE- MEX) and the Mexican Navy maintain mutually supportive security strategies in the Campeche Sound. During a state of

  5. Achieving Homeland Security in a Time of Diminishing Resources

    Science.gov (United States)

    2012-06-08

    Kristine L. Shelstad, “The Domestic Security Command–The Evolution of the U.S. Northern Command” (Master’s Thesis, Naval Postgraduate School, Monterrey , CA...through the use of economic, diplomatic, military, and political power. 59 BIBLIOGRAPHY Books Turabian, Kate L. A Manual for Writers of Term

  6. Homeland security R&D roadmapping : risk-based methodological options.

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  7. Interagency Collaboration Challenges Among Homeland Security Disciplines in Urban Areas

    Science.gov (United States)

    2006-03-01

    Strategic National Stockpile SPD Seattle Police Department SPOC Seattle Police Operations Center SWAT Special Weapons and Tactics xix TCL Target...established a command post at their Seattle Police Operations Center ( SPOC ) and not at the incident site. The SPOC is a secure police facility and its choice...https://www.chds.us/public.php?met. Christopher Bellavita, online class forum discussion with the author, January, 2006, https://www.chds.us/ courses

  8. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    Science.gov (United States)

    2009-09-01

    Thesis Advisor Glen Woodbury Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security Affairs iv THIS PAGE...Barry Berman and Joel R. Evans define gap analysis as the tool that “Enables a company to compare its actual performance against its potential...Management: A Strategic Approach 7/E, Barry Berman and Joel R Evans,” Prentice Hall, http://www.prenhall.com/rm_student/html/start.html (accessed

  9. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors ...magazine-feature-article-september-2014. pdf ?sfvrsn=2, 12. 2 “Copper Theft Threatens U.S. Critical Infrastructure,” Federal Bureau of Investigation...www.nerc.com/files/6_Dabdoub_10-20_v2. pdf . 10 Jasvir Gill, Continuous Monitoring: A New Approach to Secure Critical Infrastructure (Atlanta, GA: North

  10. Homeland Security: Implications for Information Policy and Practice--First Appraisal.

    Science.gov (United States)

    Feinberg, Lotte E.

    2002-01-01

    Discusses information policy in the wake of the September 11 terrorist attacks. Topics include access to government records, including Freedom of Information Act issues; removing or expanding information on government Web sites; state actions; coordination versus secrecy in homeland security; and patterns and trends in federal and state…

  11. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... (OPS), including the National Operations Center (NOC), proposes to establish a new DHS system of... Fusion System of Records.'' This system of records will allow DHS/OPS, including the NOC, to collect... natural disasters. The NOC serves as the nation's homeland security center for information sharing...

  12. 75 FR 32723 - Revision of Department of Homeland Security Acquisition Regulation; Limitations on Subcontracting...

    Science.gov (United States)

    2010-06-09

    ... National Operations Center (NOC), through the National Response Coordination Center (NRCC), coordinates the... the National Operations Center (NOC). Requests include a summary of the situation, types and amount of..., the Secretary of Homeland Security issues an operations order to the NOC. The NOC, through the...

  13. Citizenship and Terrorism: The Significance of a Pathway to Citizenship on Homeland Security

    Science.gov (United States)

    2014-03-01

    question: How would providing a pathway to citizenship for the illegal immigrant population of the United States affect homeland security with respect to... illegal immigrant , and non- immigrating foreigner. An analysis of terrorism defined by the categories of citizenship status and estimated population...domestic terrorism. 14. SUBJECT TERMS Citizenship, terrorism, comprehensive immigration reform, illegal immigrant , pathway to citizenship

  14. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-05-13

    ....S. Coast Guard--008 Courts Martial Case Files System of Records AGENCY: Privacy Office, DHS. ACTION..., ``Department of Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from... Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records from one or...

  15. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ... Protection-003 Credit/Debit Care Data System of Records'' and this proposed rulemaking. In this proposed...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Care...

  16. The National Guard -- DOD’s Logical Homeland Security "First Responder" for the 21st Century

    Science.gov (United States)

    2005-01-01

    Virginia 22134-5068 FUTURE WAR PAPER TITLE: THE NATIONAL GUARD – DOD’S LOGICAL HOMELAND SECURITY “ FIRST RESPONDER ” FOR THE 21ST...INCLUDE THE FOREGOING STATEMENT. EXECUTIVE SUMMARY TITLE: THE NATIONAL GUARD – DOD’S LOGICAL HOMELAND SECURITY “ FIRST RESPONDER ” FOR THE 21ST

  17. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... Security Administration--011, Transportation Security Intelligence Service Operations Files Systems of... Administration--011 Transportation Security Intelligence Service Operations Files previously published on... Security Intelligence Service (TSIS) Operations Files System of Records (69 FR 71828, December 10,...

  18. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  19. Status Summary of 3He and Neutron Detection Alternatives for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Kouzes, Richard T.; Ely, James H.

    2010-04-28

    This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

  20. An Agent-Based Approach for Data Fusion in Homeland Security

    Directory of Open Access Journals (Sweden)

    Rafael de Solís Montes

    2013-09-01

    Full Text Available This article presents an agent-based solution for data fusion in Homeland Security. Communication technology has been developed very fast in the last decades. We can get lots of data in milliseconds. Our current problem is to process such amounts of data in order to provide useful information. We have to focus our effort on developing intelligent information systems able to handle big amounts of data extracting or revealing relations among data and able to produce information easily understandable for the human user. That is the case of data fusion in tactical operations, especially in the field of defense and Homeland security. Our research is focused on obtaining a Multi-agent system able to inference future enemy’s actions or behaviors from data received from heterogeneous sensors.

  1. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    Science.gov (United States)

    2009-03-01

    effectively. One of the primary functions of the GRT is to provide DHS with an electronic database to query in the event of a Congressional data call. In...we need an easy to ready catalog/ database of what resources (physical and non-physical) are available at the federal, state, regional, and local...Local Performance Regimes for Homeland Security.” Review of Policy Research 23, no. 1 (2006). Business Source Complete, EBSCOhost (accessed December 30

  2. Mission Command: Retooling the Leadership Paradigm for Homeland Security Crisis Response?

    Science.gov (United States)

    2015-03-01

    can be implemented by a homeland security organization. Fatal fires, such as 344 Francis Fukuyama , “America in Decay: The Sources of Political...Dysfunction,” Foreign Affairs (September–October 2014), accessed February 7, 2015, http://www.foreignaffairs.com/articles/141729/ francis - fukuyama /america...Bismark to Hitler, The Von Moltke Family’s Impact on German History. New York, Harper Collins, 1995. Fukuyama , Francis . “America in Decay: The

  3. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    Science.gov (United States)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  4. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    intergovernmental relations by using network theory means that the system should be based on linkages and interrelationships, rather than...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some... theory tells us that every relay doubles the noise and cuts the message in half. Also, change leadership requires the willingness and ability to change

  5. Formal Critiques and After Action Reports from Conventional Emergencies: Tools for Homeland Security Training and Education

    Science.gov (United States)

    2010-09-01

    Exercise Evaluation Guide EMS Emergency Medical Services HSEEP Homeland Security Exercise and Evaluation Program IAP Incident Action Plan IP...must not be dumped from the pedagogical learning model used primarily for childhood education into an andragorical model without orientation on how...reporting an explosion at a food processing plant is received. The initial responding companies confirm the report and identify the source of the

  6. The DoD Role in Homeland Security: Past, Present, and Future

    Science.gov (United States)

    2013-03-01

    specifically chartered to address homeland security was the Council of National Defense ( CND ). The CND was established as an emergency agency by...responsibilities to state governments. On April 9, 1917, the CND chairman requested all Governors establish councils of defense.9 The armistice of 1918 prompted...councils to disband and CND operations were suspended on June 30, 1921.10 A parallel pattern emerged during World War II. Most wartime

  7. Of Nasa and Neanderthals, Elephants and Machines: Metaphors and the Conceptualization of Homeland Security

    Science.gov (United States)

    2013-12-01

    favor of the pursuit of knowledge. Charles Darwin , genius though he was, was not a sharp mathematician183 but had he been so, he would have realized...is crucial since, as Charles Darwin understood, selection as the instrument for evolution can only work if there are different characteristics from... Charles Darwin Can Teach Tom Ridge about Homeland Security,” Foreign Policy (September–October 2003): 69. 292. Johanson and Wong, Lucy’s Legacy, 248. 293

  8. Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter

    Science.gov (United States)

    2007-06-01

    Bringing HPC to the First Responder and Warfighter DISTRIBUTION: Approved for public release, distribution unlimited This paper is part of the following...thru ADP023803 UNCLASSIFIED Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter Gopal Patnaik and...Urban AerodynamicsE1 3, these models are now the fidelity and accuracy of CFD to the first responder or commonly applied to predict contaminant

  9. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-08

    ... race, ethnicity, or religion, by employees and officials of the Department of Homeland Security. The.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it);...

  10. Enabling private and public sector organizations as agents of homeland security

    Science.gov (United States)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  11. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    Science.gov (United States)

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  12. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  13. Impact of Homeland Security Alert level on calls to a law enforcement peer support hotline.

    Science.gov (United States)

    Omer, Saad B; Barnett, Daniel J; Castellano, Cherie; Wierzba, Rachel K; Hiremath, Girish S; Balicer, Ran D; Everly, George S

    2007-01-01

    The Homeland Security Advisory System (HSAS) was established by the Department of Homeland Security to communicate the risk of a terrorist event. In order to explore the potential psychological impacts of HSAS we analyzed the effects of terror alerts on the law enforcement community. We used data from the New Jersey Cop 2 Cop crisis intervention hotline. Incidence Rate Ratios--interpreted as average relative increases in the daily number of calls to the Cop 2 Cop hotline during an increased alert period--were computed from Poisson models. The hotline received a total of 4,145 initial calls during the study period. The mean daily number of calls was higher during alert level elevation compared to prior 7 days (7.68 vs. 8.00). In the Poisson regression analysis, the Incidence Rate Ratios of number of calls received during elevated alert levels compared to the reference period of seven days preceding each change in alert were close to 1, with confidence intervals crossing 1 (i.e. not statistically significant) for all lag periods evaluated. This investigation, in the context of New Jersey law enforcement personnel, does not support the concern that elevating the alert status places undue stress upon alert recipients.

  14. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Madhavi Z [ORNL; Wullschleger, Stan D [ORNL; Vass, Arpad Alexander [ORNL; Martin, Rodger Carl [ORNL; Grissino-Mayer, Henri [ORNL

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  15. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ... Transportation Security Administration. Information in this system also includes records related to the... occurred during passenger or property screening would be covered by this system. Portions of this system... information system of records has been compromised. Another routine use permits the release of information to...

  16. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    outlines a holistic community preparedness approach to securing the nation. “The national preparedness system shall be designed to help guide the domestic...failed its first test.”40 As the horror of Hurricane Katrina was being witnessed globally, so too was the issue of leadership, specifically, who was in...have impacted multiple in-groups to include patriotic Bostonians, concerned Muslim-Americans, and those who felt the need to revisit the horror of 9

  17. DHS Workshop -- Homeland Security: New Challenges for Decision Making Under Uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, R; Edmunds, T; Howarth, S

    2004-02-20

    A workshop addressing the decision-making challenges confronted by the United States Department of Homeland Security (DHS) in the face of large uncertainties, complex value systems, and multiple stakeholders was held November 13-14, 2003, in Washington, D.C. Forty-six participants drawn from the DHS, other government agencies, universities, national laboratories, and the private sector attended the workshop. The goals were: (1) to develop a common understanding of the range of decisions DHS program elements must make; (2) to review selected examples of decision processes and approaches used by other organizations for similarly complex problems; and (3) to recommend steps DHS can take to ensure high quality decision making. The workshop brought together diverse perspectives on decision making in the context of complex risks. Participants included those who must make decisions affecting homeland security, those who have faced risky decisions in other domains, and those who have developed theoretical and practical approaches to high quality decision-making. The workshop was sponsored by the Science & Technology (S&T) Directorate, but was intended to address issues of concern to the three DHS operating directorates as well as S&T. The purpose of this breadth was to identify areas in which S&T capabilities and resources could be valuable to DHS as a whole. The workshop consisted of three main segments: (1) Presentations by managers from DHS Directorates, reflecting the diverse nature of decision making across DHS; (2) Presentations on four alternative approaches used to address problems in both government (counter-terrorism R&D investment; identification of critical capabilities in bioterrorism) and the private sector (corporate strategy development; terrorism insurance); and (3) Breakout groups chartered to identify barriers and propose actions to address them, in each of five decision classes: (1) Portfolio management; (2) Grant allocation; (3) Critical one

  18. 76 FR 24901 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-002...

    Science.gov (United States)

    2011-05-03

    ... Homeland Security's inventory of record system. DATES: Submit comments on or before on or before June 2... contain Department of Transportation-required Substance Abuse evaluations and USCG Sexual Abuse Prevention... software tools which ensure the protection of the confidential information by making reconstruction...

  19. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... us. DHS will disclose two separate data files through a computer matching operation for our use in... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security... an existing computer matching program that will expire on July 18, 2012. SUMMARY: In accordance...

  20. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... unintended changes this action makes in DHS policies and procedures for drug-free workplaces. All comments or.... Adopting the OMB guidance in place of the common rule will not substantively change the drug-free workplace... Implementation of OMB Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS...

  1. Introducing the Future Now: Using Memetics and Popular Culture to Identify the Post-9/11 Homeland Security Zeitgeist

    Science.gov (United States)

    2008-03-01

    becoming an increasingly “ hieroglyphic civilization.”37 This characterization is even more appropriate today. Ann Marie Seward Barry argues that we live...original official purpose to become a hieroglyphic with rich cultural meaning. No other meme related to homeland security has permeated our popular

  2. Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

    2009-06-17

    Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

  3. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    Science.gov (United States)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  4. Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system

    Science.gov (United States)

    Antony, Richard T.; Karakowski, Joseph A.

    2010-04-01

    A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.

  5. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    Energy Technology Data Exchange (ETDEWEB)

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  6. Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security

    Science.gov (United States)

    Yilmaz, Bahadır.

    2013-06-01

    Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.

  7. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  8. An Examination of Four Successes in the Coast Guard’s Innovation Program and Implications for Innovation within Homeland Security

    Science.gov (United States)

    2008-03-01

    Elixir guitar strings, and approximately 1,000 other products .32 Prior to founding Gore and Associates, Bill Gore spent seventeen years working for...and local government agencies, and private entities supporting government homeland security operations. The product of this research is an analysis...literature conveys when it calls innovation: The creation, development and implementation of a new product , process or service, with the aim of

  9. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    Science.gov (United States)

    2012-12-01

    Gail F. Thomas, and Erik Jansen , “Building Collaborative Capacity: An Innovative Strategy for Homeland Security Preparedness,” in Advances in...Intelligence Analysis (Washington DC: CQ Press, 2011), 123. 184 Ropert Bood and Theo Postma, “Scenario Analysis as a Strategic Management Tool” (Groningen...World Mirrors Life of Ecosystems.” Computer Reseller News (February 1996): 36. Bood, Ropert and Theo Postma. “Scenario Analysis as a Strategic

  10. Domestic Aerial Surveillance and Homeland Security: Should Americans Fear the Eye in the Sky?

    Science.gov (United States)

    2014-03-01

    70 Frost & Sullivan Industries, “Non-military Use of Unmanned Aerial Systems in the United States: Current and Future Opportunities in a...2011. http://www.washingtonpost.com/wp- dyn/content/article/2011/01/22/AR2011012204111.html. Frost and Sullivan Industries. “Non-military Use of

  11. Curriculum evaluation and revision in a nascent field: the utility of the retrospective pretest--posttest model in a homeland security program of study.

    Science.gov (United States)

    Pelfrey, William V; Pelfrey, William V

    2009-02-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent field, the establishment of a program curriculum was forced to draw from a variety of disciplines. Curriculum evaluation was complicated by the rapid changes occurring in the emerging discipline, producing response shift bias, and interfering with the pre-post assessments. To compensate for the validity threat associated with response shift bias, a retrospective pretest-posttest evaluative methodology was used. Data indicate the program has evolved in a significant and orderly fashion and these data support the use of this innovative evaluation approach in the development of any discipline.

  12. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... organizations; domestic security and emergency management officials; and private sector entities or individuals... governments and international organizations; domestic security and emergency management officials; and private... international officials; domestic security and emergency management officials; and private sector...

  13. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... security threat assessment of law enforcement, immigration, and intelligence databases, including a... agency to perform a security threat assessment. The security threat assessment will be used to identify... ] security threat assessment to identify individuals who present a low risk to transportation security....

  14. Federal Register: The President. Amendment of Executive Orders, and Other Actions, in Connection with the Transfer of Certain Functions to the Secretary of Homeland Security. Part 4

    National Research Council Canada - National Science Library

    Bush, George

    2003-01-01

    Act of 2002 (Public Law 107 296) and section 301 of title 3, United States Code, and in order to reflect the transfer of certain functions to, and other responsibilities vested in, the Secretary of Homeland Security, the transfer...

  15. HOMELAND SECURITY: Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance Goals

    Science.gov (United States)

    2004-05-01

    Office GAO May 2004 HOMELAND SECURITY Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated...Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance Goals 5a. CONTRACT NUMBER 5b...2004 HOMELAND SECURITY Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance

  16. Development of neutron/gamma generators and a polymer semiconductor detector for homeland security applications

    Science.gov (United States)

    King, Michael Joseph

    Instrumentation development is essential to the advancement and success of homeland security systems. Active interrogation techniques that scan luggage and cargo containers for shielded special nuclear materials or explosives hold great potential in halting further terrorist attacks. The development of more economical, compact and efficient source and radiation detection devices will facilitate scanning of all containers and luggage while maintaining high-throughput and low-false alarms Innovative ion sources were developed for two novel, specialized neutron generating devices and initial generator tests were performed. In addition, a low-energy acceleration gamma generator was developed and its performance characterized. Finally, an organic semiconductor was investigated for direct fast neutron detection. A main part of the thesis work was the development of ion sources, crucial components of the neutron/gamma generator development. The use of an externally-driven radio-frequency antenna allows the ion source to generate high beam currents with high, mono-atomic species fractions while maintaining low operating pressures, advantageous parameters for neutron generators. A dual "S" shaped induction antenna was developed to satisfy the high current and large extraction area requirements of the high-intensity neutron generator. The dual antenna arrangement generated a suitable current density of 28 mA/cm2 at practical RF power levels. The stringent requirements of the Pulsed Fast Neutron Transmission Spectroscopy neutron generator necessitated the development of a specialized ten window ion source of toroidal shape with a narrow neutron production target at its center. An innovative ten antenna arrangement with parallel capacitors was developed for driving the multi-antenna arrangement and uniform coupling of RF power to all ten antennas was achieved. To address the desire for low-impact, low-radiation dose active interrogation systems, research was performed on mono

  17. Groupthink: A Significant Threat to the Homeland Security of the United States

    Science.gov (United States)

    2014-12-01

    news/blogs/ ken - walshs-washington/2012/10/31/a-tale-of-two-storms-comparing-bush-and-obamas-hurricane-response. 142 Morton, Next–Generation Homeland... Wilber , “Dress Code Relaxed for Air Marshals,” Washington Post, August 25, 2006, http://www.washingtonpost.com/wp-dyn/content/article/2006/08/24...Koresh had told him that he knew the raid was imminent.235 According to BATF Special Agent Ken King, no alternative plan for peacefully serving the

  18. 77 FR 12606 - Homeland Security Academic Advisory Council; Establishment and Meeting

    Science.gov (United States)

    2012-03-01

    ... recruitment; international students; ] academic research; campus and community resiliency, security and... time of appointment by Department ethics officials. Individuals appointed for their expertise would be... committee has completed its business. ADDRESSES: The meeting will be held at the Ronald Reagan...

  19. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ..., Security and Authentication, and Network Evolution working groups. A more detailed agenda will be released... Commission will also provide audio and/or video coverage of the meeting over the Internet from the FCC's...

  20. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  1. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... public comment period may end before the time indicated, following the last call for comments. To... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge.... The agenda on December 5 focuses solely on the interaction between DHS S&T and Customs and...

  2. 76 FR 63206 - Supplemental Standards of Ethical Conduct for Employees of the Department of Homeland Security

    Science.gov (United States)

    2011-10-12

    ... (DAEO) to manage and coordinate the ethics programs within the Department's components and offices. B... by the DHS DAEO to manage and coordinate the ethics programs within the DHS components pursuant to... (FEMA); (2) Federal Law Enforcement Training Center; (3) Transportation Security Administration;...

  3. Homeland Security Department: FY2011 President’s Request for Appropriations

    Science.gov (United States)

    2010-04-15

    program, the National Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.87 Dr. Alexander G. Garza... Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.88 Issues for Congress BioWatch: Effectiveness and Deployment...20 23 Systems Acquisition 20 61 Radiation Portal Monitoring Program - 8 Securing the Cities 20 - Human Portable Radiation Detection

  4. 2010 Homeland Security Symposium and Exhibition Held in Arlington, Virginia on September 28-29, 2010

    Science.gov (United States)

    2010-09-29

    Animal Disease A dynamic disaster environment Got Security? More Public/Private Up-Front Interaction “Recommendation: That the President direct the...movement of materials We provide hope and help around the world. Earthquake in China © Matthew Marek , Red Cross © Matthew Marek , Red Cross © Matthew... Marek , Red Cross Phases of a Disaster • Rescue • Response • Recovery • Rebuilding Phases of a Disaster • Rescue • Response • Recovery • Rebuilding The

  5. Rethinking Merida’s Priorities: The Time is Now to Invest in Homeland Security

    Science.gov (United States)

    2011-10-28

    Development Assistance (DA) to support domestic poverty reduction and maximize economic benefit from NAFTA . Congress, for example, increased FY 2011 DA to...border with Canada , the Great Lakes region, or American cities like New York or Los Angeles, where drugs enter the United States. Sufficiently...investment and, more importantly, is in the collective security interests of North America. Mexican drug cartels profit off criminal trade in both Canada

  6. Measuring Boston’s Security Investment: Methods and Tools to Assess Homeland Security Initiatives. Policy Analysis Exercise

    Science.gov (United States)

    2009-03-31

    recommendations for MOEP as they move forward in developing a performance management system: (1) Implement a Balanced Scorecard approach; (2) Focus on...performance management systems, particularly those measuring preparedness and security -- we determined that the Balanced Scorecard is the most practical, applicable, and sustainable solution for MOEP.

  7. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    security procedures, encouraging their followers to attack the global transportation system.15 The consequences of these attacks are not just the visual ...partnerships for DHS.31 Though this argument is sound , the author only reviews a few programs, and does not acknowledge the broader DHS capability nor its...Capacity Development,”2. 89 Neil A. Englehart, “State Capacity, State Failure, and Human Rights,” Journal of Peace Research 46, no. 2 (2009): 163

  8. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, James [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Shedlock, Daniel [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Langeveld, Willem G.J. [Rapiscan Laboratories, Inc., Sunnyvale, CA 94085 (United States); Bharadwaj, Vinod [SLAC National Accelerator Lab., Menlo Park, CA (United States); Nosochkov, Yuri [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  9. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  10. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  11. XGraphticsCLUS: Web Mining Hyperlinks and Content of Terrorism websites for Homeland Security

    Directory of Open Access Journals (Sweden)

    Dr.S.K.Jayanthi

    2011-05-01

    Full Text Available World Wide Web has become one of the best and fast communication media and information could be distributed within few seconds to the world day by day. The evolution of social networking media increases it further more to transfer information in a rapid speed to common people. Terrorism organizations utilize these facets of the web in very efficient manner for their destructive plans. Understanding web data is a decisive task to assure the better perceptive of a website. This paper focuses on the content and link structure mining of the website which was suspicious through XGraphticsCLUS. This is done through viewing the web as graph and retrieving the various content of the website. This could help in terms of better understanding the motto and various other web connections in the suspicion. The navigational links offered in the particular website could leave with some informative evidence. This paper puts a step towards the national security and provides the user a good perception.

  12. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  13. Using DOD ISR Capabilities in Support of Homeland Security and Defense; Policy Challenges and Considerations for Effective Incident Awareness and Assessment

    Science.gov (United States)

    2011-03-01

    CONOPS) that gives a brief overview of active duty and National Guard capabilities and processes for responding to homeland security contingencies...fire and the worst oil pollution disaster in history (James, 2010). More than 205 million gallons of raw crude oil are estimated to have gushed into...pertain to the employment of DoD airborne assets for DSCA missions. The DSCA Air Support Handbook provides an overview of the full spectrum of DoD

  14. Changing Napoleonic Leadership In The Department Of Homeland Security: The Identification Of Toxic Leadership Behaviors And How To Facilitate Change To Those Behaviors

    Science.gov (United States)

    2016-02-06

    negative workforce behaviors, and how it correlates to practices within the US Department of Homeland Security (DHS) and US Customs and Border...aspects: sociability , self-control, well-being, and emotionality.”30 10 Table 1. Models of Emotional Intelligence31 As illustrated above, many of...program is designed to provide basic knowledge, practical skills, and tools needed to successfully manage supervisory responsibilities and challenges

  15. Homeland Security Interagency Support. (Joint Center for Lessons Learned Quarterly Bulletin. Volume 4, Issue 2, March 2002)

    Science.gov (United States)

    2002-03-01

    U.S. Capitol, the White House, and nuclear power facilities. In the United States and Europe, Disney amusement parks are likely targets. In Britain, the...appropriate when such attacks will involve small bands of individuals engaged in criminal acts within our homeland instead of stereotyped conventional

  16. An update on the OpenOrbiter I Mission and its paradigm's benefits for the defense, homeland security and intelligence communities

    Science.gov (United States)

    Straub, Jeremy

    2017-05-01

    The OpenOrbiter I spacecraft is the culmination of significant work on reducing the cost levels of a CubeSat-class spacecraft. By redesigning the spacecraft from the ground up, down to the component level, to use readily available electronic and physical components, the cost of CubeSat construction has been significantly reduced. This paper provides an overview of the OpenOrbiter I mission, to date. It then focuses on the benefits that can be provided by the lower-cost, low-risk spacecraft. The paper discusses the prospective utility of this mission paradigm for the defense, homeland security and intelligence communities.

  17. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  18. 76 FR 69749 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-029 Notice of...

    Science.gov (United States)

    2011-11-09

    .... eNOAD information includes complete name, date and place of birth, gender, country of citizenship... security, maritime law enforcement, marine environmental protection, and other related purposes....

  19. A Secure Group Communication Architecture for a Swarm of Autonomous Unmanned Aerial Vehicles

    Science.gov (United States)

    2008-03-01

    members to use the same decryption key. This shared decryption key is called the Session Encryption Key ( SEK ) or Traffic Encryption Key (TEK...Since everyone shares the SEK , members need to hold additional Key Encryption Keys (KEK) that are used to securely distribute the SEK to each valid...managing this process. To preserve the secrecy of the multicast data, the SEK needs to be updated upon certain events such as a member joining and

  20. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... Security Administration, TSA-1, FOIA Division, 400 Seventh Street, SW., Washington, DC 20590 3. United... 6 Domestic Security 1 2010-01-01 2010-01-01 false FOIA/Privacy Act Offices of the Department of... follows: A. Former components of the Department of Agriculture: 1. Animal and Plant Health...

  1. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    .../FBI-019 Terrorist Screening Records System of Records (August 22, 2007, 72 FR 47073) Exemptions... System of Records (August 22, 2007, 72 FR 47073) in order to automate and simplify the current method for... (May 19, 2010, 75 FR 28046); (2) TSA, Secure Flight Program: DHS/TSA-019 Secure Flight Records...

  2. 77 FR 47415 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2012-08-08

    ... added two new sources of records: (1) Customer Profile Management System (CPMS) for biometric... Country of Issuance (COI) Visa number Social Security Number (in very limited circumstances using the Form...) Country of birth Class of admission code File control office code Social Security Number I-94 number...

  3. 76 FR 58525 - Privacy Act of 1974; Department of Homeland Security, U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-21

    ..., Form G-845, if appropriate. Although SAVE may receive a Social Security Number (SSN) from its... Exchange Visitor Identification System (SEVIS) ID, foreign passport number, visa number, social security...), Customer Profile Management System (CPMS), Student and Exchange Visitor Identification System (SEVIS...

  4. 78 FR 20680 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-04-05

    ...; Divorce Certificates; Explanatory Statements; Unsolicited information submitted voluntarily in support of...); Employment Information; Financial Information; Position and Relationship to an Organization; Family... security awareness training to all information system users (including managers, senior executives,...

  5. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    ... will have rights to run ad hoc reports and query data as it relates to quality assurance tracking and... or fraud, or harm to the security or integrity of this system or other systems or programs (whether...

  6. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ... Presidential Directive--12 program, directing the use of a common identification credential for both logical... a National Special Security Event; and record source categories has been updated to include records...Gate System; (4) Automated Continuing Evaluation System (ACES) Pilot; (5) Personal Identity...

  7. 76 FR 60070 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel..., address, organization, e-mail, phone number, relation, paid/unpaid). Signature (electronic or scanned..., debts, encumbrances, etc.). Social Security Number (SSN), if applicable. Supporting documentation...

  8. 76 FR 60063 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... Immigration Services-014 Electronic Immigration System- 1 Temporary Accounts and Draft Benefit Requests System....S. Citizenship and Immigration Services-014 Electronic Immigration System-1 Temporary Accounts and... Security/U.S. Citizenship and Immigration Services to collect and maintain records on an individual as...

  9. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-03-13

    ... provided in the SCSP is a narrative description of the procedures the applicant business uses to adhere to each C-TPAT Security Criteria or Guideline articulated for their particular business type (importer... the subject of the inquiry could also permit the subject to avoid detection or apprehension....

  10. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    and a related abstract titled “Distributed preparedness: the spatial logic of domestic security in the United States” (Collier & Lakoff , 2008...hurricanes, earthquakes, and floods. The result of this evolution created a new field of expertise called “emergency management” (Collier & Lakoff , 2008...Collier and Lakoff examined two dimensions of distributed preparedness— emergency federalism and vulnerability mapping—to assess their

  11. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ...; violations of the confidentiality provisions of the Violence Against Women Act; conditions of detention... Transportation Security Administration (TSA) records and functions; and to the news media in the interest of the..., or other benefit. P. To the news media and the public, with the approval of the Chief Privacy...

  12. 78 FR 57402 - Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection-019 Air...

    Science.gov (United States)

    2013-09-18

    .... 1101, et seq., including 8 U.S.C. 1103, 1225, and 1324; the Illegal Immigration Reform and Immigrant..., AMOSS has users from various DHS components including the U.S. Immigration and Customs Enforcement (ICE... to know the information to carry out national security, law enforcement, immigration,...

  13. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... and the intelligence landscape. However, the use of ATS is governed by a number of policy and... rules in ] ATS, which are based on current intelligence or past case experience. Travelers may also be... Identity Theft: A Strategic Plan'' at http://www.identitytheft.gov ) to address security breaches...

  14. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... resources; Date and time of access; Logs of activity of DHS IT resources; IP address of access; Logs of... to the Department that is derived from other sources to facilitate authorized access to DHS... General Information Technology Access Account Records system of records security protocols will...

  15. Rules And A Rubric Could Be Used To Assess The Openness Of A Homeland Security Enterprise Social Network

    Science.gov (United States)

    2016-12-01

    Cybersecurity and Communication Integration Center NPOV neutral point of view I&A intelligence and analysis PCLOB Privacy and Civil Liberties...establish a culture of “need to share” securely while respecting civil rights and privacy. In February 2011, the DHS Office of Intelligence and Analysis ...I&A) issued its strategic plan designed to last through 2018. The plan consisted of four goals, to apply intelligence analysis to understand threats

  16. Suicide Terrorism in America?: The Complex Social Conditions of This Phenomenon and the Implications for Homeland Security

    Science.gov (United States)

    2014-11-05

    AND ABBREVIATIONS CPOST Chicago Project on Security and Terrorism LTTE Liberation Tigers of Tamil Eelam PKK Kurdistan Workers’ Party SIT Social...Kurdistan Workers’ Party ( PKK -Partiy Karkeren Kurdistan) in order to understand whether there is a universal or location-dependent explanation for...where the PKK was “ideologically remote from large segments of the public it sought to represent” and is seen as having failed. The examination of

  17. Effective Selection: A Study of First-Line Supervisor Selection Processes in the Department of Homeland Security

    Science.gov (United States)

    2011-03-01

    survive in a free market economy. Unlike the private sector, the federal government is not concerned about profits and loss and worries less about...all DHS agencies as a strategy to cut down costs associated with implementing best practices for first-line supervisor selection. Additionally, by...U.S. Coast Guard (CG) HSAD U.S. Secret Service (SS) HSBB Immigration and Customs Enforcement (ICE) HSBC Transportation Security Administration (TSA

  18. Homeland calling

    DEFF Research Database (Denmark)

    Juul, Kristine

    2007-01-01

    A great deal of those immigrants that settled in Denmark in the 1970s and 1980s have maintained strong bonds to their communities of origin. These bonds play an important role in shaping the identities and in maintaining relationships between migrants in the receiving communities. But while...... on the institutions and practices that act to transmit relations between country of origin and the new homeland. Focus is particularly on the efforts that the Yugoslav and Serbian states have made to maintain migrants political and economic loyalty and on the effects that this has had on migrants perceptions on key...

  19. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  20. Design Validation of a {sup 10}B{sub 4}C Coated RSP with Multi-layered structure for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Su Hyun; Kim, Jong Yul; Lee, Joo Hyun; Moon, Mung Kook [KAERI, Daejeon (Korea, Republic of); Lim, Chang Hwy [Korea Research Institute of Ships and Ocean Engineering, Daejeon (Korea, Republic of); Lim, Ki Seo [Myongji University, Yongin (Korea, Republic of)

    2016-05-15

    It is a national priority to prevent radiological threats including radiological terrorism and smuggling nuclear material and devices. For this purpose, many governments and relevant organizations have been exploiting radiation detection technology. Especially, radiation portal monitor (RPM) is a widely used type of radiation detectors when it comes to homeland security and commonly deployed at strategic sites like airports and ports. In the most cases, they could be divided into two types of primary screening and secondary screening. In the latter case, hand-held detectors are mainly used for a closer inspection. On the other hand, RPMs for the primary screening, our concern, are stationary mounted type and comprise gamma-ray detector and neutron detector in many cases. The expected performance of the design of a RSP(Radiation Sensor Panel) has been demonstrated. According to the results of the simulation, three RSPs should be needed to meet the criterion mentioned in subsection 2.1. The design still can be validated when taking into account that the geometrical acceptance will be increased since it has been planned that the RPM is going to installed with four RSPs.

  1. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  2. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data

  3. 76 FR 67751 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND... Border Protection, DHS/CBP-009--Electronic System for Travel Authorization (ESTA) System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance...

  4. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  5. The Role of Unmanned Aerial Systems-Sensors in Air Quality Research

    Science.gov (United States)

    The use of unmanned aerial systems (UASs) and miniaturized sensors for a variety of scientific and security purposes has rapidly increased. UASs include aerostats (tethered balloons) and remotely controlled, unmanned aerial vehicles (UAVs) including lighter-than-air vessels, fix...

  6. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  7. Homeland Security and Homeland Defense: The Seam of Uncertainty Unstitched?

    Science.gov (United States)

    2012-03-22

    problem still exists with the over-classification of intelligence. The Interagency lacks an overarching policy on Sensitive but Unclassified ( SBU ...documents, which doubled since 2001, and procedures that deal with the designation of these documents.61 The SBU documents are of “particular importance... SBU designations and applied them on information that did not warrant classification.63 This misuse of classification denies state and local fusion

  8. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    Science.gov (United States)

    2008-12-01

    file), November 5, 1987, ProQuest Historical Newspapers (1851 - 2004), A1. 22 Roberto Suro , Special to The New York Times, “False Migrant Claims...and Border Security: The 9/11 Commission Staff Report on Terrorist Travel. March 14, 2005. Suro . Roberto. Special to The New York Times. “False

  9. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    .... Social Security Numbers (as volunteered by sole proprietors as their tax identification number); Internal... of lading; audits--internal & external; proof of background checks; contractual obligations; via a... 44 U.S.C. 2904 and 2906. D. To an agency or organization for the purpose of performing audit...

  10. Homeland security planning: what victory gardens and Fidel Castro can teach us in preparing for food crises in the United States.

    Science.gov (United States)

    Endres, A Bryan; Endres, Jody M

    2009-01-01

    Two historical examples provide important insight into how federal government policies can integrate regional and local food systems to achieve food security during a time of acute crisis. During World War II, American home gardeners, through the federal government's Victory Garden program, supplied 40 percent of the nation's fresh produce, while simultaneously maintaining pre-war commodity production policies favoring large agricultural interests. The recent food crisis in Cuba, precipitated by the collapse of Soviet-bloc trade in the early 1990s, is another historical example that could inform U.S. policymakers on how to achieve food self-sufficiency through reemphasis on small farmers using sustainable practices supplemented with urban gardening. This article aims to ignite government action to strengthen and integrate regional and local food systems into federal food security planning so that citizens can be best prepared for a food emergency. The article first examines laws, regulations and policies put in place during World War II that employed regional and local food networks to satisfy a significant amount of civilian food supply needs. The article also looks at more recent Cuban efforts to achieve forced food self-reliance when, after the end of the Cold War, Soviet subsidies and preferential trading of energy and food supplies ceased almost overnight.

  11. Unmanned aircraft systems

    Science.gov (United States)

    Unmanned platforms have become increasingly more common in recent years for acquiring remotely sensed data. These aircraft are referred to as Unmanned Airborne Vehicles (UAV), Remotely Piloted Aircraft (RPA), Remotely Piloted Vehicles (RPV), or Unmanned Aircraft Systems (UAS), the official term used...

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  14. Unmanned Aircraft Systems Integration in the National Airspace System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — There is an increasing need to fly Unmanned Aircraft Systems (UAS) in the National Airspace System (NAS) to perform missions of vital importance to national security...

  15. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  16. Micro-unmanned aerodynamic vehicle

    Science.gov (United States)

    Reuel, Nigel; Lionberger, Troy A.; Galambos, Paul C.; Okandan, Murat; Baker, Michael S.

    2008-03-11

    A MEMS-based micro-unmanned vehicle includes at least a pair of wings having leading wing beams and trailing wing beams, at least two actuators, a leading actuator beam coupled to the leading wing beams, a trailing actuator beam coupled to the trailing wing beams, a vehicle body having a plurality of fulcrums pivotally securing the leading wing beams, the trailing wing beams, the leading actuator beam and the trailing actuator beam and having at least one anisotropically etched recess to accommodate a lever-fulcrum motion of the coupled beams, and a power source.

  17. Complacency: A Threat to Homeland Security

    Science.gov (United States)

    2014-06-01

    fascination with understanding how memes are passed on within cultures and become accepted as “common wisdom.” For the purpose of this thesis, the...terms their meaning. According to folk psychology, terms, such as “complacency,” develop and evolve within cultures, are passed on as memes , and...mind that ordinary people are inclined to endorse. It is the theory that mental state terms develop and evolve within cultures, are passed on as memes

  18. Intelligence Sharing, Fusion Centers, and Homeland Security

    Science.gov (United States)

    2008-06-01

    accurate and timely dissemination of crucial information. LCDR Christopher C. Thornlow in his Master’s Thesis , Fusing Intelligence with Law...networks. FCW, from http://www.fcw.com/print/13_16/news/102730-1.html Waterman, S (2008). Analysis: Einstein and U.S. Cybersecurity . UPI, from http...undergraduate studies at the University of Tennessee in Martin, Tennessee where he graduated with a Bachelor of Science degree in Criminal Justice

  19. European Approaches to Homeland Security and Counterterrorism

    Science.gov (United States)

    2006-07-24

    actual terrorist incident, a Cabinet-level emergency crisis management body — known as COBR (for the Cabinet Office briefing room in which it meets...is convened to coordinate the government’s immediate emergency response; COBR brings together the Prime Minister and other Cabinet ministers and... COBR , and the armed forces would have no jurisdiction outside of supporting the civil powers. The Ministry of Defense and the armed forces are also

  20. ETV - HOMELAND SECURITY EVALUATION OF CYANIDE DETECTORS

    Science.gov (United States)

    EPA's Environmental Technology Verification (ETV) Program was established in 1995 to objectively verify the performance of technologies that measure / monitor the quality of our environment, both for background or at suspected contamination site. The ETV program has established...

  1. Measuring the Foundation of Homeland Security

    Science.gov (United States)

    2007-03-01

    Force (also referred to as humanistic psychology) was a body of knowledge and theories separate from the behaviorist and Freudian movements...Eduardo Salas and Carolyn Prince, Team Performance Assessment and Measurement: Theory , Methods, and Applications (Mahwah, NJ: Lawrence Erlbaum Associates...Team Theory in a Unified Command Environment at Catastrophic Incidents” (Naval Postgraduate School, Monterey, CA, 2005). 18 Andrea Saveri, Howard

  2. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    1947 by George Kennan that argued for a policy of containment of the Soviet Union. The strong emphasis on values in the Narrative underscores the...Service, Excellence  Kent , WA Fire Department: Be Safe, Do Your Best, Serve With Integrity, Take Care of Each Other  Hazardville, CT Fire

  3. A Balanced Approach to Funding Homeland Security

    Science.gov (United States)

    2014-12-01

    Behavior ........................................68 2. Myth 2: Attitude Changes Behavior ..........................................69 3. Myth 3: People...verses another. Because DHS is assessing risk as a means to allocating resources to buy down risk, it is imperative, according to DHS, that its risk...economically healthy impulse .201 Crowdfunding is more than just money; it is facilitation, dedication, team building, and valuation. These are the

  4. The Submersible Threat to Maritime Homeland Security

    Science.gov (United States)

    2013-09-01

    this vessel was $490 million USD at the time of the incident and the parent company, Carnival Corporation, has insurance coverage in the amount of $510...million USD for the vessel with a deductable of approximately $30 million USD (Reuters UK Edition, 2012). The Carnival Corporation self-insures for...declined in the days and weeks after the incident (Reuters U.S. Edition, 2012). After this incident occurred, the stock price for Carnival

  5. Homeland Security Department: FY2007 Appropriations

    Science.gov (United States)

    2006-07-05

    Explosive Detection Systems; ETD: Explosive Trace Detection equipment; IT: Information Technology; FFDO: Federal Flight Deck Officer program; TWIC...willing to place back under warranty should be refurbished. The committee, however, emphasized that it does not believe that explosive trace detection (ETD

  6. 76 FR 34088 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-06-10

    ... participate in this HSAC teleconference via afore mentioned procedures. Each individual must provide his or... during the teleconference, contact Erika Nixon at the afore mentioned number (202) 447-3135. Dated:...

  7. An Interagency Command for Homeland Security

    Science.gov (United States)

    2002-04-01

    rule for many citizens during the initial hours of a large-scale CRBN [chemical, radiological, biological, or nuclear] incident” yet the “lack of an...official source of information on CRBN incidents has left the average citizen much less prepared, both intellectually and emotionally, than the

  8. Homeland Security Intelligence: To What End

    Science.gov (United States)

    2010-09-01

    author’s adaptive threat orientation model are derived spring from military strategist John Boyd’s (1995) “Observe-Orient-Decide-Act Loop” or “OODA...In his revolutionary presentation Organic Design for Command and Control (1995), military strategist John Boyd proposed the key to decisive combat...scholar Henry P. Monaghan (1970, p. 25) has proposed that contemporary Presidents have embraced the role of “Protector-in-Chief” and with “ever

  9. 2009 Homeland Security Symposium and Exhibition

    Science.gov (United States)

    2009-09-10

    benchmark in 2007. Page 46 http://charlestonharbourresort.com – Legitimate javascript applet used to detect flash player and has been injected with...transactions. • They install backdoors that " beacon " periodically to their command and control servers, allowing surreptitious access to the

  10. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    Philip Zimbardo (New York: Oxford Press, 2007), 241. 58 Ibid., 228. 26 The attacks on 9/11 killed 3,063 people. Although there were multiple... Zimbardo purports that we are not born with tendencies towards good or evil but with mental templates to do either.76 Arie Kruglanski and Shire Fishman...they able to commit such heinous acts? Zimbardo claims that few people will engage in an “end game” final solution without first being prepared

  11. Homeland Security Behind the Redwood Curtain

    Science.gov (United States)

    2007-09-01

    drink, then put it firmly down on the porch railing and turned toward me. “You wouldn’t believe how they talk to their mama ,” he said angrily. “They...a little boy who has cancer . Keep in touch!” she said with a friendly wave good-bye. Rugged is an appropriate adjective to describe this county

  12. Homeland Security Department: FY2008 Appropriations

    Science.gov (United States)

    2007-07-17

    for carry-on bags; whole body imaging; explosive trace detection portal machines; cast and prosthetic device scanners; and bottled liquid scanners. The...transferred from the Science and Technology Directorate (S&T), and the National Biosurveillance Integration System (NBIS), which will be transferred from...transfer of the Biosurveillance program/project activity (PPA) to the new Office of Health Affairs. In addition, funding for the new Office of Emergency

  13. The State of Homeland Security 2007

    Science.gov (United States)

    2007-01-01

    divisions. • The State of Biosecurity. The Department’s grade in this area is a B-. A robust biointelligence and biosurveillance capability must...critical DNDO methods to conduct Advanced Spectroscopic Portal Monitors (ASP) cost-benefit analysis. The Department must improve upon the...methodologies applied toward radiation portal monitors. The Department should also examine the possibilities and implications of aggressive deployment of

  14. Homeland Security Department: FY2010 Appropriations

    Science.gov (United States)

    2009-12-14

    technology. While the TSA has abandoned the acquisition and operational utilization of trace detection portal (puffer) machines in favor WBI devices... Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.160 Dr. Alexander G. Garza, President Obama’s...and $98 million is for biosurveillance , BioWatch, medical readiness planning, chemical response, and other activities

  15. 2006 Homeland Security Symposium and Exposition

    Science.gov (United States)

    2006-03-31

    Geoeconomic Studies • Paul A. Volker Chair in International Economics, Council on Foreign Relations; most recently Director, Congressional Budget...its recommendations •Re-engineer ESF-8 capabilities and responsibilities in partnership with DHS and other strategic partners • Brand the HHS Mission in

  16. Data Mining and Homeland Security: An Overview

    Science.gov (United States)

    2008-08-27

    Senator Patrick Leahy, “Letter of Attorney General Alberto Gonzales to the Chairman and Ranking Member of the Senate Judiciary Committee ordered...documents/nsa_myth_v_ reality.pdf]. 107 The Honorable Alberto Gonzalez, Testimony before the Senate Committee on the Judiciary, Wartime Executive Power

  17. Critical Homeland Infrastructure Protection

    Science.gov (United States)

    2007-01-01

    CIP Mr. Dan Mathis DPO-MA The National Innovative Technology and Ms. Elizabeth NITMAC Mission Assurance Center D’Andrea Current and Developing Issues...Vulnerabilities and COL Jeff Brown JTF-CNO Countermeasures Telecommunications Security and NSTAC Mr. Karl Rauscher NSTAC Anti-Terrorism/Force Protection LTC(P

  18. 77 FR 26641 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2012-05-04

    ... 4, 2012 Part III Department of Homeland Security Transportation Security Administration Aviation... Aviation Security Advisory Committee (ASAC) Meeting AGENCY: Transportation Security Administration, DHS... Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) on May...

  19. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... Transportation Worker Identification Credential or Hazardous Materials Endorsement programs. (3) A...

  20. Transnationalism: Diaspora-Homeland Development

    Science.gov (United States)

    Patterson, Rubin

    2006-01-01

    Based on detected correlations between the strategic collaboration of U.S.-based diasporas and their respective ancestral homelands on the one hand and the socioeconomic and technological development of those homelands on the other, this paper, which provides a conceptual foundation of the correlation, attempts to ignite a new area of research on…

  1. The Role of Unmanned Aerial Systems/Sensors in Air Quality Research

    Science.gov (United States)

    The use of unmanned aerial systems (UASs) for a variety of scientific and security purposes has rapidly increased. UASs include aerostats (tethered balloons) and remotely controlled, unmanned aerial vehicles (UAVs) including lighter-than-air vessels, fixed wing airplanes, and he...

  2. Changing Homeland Security: What Should Homeland Security Leaders Be Talking About?

    Science.gov (United States)

    2006-07-01

    top of the nation’s policy agenda. The discussions will be based on a mix of research , experience, opinion, ideology, and bias. Participants in the... constructionism , middle-of-the-road moderation, and radical reconstructionism.14 BELLA VIT A, CH A NGI NG HOMELA ND SECU R ITY 6...nation by paying more attention to the social and economic conditions that give rise to and support “premeditated, politically motivated violence

  3. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    Science.gov (United States)

    2015-06-01

    FIGURES Figure 1.  Atlanta Police Department Organizational Chart ............................................32  Figure 2.  Atlanta Police Overall...40  Figure 4.  Hall County Fire Department Organizational Chart ........................................46...55  Figure 7.  Dekalb County Police Department Organizational Chart ................................62

  4. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    Science.gov (United States)

    2013-12-01

    pile eventually collapses. What interested Bak, was how big 73 Benjamin Franklin, Memoirs of the Life and Writings of Benjamin Franklin, Google ebook ...Google ebook ed. Vol. I. London: A.J. Valphy, 1818. Frontline, Money, Power and Wall Street, directed by Michael Kirk, Season 30, episode 10

  5. Unmanned and Unarmed

    DEFF Research Database (Denmark)

    Kristensen, Kristian Søby; Pradhan-Blach, Flemming; Schaub Jr, Gary John

    Unmanned aerial vehicles (UAVs) are being integrated into the military forces of Western states, including Denmark. How should the Danish government proceed when considering investments in UAVs? Although airpower and UAVs have substantially shaped the Western paradigm for the use of force...... Denmark decide to procure larger unmanned systems, such as Reapers or Global Hawks, it should cooperate with Allies to purchase, operate, and integrate these capabilities as smoothly as possible and mitigate these risks. It should also establish a joint unit dedicated to house, train, educate, and operate...

  6. Unmanned and Unarmed

    DEFF Research Database (Denmark)

    Kristensen, Kristian Søby; Pradhan-Blach, Flemming; Schaub Jr, Gary John

    Unmanned aerial vehicles (UAVs) are being integrated into the military forces of Western states, including Denmark. How should the Danish government proceed when considering investments in UAVs? Although airpower and UAVs have substantially shaped the Western paradigm for the use of force...... Denmark decide to procure larger unmanned systems, such as Reapers or Global Hawks, it should cooperate with Allies to purchase, operate, and integrate these capabilities as smoothly as possible and mitigate these risks. It should also establish a joint unit dedicated to house, train, educate, and operate...

  7. 基于无人机的安防监控系统在智慧城市中的应用前景与实现%Application Prospect and Implementation of Security Surveillance System Based on Unmanned Aerial Vehicle in Smart City

    Institute of Scientific and Technical Information of China (English)

    李超

    2014-01-01

    本文阐述了无人机在安防监控领域的优势与背景。无人机安防监控系统的构建主要为三个模块:首先介绍了无人机的机体设计与内部系统设计;接着阐述了安防监控后台系统的主要功能,以及无人机如何与后台系统进行无线通信;最后总结了无人机安防监控系统的优势,并提出了该系统目前存在的缺陷与改进方法。%This paper elaborates the advantage and the background of unmanned aerial vehicle in security surveillance system. The construction of security surveillance system mainly includes three parts. We first intro-duce the design of airframe and inner system of UAV;later we present the major function of its background sys-tem, and put forward the wireless communication of UAV and the background system. In conclusion we show the advantage of unmanned aerial vehicle security surveillance system, and we put forward an improvement aiming at the defect.

  8. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  9. The control of a parallel hybrid-electric propulsion system for a small unmanned aerial vehicle using a CMAC neural network.

    Science.gov (United States)

    Harmon, Frederick G; Frank, Andrew A; Joshi, Sanjay S

    2005-01-01

    A Simulink model, a propulsion energy optimization algorithm, and a CMAC controller were developed for a small parallel hybrid-electric unmanned aerial vehicle (UAV). The hybrid-electric UAV is intended for military, homeland security, and disaster-monitoring missions involving intelligence, surveillance, and reconnaissance (ISR). The Simulink model is a forward-facing simulation program used to test different control strategies. The flexible energy optimization algorithm for the propulsion system allows relative importance to be assigned between the use of gasoline, electricity, and recharging. A cerebellar model arithmetic computer (CMAC) neural network approximates the energy optimization results and is used to control the parallel hybrid-electric propulsion system. The hybrid-electric UAV with the CMAC controller uses 67.3% less energy than a two-stroke gasoline-powered UAV during a 1-h ISR mission and 37.8% less energy during a longer 3-h ISR mission.

  10. South African Homelands as Frontiers

    DEFF Research Database (Denmark)

    This book explores what happened to the homelands – in many ways the ultimate apartheid disgrace – after the fall of apartheid. The nine chapters contribute to understanding the multiple configurations that currently exist in areas formerly declared "homelands" or "Bantustans". Using the concept...... of frontier zones, the homelands emerge as areas in which the future of the South African postcolony is being renegotiated, contested and remade with hyper-real intensity. This is so because the many fault lines left over from apartheid (its loose ends, so to speak) – between white and black; between...... in these settings that the postcolonial promise of liberation and freedom must face its test. As such, the book offers highly nuanced and richly detailed analyses that go to the heart of the diverse dilemmas of post-apartheid South Africa as a whole, but simultaneously also provides in condensed form an extended...

  11. The Haptic Lines of Homeland

    Science.gov (United States)

    Dawson, P.; Takatsuka, M.

    2013-02-01

    This paper discusses the conceptual underpinnings, working processes and the tools used for preparing the scene files of a holographic art work which offers a subjective view point on the idea of homeland. The art work, Homeland, an optically formed fringe digital hologram, which is contextualized by the holographic maps used in situational awareness, indicates its subjectivity by strongly referencing the human body, particularly the lines of the palm of the hand. ... because the body belongs to the order of things as the world is universal flesh. Maurice Merleau-Ponty

  12. U.S. Geological Survey Emerging Applications of Unmanned Aircraft Systems

    Science.gov (United States)

    Hutt, M. E.

    2012-12-01

    In anticipation of transforming the research methods and resource management techniques employed across the Department of the Interior, the U.S. Geological Survey (USGS) Unmanned Aircraft Systems (UAS) Project Office is conducting missions using small UAS- sUAS platforms (logistically difficult, cost prohibitive or technically impossible to obtain consistent, reliable, timely information. USGS is teaming with the Department of the Interior Aviation Management Directorate to ensure the safe and cost effective adoption of UAS technology. While the USGS is concentrating on operating sUAS, the immense value of increased flight time and more robust sensor capabilities available on larger platforms cannot be ignored. We are partnering with several groups including the Department of Homeland Security, National Aeronautics and Space Administration, Department of Defense, and National Oceanic and Atmospheric Administration for access to data collected from their fleet of high altitude, long endurance (HALE) UAS. The HALE systems include state of the art sensors including Electro-Optical, Thermal Infrared and Synthetic Aperture Radar (SAR). The data being collected by High Altitude, Long Endurance (HALE) systems is can be routinely shared in near real time at several DOI- USGS locations. Analysis tools are becoming available that can produce a robust set of products including a geo-referenced base for value added investigations. Much like the use of global positioning systems, unmanned aircraft systems have the potential of enabling us to be better stewards of the land. We are actively working to develop applications of the traditional full motion video capabilities and are engaged in developing additional sensor capabilities for sUAS including- magnetometers, temperature, radio telemetry, chemical and biological gas detection, and gimbal mounted "photogrammetric" cameras.

  13. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the security identification display... (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA)....

  14. Low-cost, quantitative assessment of highway bridges through the use of unmanned aerial vehicles

    Science.gov (United States)

    Ellenberg, Andrew; Kontsos, Antonios; Moon, Franklin; Bartoli, Ivan

    2016-04-01

    Many envision that in the near future the application of Unmanned Aerial Vehicles (UAVs) will impact the civil engineering industry. Use of UAVs is currently experiencing tremendous growth, primarily in military and homeland security applications. It is only a matter of time until UAVs will be widely accepted as platforms for implementing monitoring/surveillance and inspection in other fields. Most UAVs already have payloads as well as hardware/software capabilities to incorporate a number of non-contact remote sensors, such as high resolution cameras, multi-spectral imaging systems, and laser ranging systems (LIDARs). Of critical importance to realizing the potential of UAVs within the infrastructure realm is to establish how (and the extent to which) such information may be used to inform preservation and renewal decisions. Achieving this will depend both on our ability to quantify information from images (through, for example, optical metrology techniques) and to fuse data from the array of non-contact sensing systems. Through a series of applications to both laboratory-scale and field implementations on operating infrastructure, this paper will present and evaluate (through comparison with conventional approaches) various image processing and data fusion strategies tailored specifically for the assessment of highway bridges. Example scenarios that guided this study include the assessment of delaminations within reinforced concrete bridge decks, the quantification of the deterioration of steel coatings, assessment of the functionality of movement mechanisms, and the estimation of live load responses (inclusive of both strain and displacement).

  15. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control and data acquisition (SCADA) security...software assurance, critical infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control

  16. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  17. Threats at Our Threshold: Homeland Defense and Homeland Security in the New Century

    Science.gov (United States)

    2006-10-21

    what items were needed for collection. No one, for example, foresaw the immense need for diapers and baby formula. The diverse set of actors and...and large, is not. It does not do me any good to begin with a slide that talks about 9/11. I have quit talking about the global war on terrorism...modern world could unwrap —costing us friends, markets , and national power. Eventually what we could see is the loss of the character of the modern

  18. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Interprofessional Learning Scale (RIPLS) or the 18-item Interprofessional Education Perception Scale ( IEPS ) to measure students’ attitudes and perceptions of...multi-disciplinary teamwork and collaboration, professional identity, and roles and responsibilities. RIPLS and/or IEPS data is gathered and analyzed...changes in knowledge, skills, and attitudes via RIPLS or IEPS data could quantitatively identify the benefits of the CHDS model to building

  19. Risk Assessment for an Unmanned Merchant Ship

    Directory of Open Access Journals (Sweden)

    Ø.J. Rødseth

    2015-09-01

    Full Text Available The MUNIN project is doing a feasibility study on an unmanned bulk carrier on an intercontinental voyage. To develop the technical and operational concepts, MUNIN has used a risk-based design method, based on the Formal Safety Analysis method which is also recommended by the International Mari-time Organization. Scenario analysis has been used to identify risks and to simplify operational scope. Systematic hazard identification has been used to find critical safety and security risks and how to address these. Technology and operational concept testing is using a hypothesis-based test method, where the hypotheses have been created as a result of the risk assessment. Finally, the cost-benefit assessment will also use results from the risk assessment. This paper describes the risk assessment method, some of the most important results and also describes how the results have been or will be used in the different parts of the project.

  20. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities §...

  1. 49 CFR 1542.107 - Changed conditions affecting security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Changed conditions affecting security. 1542.107... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the...

  2. Controlling Unmanned Vehicles : the Human Factors Solution

    NARCIS (Netherlands)

    Erp, J.B.F. van

    2000-01-01

    Recent developments and experiences have proven the usefulness and potential of Unmanned Vehicles (UVs). Emerging technologies enable new missions, broadening the applicability of UVs from simple remote spies towards unmanned combat vehicles carrying lethal weapons. However, despite the emerging tec

  3. 78 FR 28237 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-14

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory... Telecommunications Advisory Committee, National Protection and Programs Directorate, Department of Homeland...

  4. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  5. Unmanned Maritime Systems Incremental Acquisition Approach

    Science.gov (United States)

    2016-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION...REPORT TYPE AND DATES COVERED MBA professional report 4. TITLE AND SUBTITLE UNMANNED MARITIME SYSTEMS INCREMENTAL ACQUISITION APPROACH 5. FUNDING...explore and understand the issues involved in the DOD’s acquisition process for Unmanned Maritime Systems (UMS) in order to recommend a new acquisition

  6. Sensors in Unmanned Robotic Vehicle

    Directory of Open Access Journals (Sweden)

    B. Rohini

    2008-05-01

    Full Text Available Unmanned tracked vehicles are developed for deployment in dangerous zones that are notsafe for human existence. These vehicles are to be fitted with various sensors for safe manoeuvre.Wide range of sensors for vehicle control, vision, and navigation are employed. The main purposeof the sensors is to infer the intended parameter precisely for further utilisation. Software isinseparable part of the sensors and plays major role in scaling, noise reduction, and fusion.Sensor fusion is normally adapted to enhance the decision-making. Vehicle location  andorientation can be sensed through global positioning system, accelerometer, gyroscope, andcompass. The unmanned vehicle can be navigated with the help of CCD camera, radar, lidar,ultrasonic sensor, piezoelectric sensor, microphone, etc.  Proximity sensors like capacitive andRF proximity detectors can detect obstacles in close vicinity.  This paper presents an overviewof sensors normally deployed in unmanned tracked vehicles.

  7. Handbook of unmanned aerial vehicles

    CERN Document Server

    Vachtsevanos, George

    2015-01-01

    The Handbook of Unmanned Aerial Vehicles is a reference text for the academic and research communities, industry, manufacturers, users, practitioners, Federal Government, Federal and State Agencies, the private sector, as well as all organizations that are and will be using unmanned aircraft in a wide spectrum of applications. The Handbook covers all aspects of UAVs, from design to logistics and ethical issues. It is also targeting the young investigator, the future inventor and entrepreneur by providing an overview and detailed information of the state-of-the-art as well as useful new concepts that may lead to innovative research. The contents of the Handbook include material that addresses the needs and ‘know how’ of all of the above sectors targeting a very diverse audience. The Handbook offers a unique and comprehensive treatise of everything one needs to know about unmanned aircrafts, from conception to operation, from technologies to business activities, users, OEMs, reference sources, conferences, ...

  8. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  9. Natural interaction for unmanned systems

    Science.gov (United States)

    Taylor, Glenn; Purman, Ben; Schermerhorn, Paul; Garcia-Sampedro, Guillermo; Lanting, Matt; Quist, Michael; Kawatsu, Chris

    2015-05-01

    Military unmanned systems today are typically controlled by two methods: tele-operation or menu-based, search-andclick interfaces. Both approaches require the operator's constant vigilance: tele-operation requires constant input to drive the vehicle inch by inch; a menu-based interface requires eyes on the screen in order to search through alternatives and select the right menu item. In both cases, operators spend most of their time and attention driving and minding the unmanned systems rather than on being a warfighter. With these approaches, the platform and interface become more of a burden than a benefit. The availability of inexpensive sensor systems in products such as Microsoft Kinect™ or Nintendo Wii™ has resulted in new ways of interacting with computing systems, but new sensors alone are not enough. Developing useful and usable human-system interfaces requires understanding users and interaction in context: not just what new sensors afford in terms of interaction, but how users want to interact with these systems, for what purpose, and how sensors might enable those interactions. Additionally, the system needs to reliably make sense of the user's inputs in context, translate that interpretation into commands for the unmanned system, and give feedback to the user. In this paper, we describe an example natural interface for unmanned systems, called the Smart Interaction Device (SID), which enables natural two-way interaction with unmanned systems including the use of speech, sketch, and gestures. We present a few example applications SID to different types of unmanned systems and different kinds of interactions.

  10. Introduction to unmanned aircraft systems

    CERN Document Server

    Marshall, Douglas M; Hottman, Stephen B; Shappee, Eric; Most, Michael Thomas

    2011-01-01

    Introduction to Unmanned Aircraft Systems is the editors' response to their unsuccessful search for suitable university-level textbooks on this subject. A collection of contributions from top experts, this book applies the depth of their expertise to identify and survey the fundamentals of unmanned aircraft system (UAS) operations. Written from a nonengineering civilian operational perspective, the book starts by detailing the history of UASs and then explores current technology and what is expected for the future. Covering all facets of UAS elements and operation-including an examination of s

  11. Da Vincis Children Take Flight: Unmanned Aircraft Systems in the Homeland

    Science.gov (United States)

    2014-03-01

    public discussion on the use of UAS, dehumanizing war and general ethics of remote killing. Domestically, many opponents equate UAS with military...await. Soon, UAS are as common and utilitarian as household appliances, bringing all of the benefits of a corporate-led integration along with the... ethics for regulated professions  important economic or financial interest of a Member State or of the Developed when the Internet was

  12. Covering the Homeland: National Guard Unmanned Aircraft Systems Support for Wildland Firefighting and Natural Disaster Events

    Science.gov (United States)

    2008-12-01

    support of the Esperanza Fire Incident Command Center. In roughly 24 hours, an authorization was approved and the UAS was able to get airborne to provide...Canada border.92 The operations for this certification of authorization or waiver would be centered out of Grand Forks, North Dakota. For these orbits set

  13. RISK DEFINITION IN CIVIL UNMANNED AVIATION

    Directory of Open Access Journals (Sweden)

    Volodymyr Kharchenko

    2016-12-01

    Full Text Available Objective: The risks in unmanned civil aviation are considered as one of the most important. In the article is proved applicability of ensuring the flight safety of aircraft and considered the basic risks of manned civil aviation. Methods: Analyzed statistical data on aviation accidents, organized probabilities distribution of aviation accidents for manned and unmanned civil aviation to identify factors that influence the occurrence of emergency situations in manned and unmanned aviation. Results: We proposed typology of risk components in civil aviation and systematized methods and techniques to reduce risks. Over the analogies defined possible risks, their causes and remedies in civil unmanned aircraft. Weight coefficients distribution was justified between risk types for development of recommendations on risk management in unmanned civil aviation. Discussion: We found that the most probable risk in manned civil aviation is the human factor, organization of air traffic control, design flaws of unmanned aviation system as a whole, as well as maintenance of unmanned aviation system.

  14. Deciding Who Lives: Considered Risk Casualty Decisions in Homeland Security

    Science.gov (United States)

    2008-12-01

    into a burning inferno . Where to draw the line between role-related professional responsibilities and undue risk is a question [we] ... did not...doing so in infernos and, therefore, failed to realize that the time for further rescue efforts had passed. This dichotomy of experience created at

  15. Department of Homeland Security: Assessments of Selected Complex Acquisitions

    Science.gov (United States)

    2010-06-01

    known as Tucson-1 and Ajo -1. The program plans to complete testing before DHS approves deployment at additional Block 1 sites. Tucson-1, the...acceptance of the initial Block 1 systems at the Tucson-1 and Ajo -1 sites by March 2011. The Block 1 program baseline currently requires the

  16. Strengthening Homeland Security through Improved Foreign Language Capability

    Science.gov (United States)

    2011-12-01

    sports, medicine, or poetry , for example. DTRA interpreters are sometimes assigned to support a ―civilian Executive Interpreter.‖ Defense Threat...about two pounds.‖ In addition, RACSPC students participate in memory -enhancing drills and games.172 In addition to completing RACSPC, linguists...original order from memory . Once the reversal is complete, students then translate the words, and again proceed in both orders. According to the

  17. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... HSAR 3002.101 and usage conventions. Add a new HSAR subpart 3003.10, Contractor Code of Business Ethics... follows: Subpart 3003.10--Contractor Code of Business Ethics and Conduct Sec. 3003.1003 Requirements. 3003.1004 Contract clauses. Subpart 3003.10--Contractor Code of Business Ethics and Conduct 3003.1003...

  18. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Kimberly A. [Georgia Inst. of Technology, Atlanta, GA (United States)

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

  19. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    Science.gov (United States)

    2012-12-01

    many sick, elderly , and bed-ridden people in hospitals and nursing homes who suffered a horrific fate as staff members chose not to evacuate patients...Plot,” International Centre For Political Violence and Terrorism Research, http://www.pvtr.org/pdf/GlobalAnalysis...due to either the lack of capability or the means to acquire it. This was the case at the St. Rita’s nursing home, where 40 of the 60 residents died

  20. Changing Homeland Security: The Year in Review - 2008

    Science.gov (United States)

    2009-01-01

    Pirates and their small boats have moved from Disney amusement to global menace. Thomas Jefferson wrote that a politician looks forward only to...firebombing attacks in Santa Cruz. Members of an animal rights group were the suspected perpetrators. This was a significant event for the area

  1. U.S. Biodefense & Homeland Security: Toward Detection & Attribution

    Science.gov (United States)

    2006-12-01

    None of these contained the bacteria. A common source eluded investigators even though every item was traced back to its origin. The lettuce and...possessed or worked with Ames. As a result, efforts were taken to identify the different genomes linked to its use in these laboratories.192 Dugway...of events and to facilitate coordinated response.”301 The goal is to “collect, assemble , and analyze a wide range of relevant information and make

  2. Securing Nuclear and Radiological Material in the Homeland

    Science.gov (United States)

    2007-03-01

    John Walker Lindh allegedly told interrogators that battlefield rumors suggested that a biological attack was expected to be a “second wave...al- Qa`ida attack. 10/3/2002 “American Taliban” John Walker Lindh , citing “battlefield rumors” “US biological attack imminent -- Taliban...iafrica.com, 12 December 2001; “Walker Lindh : Al Qaeda Planned More Attacks,” CNN, 3 October 2002 post-2001 Chemical/ Biological French Interior

  3. Quantitative Risk Analysis for Homeland Security Resource Allocation

    Science.gov (United States)

    2006-12-01

    156 A. Papoulis , Probability, Random Variables and Stochastic Processes, (New York: McGraw-Hill, 1965), chapters 5-7. 44 max ( ) D R D...Report. New York: W.W. Norton. Papoulis , A. 1965. Probability, Random Variables and Stochastic Processes. New York: McGraw-Hill. Pate-Cornell

  4. Nuclear and Solar Energy: Implications for Homeland Security

    Science.gov (United States)

    2008-12-01

    Hirschman Index HVDC High-Voltage Direct Current IPCC Intergovernmental Panel on Climate change NCEP National Commission on Energy Policy NRC...transmission lines will carry the load to the customers along high voltage direct current ( HVDC ) lines. HVDC lines lose 3% of

  5. Southwest Hispanic Community -- The Absence of Homeland Security Threats

    Science.gov (United States)

    2012-12-01

    150 U.S. Navy, “9 - Foreign Language,” Navy Equal Opportunity (EO) Policy, OPNAVINST 5354.1F, 2007. 151 “Yo No Hablo Espanol : BUT I AM STILL LATINO...DAMN IT!!!!” Yahoo! Contributor Network, accessed September 27, 2012, http://voices.yahoo.com/yo-no-hablo- espanol -but-am-still-latino-damn-it- 73855

  6. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    Science.gov (United States)

    2007-11-02

    Number Author(s) Project Number Task Number Work Unit Number Performing Organization Name(s) and Address(es) General Accouting Office, PO Box 37050...budget. As GAO’s long term budget simulation notes, known demographic trends and rising health care costs will place unprecedented pressures on our...non-partisan, and non-ideological audits, investigations and evaluations. We currently have over 60 congressional requests to conduct reviews in

  7. Leveraging Social Media to Engage the Public in Homeland Security

    Science.gov (United States)

    2009-09-01

    date information. “Our team knew where we could buy gas, we knew what roads were open and most importantly, we knew who needed help and where they were...more complete warning messages and how the public utilizes social media as an emergency moves into an extended length of time—do their habits ...so that they can define their needs.  You need to get to “Robust Statement of Needs” 84 Enablers  New Generation (The Millennials ) are

  8. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-03-04

    ...). The HSAAC provides advice and recommendations to the Secretary and senior leadership on matters... Management Institute and the higher education community to support Presidential Policy Directive 8...

  9. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    organizations. Similar to the previous discussion of conflict biguity in public policy implementation, these factors are the degree of agreement ree of...4. Networking and Collaboration Laurence O’Toole has written of the growing need for and the emergence of networks and collaboration in public...there is no unifying theory about networking in the public sector, Nancy Roberts c 242 Laurence O’Toole, Jr., “Treating Networks Seriously: Practical

  10. 7 CFR 2.32 - Director, Office of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ..., disseminate and store USDA intelligence requirements and convey information to the intelligence community. (3...). (8) Administer a competitive grant program to support the development and expansion of advanced... veterinarians; administer a competitive grant and low-interest loan assistance program to assist States...

  11. Image-Based Vehicle Identification Technology for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A

    2002-10-08

    The threat of terrorist attacks against US civilian populations is a very real, near-term problem that must be addressed, especially in response to possible use of Weapons of Mass Destruction. Several programs are now being funded by the US Government to put into place means by which the effects of a terrorist attack could be averted or limited through the use of sensors and monitoring technology. Specialized systems that detect certain threat materials, while effective within certain performance limits, cannot generally be used efficiently to track a mobile threat such as a vehicle over a large urban area. The key elements of an effective system are an image feature-based vehicle identification technique and a networked sensor system. We have briefly examined current uses of image and feature recognition techniques to the urban tracking problem and set forth the outlines of a proposal for application of LLNL technologies to this critical problem. The primary contributions of the proposed work lie in filling important needs not addressed by the current program: (1) The ability to create vehicle ''fingerprints,'' or feature information from images to allow automatic identification of vehicles. Currently, the analysis task is done entirely by humans. The goal is to aid the analyst by reducing the amount of data he/she must analyze and reduce errors caused by inattention or lack of training. This capability has broad application to problems associated with extraction of useful features from large data sets. (2) Improvements in the effectiveness of LLNL's WATS (Wide Area Tracking System) by providing it accurate threat vehicle location and velocity. Model predictability is likely to be enhanced by use of more information related to different data sets. We believe that the LLNL can accomplish the proposed tasks and enhance the effectiveness of the system now under development.

  12. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    elevated insulin levels are a telltale sign of insulin resistance. Insulin resistance creates significant fat accumulation around the abdomen . This...THE POLICIES AND POLITICS OF OBESITY: WHO MADE U.S. FAT ? .....45  A.  FRITZ HABER AND THE HABER BOSCH PROCESS .........................46  B...Compared to Percent Calories from Fat Among U.S. Adults. Screen shot provided by a Dr. Robert Lustig lecture ..................83  Figure 11.  Loss and

  13. War in the Atlantic: A Historical Case of Homeland Security

    Science.gov (United States)

    2015-09-01

    costs . The staggering toll of the “unrestricted” campaign, amplified by rising numbers of neutral vessels that ceased to operate, given the risk, far...outweighed the expense of convoys. As shipping attrition began to foreclose Britain’s ability to fight the war, the costs of the convoy system became...sighting to attack.33 Initially, convoys were arranged for ships inbound to Great Britain only, as the most pressing need was for supplies from abroad

  14. Congressional Oversight of Homeland Security: Help or Hinderance?

    Science.gov (United States)

    2012-12-01

    gather the information required to conduct effective oversight many intelligence abuses ensued. The 1972 Watergate scandal was the event that...Political Science 28, no. 1 (1984): 166. 6 scandals or failures for its 65-year history. Although there have been instances where fire alarm...their findings. The Iran-Contra scandal occurred less than ten years later. Furthermore, the intelligence community’s slow adaptation to the post

  15. Department of Homeland Security Cyber Resilience Review (Case Study)

    Science.gov (United States)

    2014-01-23

    results CERT® Operational Resilience: Manage, Protect, and Sustain Twitter #CERTopRES © 2013 Carnegie Mellon University CRR Benefits Participating...Management CTRL Controls Management VM Vulnerability Management IM Incident Management SCM Service Continuity Management EXD External...established in Asset Management benefits the organization as it manages changes. CERT® Operational Resilience: Manage, Protect, and Sustain

  16. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  17. Expanding the Role of Emergency Medical Services in Homeland Security

    Science.gov (United States)

    2013-03-01

    Medical Services FEMA Federal Emergency Management Agency FBI Federal Bureau of Investigation H1N1 Influenza a Virus HIPAA Health Information...Smyth, William G. Manley, Daniel E. Summers, Nels D. Sanddal, Teri L. Sanddal, et al. “Realities of Rural Emergency Medical Services Disaster

  18. Will Climate Change the Future of Homeland Security

    Science.gov (United States)

    2016-09-01

    Brookings-Bern Project on Internal Displacement, 2013), 9–18, http://www.brookings.edu/~/media/ research /files/ papers /2013/1/30-arctic-alaska-bronen...nuclear sources, and renewable energy resources (hydro, wind, biomass, geothermal , and solar power) are also used in the generation of... Research Program, 2014), 119, http://nca2014.globalchange.gov/ report/sectors/ energy . 57 According to Climate Change Impacts in the United States

  19. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    hard way and his lack of crisis communication skills was a career ender for him during Hurricane Katrina (MSNBC, 2005). In contrast, former New...disruptions,” that is those game -changing events where your messages may no longer work. That leads into the final recommendation of having a contingency...Winning in the no-spin era by someone who knows the game . New York: Free Press. CNN. (2007, May 7). Greensburg focuses on rebuilding. Retrieved January

  20. Public Health Specializations and Education Needs to Support Homeland Security

    Science.gov (United States)

    2006-03-01

    Hazmat 1/1 100 4 Health Consultant Interface with Law Enforcement 1/1 100 4 Hematology 1/1 100 4 Hospital Administrators 3/7 43 30 Hospital Safety...Forensics Experts 0/1 0 4 Grants Oversight 0/2 0 9 Hazmat 1/1 100 4 Health Consultant Interface with Law Enforcement 0/1 0 4 Hematology 0/1 0 4...Specializations Required Workforce Gaps (yes/no) Other Comments Veterinarians Yes Epidemiologists Yes Physicians No Plenty of physicians available but

  1. The National Guard: A Future Homeland Security Paradigm?

    Science.gov (United States)

    2007-11-02

    Arabia (1995); bombing of a U.S. military complex “Khobar Towers” in Saudi Arabia (1996); U.S. Embassy bombings in Nairobi, Kenya and Dar Ex Salaam...on the U.S, its forces, and allies. The Triad continues to be the foundation of America’s national strategy of deterrence. The Triad consists of...ballistic missile submarines, land- based intercontinental ballistic missiles and long-range bombers. Each component, or leg, of the Triad provides a

  2. Homeland Security Organizations: Design Contingencies in Complex Environments

    Science.gov (United States)

    2011-09-01

    in Charge Cell OMT Organization and Management Theory OPERATIONS Section Los Angeles County Operational Area Unified Command- Operations Section...and management theory” ( OMT ). The OMT literature suggests that no single organizational design is optimal in all situations, nor do all designs...referred to as Organization and Management Theory ( OMT )—have been extensively examined in the literature, using at various times and by different

  3. Homeland Security: Federal Assistance Funding and Business Opportunities

    Science.gov (United States)

    2003-08-14

    for many states under the State Single Point of Contact ( SPOCs ) section available at [http://www.whitehouse.gov/omb/grants/spoc.html]. A similar...government, employees and students at U.S. educational institutions, and other eligible members of the general public. Background information on the RaDiUS

  4. Japan as a Paradigm for U.S. Homeland Security

    Science.gov (United States)

    2006-12-01

    the dead cause the everyday problems of the living and emphasizes liberation from stress through meditation .118 In 1984, he and his wife started...www.jijigaho.or.jp/ app /0404/eng/iraq01.html (accessed December 6, 2005). 196 Prime Minister of Japan and His Cabinet, Japan’s Assistance for the...Defense Forces to assist in Reconstruction.” http://www.jijigaho.or.jp/ app /0404/eng/iraq01.html (accessed December 6, 2005). Kaplan, David E. and

  5. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-10-09

    ..., student veterans, and recent graduates to jobs at DHS; how to use social media and other means of..., and other Minority Serving Institutions know of and take advantage of DHS internship and job...

  6. Developing the Bench: Building An Effective Homeland Security Undergraduate Program

    Science.gov (United States)

    2008-03-01

    University Savannah State University Jacksonville State University AMERICAN PUBLIC UNIVERSITY University of Maryland University College...DATA University Courses American Public University - Charles Town, WV Emergency Planning Emergency Response to Terrorism Chemical...0195095707 AMERICAN PUBLIC UNIVERSITY 0195142632 University of Central Missouri 0195158342 Empire State College 0195332474 Virginia Commonwealth

  7. The Strategic Value of Humanitarian Immigration Policy Toward Homeland Security

    Science.gov (United States)

    2008-03-01

    E. Beutler, James N. Breckenridge, and Philip Zimbardo (New York, NY: Oxford University Press, 2007), 14-15. 6 Ibid., 16-17. 11 that is worth...ed. Bruce Bongar, Lisa M. Brown, Larry E. Beutler, James N. Breckenridge, and Philip Zimbardo . New York, NY: Oxford University Press, 2007...the United States. In his recent book Winning the Right War, Philip Gordon writes: It is difficult today to imagine a world without the Islamist

  8. Homeland Security Department: FY2008 Request for Appropriations

    Science.gov (United States)

    2007-05-17

    body imaging; explosive trace detection portal machines; cast and prosthetic device scanners; and bottled liquid scanners. The effectiveness of these...BioWatch programs, which will be transferred from the Science and Technology Directorate (S&T), and the National Biosurveillance Integration System (NBIS...left in place following the reorganizations mentioned above. One notable exception was the transfer of the Biosurveillance sub-program to the new Office

  9. Quantifying a Negative: How Homeland Security Adds Value

    Science.gov (United States)

    2015-12-01

    Many studies and publications examine fire spread of closely spaced buildings, including “On Radiant Heat Transfer from Turbulent Flames” by Cox.4...flame effects how much radiant heat is put out. This study was the foundation for modeling fire spread in urban and wildland environments. In 2002...Technical Note 1600) (Washington, DC: National Institute of Standards and Technology, 2006). 4 Gordon Cox, “On Radiant Heat Transfer from Turbulent

  10. 78 FR 39301 - Committee name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-07-01

    ... recommendations to the Secretary and senior leadership on matters relating to student and recent graduate... Centers of Academic Excellence cybersecurity programs to the higher education community; how to define...

  11. The Role of the Corps of Engineers in Homeland Security

    Science.gov (United States)

    2007-11-02

    companies and pipe line companies could be required in a TF dealing with a coastal area or a large sea or river port. A revised model for the engineer...Hampshire, Vermont, Rhode Island, Connecticut, Mass) ELEMENT UNIT STATE COMPONENT Engineer RTF 240th EN GRP Maine Army NG HQ’s (CONST) Construction...Virginia, Virginia, Maryland, Delaware, and D.C.) ELEMENT UNIT STATE COMPONENT Engineer RTF 11 1th EN GRP WV Army NG HQ’s (COST) Construction BN 1092nd

  12. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Coast of the United States in 2005. In January 2013, U.S. Senator Harry Reid compared Hurricane Sandy to Hurricane Katrina. His comments indicated...163 Bruce Alpert , “Reid Says Hurricane Katrina was ‘Nothing in Comparison’ to Sandy,” The Times- Picayne...PAGE INTENTIONALLY LEFT BLANK 79 LIST OF REFERENCES Alpert , Bruce. “Reid Says Hurricane Katrina was ‘Nothing in Comparison’ to Sandy.” The Times

  13. Overview of Infrastructure Science and Analysis for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-07-21

    This presentation offers an analysis of infrastructure science with goals to provide third-party independent science based input into complex problems of national concern and to use scientific analysis to "turn down the noise" around complex problems.

  14. The Affordable Care Act: A Prescription for Homeland Security Preparedness?

    Science.gov (United States)

    2014-09-01

    Eddie Reed, Eduardo J. Simoes, and M. M. Engel . “When Chronic Conditions Become Acute: Prevention and Control of Chronic Diseases and Adverse...Fewer Insured and $8.4 Billion Less in Federal Payments.” Health Affairs 32, no. 6 (2013): 1030–1036. Ringel, Jeanne S., Federico Girosi, Amado

  15. Does Homeland Security Constitute an Emerging Academic Discipline?

    Science.gov (United States)

    2013-03-01

    disciplines that make it easy for them to find a job and receive good pay. 7. Entrepreneurs will enter and firms will expand in sectors that promise to be...publication 12. Percent female students 3. Percent faculty with grants 13. Percent international students 4. Awards per allocated faculty member 14...time to degree 7. Percent female faculty 17. Percent students with academic plans 8. Average GRE scores 18. Student work space 9. Percent 1st-yr

  16. Legislating Civil Service Reform: The Homeland Security Act of 2002

    Science.gov (United States)

    2006-06-22

    stage for future agency-specific chapters for NASA , the SEC, DOD and DHS. 4. The George W. Bush Administration The George W. Bush administration came...they are going to follow your line because you control their pay, their determination at will, their layoff .”97 There were also questions about whether

  17. U.S. Army Special Forces and Homeland Security Operations

    Science.gov (United States)

    2008-03-01

    This force helped rescue people on the coast, but was soon diverted to help search for victims in New Orleans.96 Governor Arnold Schwarzenegger ...Governor, Arnold Schwarzenegger . September 1, 2005. 98 “Guard Adding 18 to Katrina Effort,” Deseret News (Salt Lake City, UT) September 14, 2005. 99...Governor, Arnold Schwarzenegger . September 1, 2005. 75 McGillis, Gay. “Organizing NORTHCOM for Success: A Theater Special Operations Command

  18. The Italian Army’s Role in Homeland Security

    Science.gov (United States)

    2003-04-07

    Roma: Stato Maggiore dell’Esercito – Reparto Impiego delle Forze, Ottobre 2000), B/1-2. 6 Norme di principio sulla disciplina militare, Legge 382, art...contrastare la criminalita` organizzata in Sicilia. Decreto-legge 349 (25 Luglio 1992). Norme di principio sulla disciplina militare. Legge 382 (11 Luglio

  19. The Development and Recognition of Homeland Security Law

    Science.gov (United States)

    2007-03-01

    and I owe them a continuing debt of gratitude. Finally, and most importantly, I am eternally grateful to my wife, Annie; son, Jim; and daughter...at the state or federal level, is familiar with the requirements of Freedom of Information Acts or state sunshine laws. Judge Advocates have the

  20. Enhancing Public Helicopter Safety as a Component of Homeland Security

    Science.gov (United States)

    2016-12-01

    the area to assist with neutralizing the threat, and they can also extract injured people for immediate medical care. Search and rescue is another...on scene reported the weather conditions as “very bad with strong winds, cold temperatures, snow or sleet, and...responders who run toward an active shooting scene while others are running away. This type of training cannot be applied to aviation since there is usually

  1. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    Science.gov (United States)

    2012-03-01

    James Monroe in 1823 ( Martin , n.d.). There is also political doctrine, such as egalitarianism a “political doctrine that holds that all people...be able to engage a larger stakeholder community and avoid the need for a huge new bureaucracy (Linde, O’Brien, Lindstrom , Spiegeleire, Vayrynen...Presentation, Osan Air Force Base, South Korea. 74 Linde, E., O’Brien, K., Lindstrom , G., Spiegeleire, S., Vayrynen, M., & de Vries, H. (2002

  2. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    ... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment... will serve as an ex officio member of the Compensation Committee. DHS will provide technical staff to...

  3. U.S. Army Unmanned Aircraft Systems Roadmap 2010-2035: Eyes of the Army

    Science.gov (United States)

    2010-04-09

    Department of Energy , Department of Forestry, and National Geological Survey Service are rapidly acquiring SUAS to provide border security, locate...shantytowns, and skyscraper canyons to rural and sparsely populated environments consisting of high mountains and deserts, jungles, rolling woods...suitable for small unit operations, could include night vision sensors, ground surveillance radar, sensor-equipped unmanned air vehicles, low- energy

  4. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  5. 78 FR 55089 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-09-09

    ... via a web enabled interactive online format and teleconference line. To participate via teleconference... advice, consults with, and makes recommendations to the Secretary of Homeland Security, via...

  6. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-03-18

    ... web enabled interactive online format and teleconference line. To participate via teleconference, dial..., consults with, and makes recommendations to the Secretary of Homeland Security, via the Commandant of...

  7. Unmanned Aerial Vehicle (UAV) Dynamic-Tracking Directional Wireless Antennas for Low Powered Applications that Require Reliable Extended Range Operations in Time Critical Scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Scott G. Bauer; Matthew O. Anderson; James R. Hanneman

    2005-10-01

    The proven value of DOD Unmanned Aerial Vehicles (UAVs) will ultimately transition to National and Homeland Security missions that require real-time aerial surveillance, situation awareness, force protection, and sensor placement. Public services first responders who routinely risk personal safety to assess and report a situation for emergency actions will likely be the first to benefit from these new unmanned technologies. ‘Packable’ or ‘Portable’ small class UAVs will be particularly useful to the first responder. They require the least amount of training, no fixed infrastructure, and are capable of being launched and recovered from the point of emergency. All UAVs require wireless communication technologies for real- time applications. Typically on a small UAV, a low bandwidth telemetry link is required for command and control (C2), and systems health monitoring. If the UAV is equipped with a real-time Electro-Optical or Infrared (EO/Ir) video camera payload, a dedicated high bandwidth analog/digital link is usually required for reliable high-resolution imagery. In most cases, both the wireless telemetry and real-time video links will be integrated into the UAV with unity gain omni-directional antennas. With limited on-board power and payload capacity, a small UAV will be limited with the amount of radio-frequency (RF) energy it transmits to the users. Therefore, ‘packable’ and ‘portable’ UAVs will have limited useful operational ranges for first responders. This paper will discuss the limitations of small UAV wireless communications. The discussion will present an approach of utilizing a dynamic ground based real-time tracking high gain directional antenna to provide extend range stand-off operation, potential RF channel reuse, and assured telemetry and data communications from low-powered UAV deployed wireless assets.

  8. Bespilotne letjelice : Unmanned aerial vehicles

    Directory of Open Access Journals (Sweden)

    Vlado Jurić

    2016-12-01

    Full Text Available Bespilotne letjelice imaju širok spektar uporabe, i svrha im svakim danom sve više dobiva na značaju. Konstrukcija im se poboljšava, pronalaze se materijali koji su optimalniji za obavljanje funkcija s kojima se trebaju suočiti. Pravna regulativa za bespilotne letjelice do 150 kg težine na polijetanju (MTOW se razlikuje od države do države. : Unmanned aerial vehicles have a wide range of applications, and their purpose is every day more important. Construction has been improving, finding the materials that are optimal for carrying out the functions which need to be cope with. Legal regulations for unmanned aircrafts up to 150 kg take-off weight (MTOW varies from country to country.

  9. Dropsonde System for Unmanned Aerial Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Unmanned Aerial Vehicles (UAVs) are assuming more numerous and increasingly important roles in global environmental and atmospheric research. There is a...

  10. Unmanned aircraft systems as wingmen

    Science.gov (United States)

    Garcia, Richard; Barnes, Laura; Fields, MaryAnne

    2010-04-01

    This paper introduces a concept towards integrating manned and Unmanned Aircraft Systems (UASs) into a highly functional team though the design and implementation of 3-D distributed formation/flight control algorithms with the goal to act as wingmen for a manned aircraft. This method is designed to minimize user input for team control, dynamically modify formations as required, utilize standard operating formations to reduce pilot resistance to integration, and support splinter groups for surveillance and/or as safeguards between potential threats and manned vehicles. The proposed work coordinates UAS members by utilizing artificial potential functions whose values are based on the state of the unmanned and manned assets including the desired formation, obstacles, task assignments, and perceived intentions. The overall unmanned team geometry is controlled using weighted potential fields. Individual UAS utilize fuzzy logic controllers for stability and navigation as well as a fuzzy reasoning engine for flight path intention prediction. Approaches are demonstrated in simulation using the commercial simulator X-Plane and controllers designed in Matlab/Simulink. Experiments include trail and right echelon formations as well as splinter group surveillance.

  11. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  12. 49 CFR 1580.105 - Reporting significant security concerns.

    Science.gov (United States)

    2010-10-01

    ... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  13. 49 CFR 1580.203 - Reporting significant security concerns.

    Science.gov (United States)

    2010-10-01

    ..., Scenic, Historic and Excursion Operators, and Private Cars § 1580.203 Reporting significant security... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.203... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  14. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A...

  15. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... Security (AMS) Plan. 103.505 Section 103.505 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.505 Elements of the Area Maritime Security (AMS) Plan. The AMS Plan should address...

  16. 33 CFR 103.510 - Area Maritime Security (AMS) Plan review and approval.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Area Maritime Security (AMS) Plan... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.510 Area Maritime Security (AMS) Plan review and approval. Each AMS Plan will be...

  17. Unmanned Aerial Vehicles unique cost estimating requirements

    Science.gov (United States)

    Malone, P.; Apgar, H.; Stukes, S.; Sterk, S.

    Unmanned Aerial Vehicles (UAVs), also referred to as drones, are aerial platforms that fly without a human pilot onboard. UAVs are controlled autonomously by a computer in the vehicle or under the remote control of a pilot stationed at a fixed ground location. There are a wide variety of drone shapes, sizes, configurations, complexities, and characteristics. Use of these devices by the Department of Defense (DoD), NASA, civil and commercial organizations continues to grow. UAVs are commonly used for intelligence, surveillance, reconnaissance (ISR). They are also use for combat operations, and civil applications, such as firefighting, non-military security work, surveillance of infrastructure (e.g. pipelines, power lines and country borders). UAVs are often preferred for missions that require sustained persistence (over 4 hours in duration), or are “ too dangerous, dull or dirty” for manned aircraft. Moreover, they can offer significant acquisition and operations cost savings over traditional manned aircraft. Because of these unique characteristics and missions, UAV estimates require some unique estimating methods. This paper describes a framework for estimating UAV systems total ownership cost including hardware components, software design, and operations. The challenge of collecting data, testing the sensitivities of cost drivers, and creating cost estimating relationships (CERs) for each key work breakdown structure (WBS) element is discussed. The autonomous operation of UAVs is especially challenging from a software perspective.

  18. Analysis of Unmanned Systems in Military Logistics

    Science.gov (United States)

    2016-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. ANALYSIS OF UNMANNED SYSTEMS IN......these systems by using archival analysis and case studies. Finally, we addressed recommendations on the current and future uses of unmanned systems in

  19. International Conference on Intelligent Unmanned Systems (ICIUS)

    CERN Document Server

    Kartidjo, Muljowidodo; Yoon, Kwang-Joon; Budiyono, Agus; Autonomous Control Systems and Vehicles : Intelligent Unmanned Systems

    2013-01-01

    The International Conference on Intelligent Unmanned Systems 2011 was organized by the International Society of Intelligent Unmanned Systems and locally by the Center for Bio-Micro Robotics Research at Chiba University, Japan. The event was the 7th conference continuing from previous conferences held in Seoul, Korea (2005, 2006), Bali, Indonesia (2007), Nanjing, China (2008), Jeju, Korea (2009), and Bali, Indonesia (2010). ICIUS 2011 focused on both theory and application, primarily covering the topics of robotics, autonomous vehicles, intelligent unmanned technologies, and biomimetics. We invited seven keynote speakers who dealt with related state-of-the-art technologies including unmanned aerial vehicles (UAVs) and micro air vehicles (MAVs), flapping wings (FWs), unmanned ground vehicles (UGVs), underwater vehicles (UVs), bio-inspired robotics, advanced control, and intelligent systems, among others. This book is a collection of excellent papers that were updated after presentation at ICIUS2011. All papers ...

  20. Unmanned Mobile Monitoring for Nuclear Emergency Response

    Energy Technology Data Exchange (ETDEWEB)

    Choi, YoungSoo; Park, JongWon; Kim, TaeWon; Jeong, KyungMin [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Severe accidents at nuclear power plant have led to significant consequences to the people, the environment or the facility. Therefore, the appropriate response is required for the mitigation of the accidents. In the past, most of responses were performed by human beings, but it was dangerous and risky. In this paper, we proposed unmanned mobile system for the monitoring of nuclear accident in order to response effectively. For the integrity of reactor cooling and containment building, reactor cooling pipe and hydrogen distribution monitoring with unmanned ground vehicle was designed. And, for the safety of workers, radiation distribution monitoring with unmanned aerial vehicle was designed. Unmanned mobile monitoring system was proposed to respond nuclear accidents effectively. Concept of reinforcing the integrity of RCS and containment building, and radiation distribution monitoring were described. RCS flow measuring, hydrogen distribution measuring and radiation monitoring deployed at unmanned vehicle were proposed. These systems could be a method for the preparedness of effective response of nuclear accidents.

  1. Unmanned aerial vehicles in astronomy

    Science.gov (United States)

    Biondi, Federico; Magrin, Demetrio; Ragazzoni, Roberto; Farinato, Jacopo; Greggio, Davide; Dima, Marco; Gullieuszik, Marco; Bergomi, Maria; Carolo, Elena; Marafatto, Luca; Portaluri, Elisa

    2016-07-01

    In this work we discuss some options for using Unmanned Aerial Vehicles (UAVs) for daylight alignment activities and maintenance of optical telescopes, relating them to a small numbers of parameters, and tracing which could be the schemes, requirements and benefits for employing them both at the stage of erection and maintenance. UAVs can easily reach the auto-collimation points of optical components of the next class of Extremely Large Telescopes. They can be equipped with tools for the measurement of the co-phasing, scattering, and reflectivity of segmented mirrors or environmental parameters like C2n and C2T to characterize the seeing during both the day and the night.

  2. Department of National Security Affairs [presentation

    OpenAIRE

    2016-01-01

    A slide presentation. The Department of National Security Affairs (NSA) offers fully accredited programs leading to the Master of Arts in Security Studies, as well as a Ph.D. program in Security Studies. In addition to specializing in traditional security domains such as nuclear proliferation, arms control, maritime strategy, interstate wars, insurgency, terrorism and homeland security, the NSA department conducts cutting edge research and education in the areas of cyber warfare, space politi...

  3. HYPERSONIC THREATS TO THE HOMELAND STRATEGIC OPTIONS

    Science.gov (United States)

    2017-03-28

    Fighter Squadron, Homestead Air Reserve Base Florida, Director of Operations 80th Fighter Squadron, 8 FW, Kunsan AB, Korea. Lt Col Jeffress...homeland, safeguards the decision space of our nation’s leaders and potentially strengthens military, diplomatic and economic instruments of power... leaders cannot default on their oath to support and defend the constitution against this emergent threat as they prioritize tasks for the administration

  4. Naval Mine Countermeasures: The Achilles Heel of U.S. Homeland Defense

    Science.gov (United States)

    2013-05-20

    further credence to this claim, the same document quotes John Brennan, then Assistant to the President for Homeland Security and Counterterrorism...SMCM), MH-53E airborne MCM (AMCM) helicopters, and explosive ordinance disposal (EOD) teams that operate remote MCM vehicles and employ marine mammal...result these new technology assets are not projected to enter initial operational test and evaluation ( IOT &E) until mid-2014 at the earliest. 21

  5. Dropsonde System for Unmanned Aerial Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — A small, modular dropsonde launcher is being developed for Unmanned Aerial Vehicles (UAVs). Some critical measurement needs can only be satisfied by in-situ...

  6. Rangeland monitoring with unmanned aerial vehicles (UAVs)

    Science.gov (United States)

    Unmanned aerial vehicles (UAVs) have great potential for rangeland management applications, such as monitoring vegetation change, developing grazing strategies, determining rangeland health, and assessing remediation treatment effectiveness. UAVs have several advantages: they can be deployed quickly...

  7. Unmanned Aircraft Systems - Digital Elevation Model

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The USGS National Unmanned Aircraft Systems (UAS) Project Office utilizes UAS technology for collecting remote sensing data on a local scale. Typical UAS projects...

  8. Tactical Unmanned Airlift: A Business Case Study

    Science.gov (United States)

    2010-06-01

    manned aircraft. The Honorable Randy Babbitt , FAA Administrator, in an interview with the author on January 7, 2010, listed his leading concerns on...UASs mingling with manned aircraft. Mr. Babbitt’s concerns with unmanned aircraft may be summed up in one word: safety ( Babbitt , 2010). In a...speech at the Aerospace Industry Association’s (AIA) Board of Governors Meeting on November 18, 2009, Mr. Babbitt asserted “unmanned aircraft systems

  9. Analysis of an Unmanned Aerial Vehicle Monitoring System for Resurveying of Shipping Routes

    Directory of Open Access Journals (Sweden)

    Urbahs Aleksandrs

    2016-12-01

    Full Text Available The paper gives brief description of the conventional and innovative hydrography survey methods and constraints connected with the realization. Proposed hydrographic survey system based on the use of Unmanned Aerial and Maritime systems provides functionality to conduct hydrographic measurements and environment monitoring. System can be easily adapted to fulfil marine safety and security operations, e.g. intrusion threat monitoring, hazardous pollutions monitoring and prevention operations, icing conditions monitoring.

  10. Test Operations Procedure (TOP) 02-2-546 Teleoperated Unmanned Ground Vehicle (UGV) Latency Measurements

    Science.gov (United States)

    2017-01-11

    A. Approved for public release; distribution is unlimited. 13. SUPPLEMENTARY NOTES Defense Technical Information Center (DTIC), AD No.: 14. ABSTRACT...discrete system components or measurements of latency in autonomous systems. 15. SUBJECT TERMS Unmanned Ground Vehicles, Basic Video Latency, End -to... End System Latency, Command-to-Action Latency 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 23 19a

  11. Optimized Routing of Unmanned Aerial Systems for the Interdiction of Improvised Explosive Devices

    Science.gov (United States)

    2007-09-01

    74 14. SUBJECT TERMS IEDs, IED Detection, IED Interdiction, Vehicle Routing Problem , Integer Program 16. PRICE CODE 17. SECURITY CLASSIFICATION...Special Operations Command VBA Visual Basic for Applications VMU-2 Marine Unmanned Aerial Vehicle Squadron 2 VRP Vehicle Routing Problem WCA Wind...bb/middle_east/jan-june07/ied_06-21.html. Toth, P. and Vigo, D. (2002). “The Vehicle Routing Problem .” Philadelphia, PA: Society for Industrial and

  12. A Review on Current and Emerging Application Possibilities for Unmanned Aerial Vehicles

    OpenAIRE

    Beloev Ivan H.

    2016-01-01

    This paper presents a review on current and emerging application possibilities for unmanned aerial vehicles (UAVs). The introduction section of the paper briefly describes some of the application areas in which drones are currently being used. The next chapters of the paper describe more detailly the use of UAVs for aerial photography, filming, security and logistics, GIS, land and water surveys. The main focus of the last chapters is on the advantages and the disadvantages of the drones usag...

  13. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-07-21

    ... government to complete a cyber network security assessment so that a full measure of gaps and capabilities... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD),...

  14. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-04-21

    ... a cyber network security assessment so that a full measure of gaps and capabilities can be completed... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate...

  15. Multi-sensor integration for unmanned terrain modeling

    Science.gov (United States)

    Sukumar, Sreenivas R.; Yu, Sijie; Page, David L.; Koschan, Andreas F.; Abidi, Mongi A.

    2006-05-01

    State-of-the-art unmanned ground vehicles are capable of understanding and adapting to arbitrary road terrain for navigation. The robotic mobility platforms mounted with sensors detect and report security concerns for subsequent action. Often, the information based on the localization of the unmanned vehicle is not sufficient for deploying army resources. In such a scenario, a three dimensional (3D) map of the area that the ground vehicle has surveyed in its trajectory would provide a priori spatial knowledge for directing resources in an efficient manner. To that end, we propose a mobile, modular imaging system that incorporates multi-modal sensors for mapping unstructured arbitrary terrain. Our proposed system leverages 3D laser-range sensors, video cameras, global positioning systems (GPS) and inertial measurement units (IMU) towards the generation of photo-realistic, geometrically accurate, geo-referenced 3D terrain models. Based on the summary of the state-of-the-art systems, we address the need and hence several challenges in the real-time deployment, integration and visualization of data from multiple sensors. We document design issues concerning each of these sensors and present a simple temporal alignment method to integrate multi-sensor data into textured 3D models. These 3D models, in addition to serving as a priori for path planning, can also be used in simulators that study vehicle-terrain interaction. Furthermore, we show our 3D models possessing the required accuracy even for crack detection towards road surface inspection in airfields and highways.

  16. The Technical Analysis of Unmanned Aircraft Catapult Launch%无人机弹射起飞技术分析

    Institute of Scientific and Technical Information of China (English)

    孙志宏

    2014-01-01

    针对无人机起飞安全问题,介绍了利用弹射架弹射起飞方式来提高无人机起飞安全系数,并详细阐述了弹射架种类及工作原理。%Aiming at the Security issues of Unmanned aircraft take off , the paper introduces that improving the safety factor of Un-manned Aircraft take off by using the technology of Catapult Launch , also introduces the Catapult Launch's species and principle .

  17. INTEGRATING UNMANNED AIRCRAFT VEHICLES IN THE ROMANIAN NATIONAL AIRSPACE

    Directory of Open Access Journals (Sweden)

    Sorana Alina Catinca POP

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles in the Romanian civil airspace brings us back to the 1920's, when the first aircraft started to fly over the Romanian sky. Little did the legislators at that time know how to create the proper legal framework for the use of such machines so that all aspects related to their use be covered, as well as identify all potential risks and effects. Nowadays, UAVs are the new aircraft and it is a challenge for the legislators to properly identify the legal framework so that the safety and security of civil aviation are not affected. The paper will address the challenges the regulator faces in the integration of the UAVs in the Romanian civil airspace, developments and issues raised by the current regulation, as well as aspects related to the national regulations expected to enter into force at the end of 2015, beginning of 2016.

  18. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... including: Evaluations or reports; Attendance at treatment or counseling programs; or Substance abuse... authorities to report, under state law, incidents of suspected child abuse or neglect to the extent described... or mental health counseling, treatment or evaluation. G. To the appropriate federal, state,...

  19. Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense

    Science.gov (United States)

    2012-05-17

    Principles in the Space and Information Age (New York: Frank Cass-Taylor & Francis , 2005), 36. 38 Andrew Krepinevich and Robert O. Work, A New US Global...Principles in the Space and Information Age. New York: Frank Cass-Taylor & Francis , 2005. Jeffreys-Jones, Rhodri. The FBI: A History. New Haven, CT... Bacon , 1971. Swain, Richard M. Lucky War: Third Army in Desert Storm. Washington, DC: U.S. Army Center of Military History, 1997. Turabian, Kate L. A

  20. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    difficult times. MLM , the “get done with that so you can visit more” mantra provided a lighthearted push to keep going. My Classmates Your varied...its down falls and should be used sparingly. Contracts between organizations provide the moral code by which they will interact. If policy makers

  1. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    we live on two volcanic rocks where two tectonic plates meet, in a somewhat lonely stretch of windswept ocean just above the Roaring Forties. If you...Management and Business Continuity Programs NGO non-government organization NIMS National Incident Management System NMSZ New Madrid seismic ...the New Madrid seismic zone22 and the Cascadia subduction zone along the northwest Pacific coast.23 An earthquake along the Cascadia fault lines

  2. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Science.gov (United States)

    2010-04-13

    ... a description denoting the type and character of each system of records that the agency maintains... records prepared by TSA employees, and responses to and results of approved psychological assessments or similar tests administered by TSA; (f) Results of telephonic or in-person interviews with program...

  3. Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense

    Science.gov (United States)

    2012-09-01

    Cartel, La Familia De Michoacan, the Juarez cartel, the Beltran Leyva Organization (BLO), and the Tijuana cartel. These organizations compete with each...to “expand operations into the territories of other cartels—and further challenge the sovereignty of the Mexican state.”35 The La Familia cartel...gains control of the populace and furthers its aims by infiltrating social, political, and religious organizations. La Familia uses religion to portray

  4. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    India; Indonesia; Iraq; Jerusalem, Israel; Jordan; Kuala Lumpur , Malaysia; Kuwait; Lebanon; Mexico; Morocco; Nigeria; Pakistan...merely administer the visa process. They warn that consular officers are too concerned about facilitating tourism and trade to scrutinize visa...consular officers emphasize the promotion of tourism , commerce, and cultural exchange and are lax in screening foreign nationals who want to come

  5. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ...). Portions of the system pertaining to investigations or prosecutions of violations of criminal law are... prosecution of violations or potential violations of Federal, State, local, or international criminal law... information, indicates a violation or potential violation of law, which includes criminal, civil,...

  6. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... other restrictions pertaining to airspace. (g) Other individuals who are connected to the transportation... indirect air carrier. (j) Aliens or other individuals designated by DHS/TSA who apply for flight training... and past citizenship information; immigration status; alien registration numbers; visa...

  7. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    following individuals and their private sector companies: Mrs. Yvette Limon , Assistant Director City of Laredo Bridge Department; Mr. Skip McMahon, of...Mrs. Yvette Limon , Assistant Director City of Laredo Bridge Department, phone and e-mail interviews with the author, August 2008. 42 vehicles during

  8. Homeland Security Within State Departments of Agriculture: Success Factors and Barriers to an Effective Security Program

    Science.gov (United States)

    2010-09-01

    2010 Thesis Co-Advisors: Samuel H. Clovis Gail F. Thomas THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No...DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2010 Author: Matthew J. Blackwood, PhD Approved by: Samuel H. Clovis , PhD...that I can give my children the same gifts you gave me love, support, and the desire to learn. To my advisors, Dr. Sam Clovis and Dr. Gail Thomas

  9. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... federal government's counter-terrorism efforts by assisting in the detection of individuals on federal... and Terrorism Prevention Act of 2004 (IRTPA),\\2\\ Congress directed TSA and DHS to assume from aircraft... General to establish an organization to consolidate the Federal Government's approach to terrorism...

  10. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    Robotics: The Key to Immediate Assessment & Response to Hazardous Situations, Mr. Alan Bignall, CEO, ReconRobotics Using Modeling and Simulation for...Corporation 9:20 am Reconnaissance Robotics: The Key to Immediate Assessment & Response to Hazardous Situations • Mr. Alan Bignall, CEO...Department of Employment and Economic Development 3:25 pm Prevention of Terrorism & Industry’s Role • Mr. Sam Brinkley , Vice

  11. Leveraging Knowledge Management Tools to Support Security Risk Management in the Department of Homeland Security

    Science.gov (United States)

    2011-12-01

    Administration NEN NASA Engineering Network NISAC National Infrastructure Simulation and Analysis Center NPIA National Policing Improvement... cognitive dimension,” “…of mental models, beliefs, and perspectives so ingrained that we take them for granted, and therefore cannot easily...tacit knowledge and experience through mentoring and apprenticeship on decades long projects. Time and budget pressures, along with an expanded array

  12. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... to the media when there exists a legitimate public interest in disclosing information. Release under... Handgun Violence Prevention Act. Both routine uses are duplicative. The retention and disposal section has... settlement negotiations or in connection with criminal law proceedings. R. To the news media and the...

  13. Unmanned Aerial Vehicle Systems for Disaster Relief: Tornado Alley

    Science.gov (United States)

    DeBusk, Wesley M.

    2009-01-01

    Unmanned aerial vehicle systems are currently in limited use for public service missions worldwide. Development of civil unmanned technology in the United States currently lags behind military unmanned technology development in part because of unresolved regulatory and technological issues. Civil unmanned aerial vehicle systems have potential to augment disaster relief and emergency response efforts. Optimal design of aerial systems for such applications will lead to unmanned vehicles which provide maximum potentiality for relief and emergency response while accounting for public safety concerns and regulatory requirements. A case study is presented that demonstrates application of a civil unmanned system to a disaster relief mission with the intent on saving lives. The concept utilizes unmanned aircraft to obtain advanced warning and damage assessments for tornados and severe thunderstorms. Overview of a tornado watch mission architecture as well as commentary on risk, cost, need for, and design tradeoffs for unmanned aerial systems are provided.

  14. Common Operating Picture: UAV Security Study

    Science.gov (United States)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  15. Afghanistan’s Security Environment

    Science.gov (United States)

    2009-11-05

    continue to depend on treacherous overland routes. Although sensitive equipment is flown in by plane, supply convoys moving overland from Pakistan...Lieberman Chair The Honorable Susan M. Collins Ranking Member Committee on Homeland Security and Governmental Affairs United States Senate

  16. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Science.gov (United States)

    2010-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  17. Flying Unmanned Aircraft: A Pilot's Perspective

    Science.gov (United States)

    Pestana, Mark E.

    2011-01-01

    The National Aeronautics and Space Administration (NASA) is pioneering various Unmanned Aircraft System (UAS) technologies and procedures which may enable routine access to the National Airspace System (NAS), with an aim for Next Gen NAS. These tools will aid in the development of technologies and integrated capabilities that will enable high value missions for science, security, and defense, and open the door to low-cost, extreme-duration, stratospheric flight. A century of aviation evolution has resulted in accepted standards and best practices in the design of human-machine interfaces, the displays and controls of which serve to optimize safe and efficient flight operations and situational awareness. The current proliferation of non-standard, aircraft-specific flight crew interfaces in UAS, coupled with the inherent limitations of operating UAS without in-situ sensory input and feedback (aural, visual, and vestibular cues), has increased the risk of mishaps associated with the design of the "cockpit." The examples of current non- or sub- standard design features range from "annoying" and "inefficient", to those that are difficult to manipulate or interpret in a timely manner, as well as to those that are "burdensome" and "unsafe." A concerted effort is required to establish best practices and standards for the human-machine interfaces, for the pilot as well as the air traffic controller. In addition, roles, responsibilities, knowledge, and skill sets are subject to redefining the terms, "pilot" and "air traffic controller", with respect to operating UAS, especially in the Next-Gen NAS. The knowledge, skill sets, training, and qualification standards for UAS operations must be established, and reflect the aircraft-specific human-machine interfaces and control methods. NASA s recent experiences flying its MQ-9 Ikhana in the NAS for extended duration, has enabled both NASA and the FAA to realize the full potential for UAS, as well as understand the implications of

  18. Unmanned aerial survey of elephants.

    Directory of Open Access Journals (Sweden)

    Cédric Vermeulen

    Full Text Available The use of a UAS (Unmanned Aircraft System was tested to survey large mammals in the Nazinga Game Ranch in the south of Burkina Faso. The Gatewing ×100™ equipped with a Ricoh GR III camera was used to test animal reaction as the UAS passed, and visibility on the images. No reaction was recorded as the UAS passed at a height of 100 m. Observations, made on a set of more than 7000 images, revealed that only elephants (Loxodonta africana were easily visible while medium and small sized mammals were not. The easy observation of elephants allows experts to enumerate them on images acquired at a height of 100 m. We, therefore, implemented an aerial strip sample count along transects used for the annual wildlife foot count. A total of 34 elephants were recorded on 4 transects, each overflown twice. The elephant density was estimated at 2.47 elephants/km(2 with a coefficient of variation (CV% of 36.10%. The main drawback of our UAS was its low autonomy (45 min. Increased endurance of small UAS is required to replace manned aircraft survey of large areas (about 1000 km of transect per day vs 40 km for our UAS. The monitoring strategy should be adapted according to the sampling plan. Also, the UAS is as expensive as a second-hand light aircraft. However the logistic and flight implementation are easier, the running costs are lower and its use is safer. Technological evolution will make civil UAS more efficient, allowing them to compete with light aircraft for aerial wildlife surveys.

  19. Unmanned aerial survey of elephants.

    Science.gov (United States)

    Vermeulen, Cédric; Lejeune, Philippe; Lisein, Jonathan; Sawadogo, Prosper; Bouché, Philippe

    2013-01-01

    The use of a UAS (Unmanned Aircraft System) was tested to survey large mammals in the Nazinga Game Ranch in the south of Burkina Faso. The Gatewing ×100™ equipped with a Ricoh GR III camera was used to test animal reaction as the UAS passed, and visibility on the images. No reaction was recorded as the UAS passed at a height of 100 m. Observations, made on a set of more than 7000 images, revealed that only elephants (Loxodonta africana) were easily visible while medium and small sized mammals were not. The easy observation of elephants allows experts to enumerate them on images acquired at a height of 100 m. We, therefore, implemented an aerial strip sample count along transects used for the annual wildlife foot count. A total of 34 elephants were recorded on 4 transects, each overflown twice. The elephant density was estimated at 2.47 elephants/km(2) with a coefficient of variation (CV%) of 36.10%. The main drawback of our UAS was its low autonomy (45 min). Increased endurance of small UAS is required to replace manned aircraft survey of large areas (about 1000 km of transect per day vs 40 km for our UAS). The monitoring strategy should be adapted according to the sampling plan. Also, the UAS is as expensive as a second-hand light aircraft. However the logistic and flight implementation are easier, the running costs are lower and its use is safer. Technological evolution will make civil UAS more efficient, allowing them to compete with light aircraft for aerial wildlife surveys.

  20. Unmanned Vehicle Material Flammability Test

    Science.gov (United States)

    Urban, David; Ruff, Gary A.; Fernandez-Pello, A. Carlos; T’ien, James S.; Torero, Jose L.; Cowlard, Adam; Rouvreau, Sebastian; Minster, Olivier; Toth, Balazs; Legros, Guillaume; Eigenbrod, Christian; Smirnov, Nickolay; Fujita, Osamu; Jomaas, Grande

    2013-01-01

    Microgravity combustion phenomena have been an active area of research for the past 3 decades however, there have been very few experiments directly studying spacecraft fire safety under low-gravity conditions. Furthermore, none of these experiments have studied sample and environment sizes typical of those expected in a spacecraft fire. All previous experiments have been limited to samples of the order of 10 cm in length and width or smaller. Terrestrial fire safety standards for all other habitable volumes on earth, e.g. mines, buildings, airplanes, ships, etc., are based upon testing conducted with full-scale fires. Given the large differences between fire behavior in normal and reduced gravity, this lack of an experimental data base at relevant length scales forces spacecraft designers to base their designs using 1-g understanding. To address this question a large scale spacecraft fire experiment has been proposed by an international team of investigators. This poster presents the objectives, status and concept of this collaborative international project to examine spacecraft material flammability at realistic scales. The concept behind this project is to utilize an unmanned spacecraft such as Orbital Cygnus vehicle after it has completed its delivery of cargo to the ISS and it has begun its return journey to earth. This experiment will consist of a flame spread test involving a meter scale sample ignited in the pressurized volume of the spacecraft and allowed to burn to completion while measurements are made. A computer modeling effort will complement the experimental effort. Although the experiment will need to meet rigorous safety requirements to ensure the carrier vehicle does not sustain damage, the absence of a crew removes the need for strict containment of combustion products. This will facilitate the examination of fire behavior on a scale that is relevant to spacecraft fire safety and will provide unique data for fire model validation. This will be

  1. 78 FR 46358 - Extension of Agency Information Collection Activity Under OMB Review: Security Programs for...

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under... against acts of criminal violence and air piracy, and the introduction of explosives, incendiaries,...

  2. Remote sensing and actuation using unmanned vehicles

    CERN Document Server

    Chao, Haiyang

    2012-01-01

    Unmanned systems and robotics technologies have become very popular recently owing to their ability to replace human beings in dangerous, tedious, or repetitious jobs. This book fill the gap in the field between research and real-world applications, providing scientists and engineers with essential information on how to design and employ networked unmanned vehicles for remote sensing and distributed control purposes. Target scenarios include environmental or agricultural applications such as river/reservoir surveillance, wind profiling measurement, and monitoring/control of chemical leaks.

  3. ARM Unmanned Aerial Systems Implementation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Schmid, Beat [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ivey, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-11-01

    Recent advances in Unmanned Aerial Systems (UAS) coupled with changes in the regulatory environment for operations of UAS in the National Airspace increase the potential value of UAS to the U.S. Department of Energy (DOE) Atmospheric Radiation Measurement (ARM) Climate Research Facility. UAS include unmanned aerial vehicles (UAV) and tethered balloon systems (TBS). The roles UAVs and TBSs could play within the ARM Facility, particularly science questions they could help address, have been discussed in several workshops, reports, and vision documents, including: This document describes the implementation of a robust and vigorous program for use of UAV and TBS for the science missions ARM supports.

  4. Small unmanned aircraft ballistic impact speed

    DEFF Research Database (Denmark)

    La Cour-Harbo, Anders

    2018-01-01

    A study of how smaller unmanned aircraft will fall in case of failure. The aim is to determine the impact speed of a drone givens its general shape and aerodynamic behavior. This will include both CFD simulations and real world test of ballistic drops of smaller drones.......A study of how smaller unmanned aircraft will fall in case of failure. The aim is to determine the impact speed of a drone givens its general shape and aerodynamic behavior. This will include both CFD simulations and real world test of ballistic drops of smaller drones....

  5. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  6. ALLOCATION OF MINI UNMANNED AERIAL VEHICLES FOR URGENT INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE REQUEST

    Directory of Open Access Journals (Sweden)

    Ömer Faruk KURBAN

    2016-01-01

    Full Text Available Urgent intelligence, surveillance and reconnaissance request has the priority for all security forces while intervening in the events. The objective of this project is to locate grand control location of Mini Unmanned Aerial Vehicle units which has different coverage capabilities, responsible for obtaining urgent intelligence, surveillance and reconnaissance the problem of finding the optimum locations of mini Unmanned Aerial Vehicle units is modeled firstly under no effect of changing weather and environmental circumstances as a Maximal Co- vering Location Problem and secondly by putting into the effect of changing weather and environmental circumstances as a Maximum Expected Covering Location problem. Totally seventeen different scenarios are developed for both model, five for Maximal Covering Lo- cation problem and twelve for Maximum Expected Covering Location problem. Optimal solutions were found by using GAMS. Finally, the changes in the optimal solutions are analyzed by altering the problem parameters.

  7. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  8. Middleware requirements for collaborative unmanned aerial vehicles

    DEFF Research Database (Denmark)

    Mohamed, Nader; Al-Jaroodi, Jameela; Jawhar, Imad

    2013-01-01

    With the recent advances in the aircraft technologies, software, sensors, and communications; unmanned aerial vehicles (UAVs) can offer a wide range of applications. Some of these applications may involve multiple UAVs that cooperate and collaborate to achieve a common goal. This kind...

  9. U.S. Unmanned Aerial Systems

    Science.gov (United States)

    2012-01-03

    49 Airships ...carry a human operator, use aerodynamic forces to provide vehicle lift, can fly autonomously or be piloted remotely, can be expendable or recoverable...85 Department of Defense, FY2009–2034 Unmanned Systems Integrated Roadmap (2009), p. 91. 86 For more information on blimps ( airships

  10. Adaptable formations utilizing heterogeneous unmanned systems

    Science.gov (United States)

    Barnes, Laura E.; Garcia, Richard; Fields, MaryAnne; Valavanis, Kimon

    2009-05-01

    This paper addresses the problem of controlling and coordinating heterogeneous unmanned systems required to move as a group while maintaining formation. We propose a strategy to coordinate groups of unmanned ground vehicles (UGVs) with one or more unmanned aerial vehicles (UAVs). UAVs can be utilized in one of two ways: (1) as alpha robots to guide the UGVs; and (2) as beta robots to surround the UGVs and adapt accordingly. In the first approach, the UAV guides a swarm of UGVs controlling their overall formation. In the second approach, the UGVs guide the UAVs controlling their formation. The unmanned systems are brought into a formation utilizing artificial potential fields generated from normal and sigmoid functions. These functions control the overall swarm geometry. Nonlinear limiting functions are defined to provide tighter swarm control by modifying and adjusting a set of control variables forcing the swarm to behave according to set constraints. Formations derived are subsets of elliptical curves but can be generalized to any curvilinear shape. Both approaches are demonstrated in simulation and experimentally. To demonstrate the second approach in simulation, a swarm of forty UAVs is utilized in a convoy protection mission. As a convoy of UGVs travels, UAVs dynamically and intelligently adapt their formation in order to protect the convoy of vehicles as it moves. Experimental results are presented to demonstrate the approach using a fully autonomous group of three UGVs and a single UAV helicopter for coordination.

  11. Unmanned ground vehicles for integrated force protection

    Science.gov (United States)

    Carroll, Daniel M.; Mikell, Kenneth; Denewiler, Thomas

    2004-09-01

    The combination of Command and Control (C2) systems with Unmanned Ground Vehicles (UGVs) provides Integrated Force Protection from the Robotic Operation Command Center. Autonomous UGVs are directed as Force Projection units. UGV payloads and fixed sensors provide situational awareness while unattended munitions provide a less-than-lethal response capability. Remote resources serve as automated interfaces to legacy physical devices such as manned response vehicles, barrier gates, fence openings, garage doors, and remote power on/off capability for unmanned systems. The Robotic Operations Command Center executes the Multiple Resource Host Architecture (MRHA) to simultaneously control heterogeneous unmanned systems. The MRHA graphically displays video, map, and status for each resource using wireless digital communications for integrated data, video, and audio. Events are prioritized and the user is prompted with audio alerts and text instructions for alarms and warnings. A control hierarchy of missions and duty rosters support autonomous operations. This paper provides an overview of the key technology enablers for Integrated Force Protection with details on a force-on-force scenario to test and demonstrate concept of operations using Unmanned Ground Vehicles. Special attention is given to development and applications for the Remote Detection Challenge and Response (REDCAR) initiative for Integrated Base Defense.

  12. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu,...

  13. 19 CFR 122.181 - Definition of Customs security area.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition...

  14. 46 CFR 15.1113 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Vessel Security Officer (VSO). 15.1113 Section 15.1113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Vessels Subject to Requirements of STCW § 15.1113 Vessel Security Officer (VSO). After July...

  15. Small Combatants for the Homeland Defense Mission

    Science.gov (United States)

    2013-03-01

    maritime related terrorism, weapons proliferation, transnational crime, piracy, environmental destruction, and illegal seaborne immigration.”35 But...humanitarian assistance, development assistance, environmental response operations, and security assistance. HA/DR missions can be both reactive and...Piracies and Felonies committed on the high Seas, and Offences against the Law of Nations.”70 Some of the first missions of the Navy were raids against

  16. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  17. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  18. What Price Security?

    Directory of Open Access Journals (Sweden)

    Donald C. Masters

    2009-01-01

    Full Text Available This article presents a critique of the Copenhagen Consensus Center's(CCC exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive procurement practices will also result in lower costs and higher returns on security investments.

  19. Vision enhanced navigation for unmanned systems

    Science.gov (United States)

    Wampler, Brandon Loy

    A vision based simultaneous localization and mapping (SLAM) algorithm is evaluated for use on unmanned systems. SLAM is a technique used by a vehicle to build a map of an environment while concurrently keeping track of its location within the map, without a priori knowledge. The work in this thesis is focused on using SLAM as a navigation solution when global positioning system (GPS) service is degraded or temporarily unavailable. Previous work on unmanned systems that lead up to the determination that a better navigation solution than GPS alone is first presented. This previous work includes control of unmanned systems, simulation, and unmanned vehicle hardware testing. The proposed SLAM algorithm follows the work originally developed by Davidson et al. in which they dub their algorithm MonoSLAM [1--4]. A new approach using the Pyramidal Lucas-Kanade feature tracking algorithm from Intel's OpenCV (open computer vision) library is presented as a means of keeping correct landmark correspondences as the vehicle moves through the scene. Though this landmark tracking method is unusable for long term SLAM due to its inability to recognize revisited landmarks, as opposed to the Scale Invariant Feature Transform (SIFT) and Speeded Up Robust Features (SURF), its computational efficiency makes it a good candidate for short term navigation between GPS position updates. Additional sensor information is then considered by fusing INS and GPS information into the SLAM filter. The SLAM system, in its vision only and vision/IMU form, is tested on a table top, in an open room, and finally in an outdoor environment. For the outdoor environment, a form of the slam algorithm that fuses vision, IMU, and GPS information is tested. The proposed SLAM algorithm, and its several forms, are implemented in C++ using an Extended Kalman Filter (EKF). Experiments utilizing a live video feed from a webcam are performed. The different forms of the filter are compared and conclusions are made on

  20. 76 FR 49503 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Airport Security

    Science.gov (United States)

    2011-08-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Renewal From OMB of One Current Public..., aircraft piracy, and the introduction of explosives, incendiaries, or weapons aboard an aircraft....

  1. International Symposium on Unmanned Aerial Vehicles

    CERN Document Server

    Oh, Paul; Piegl, Les

    2009-01-01

    Unmanned Aircraft Systems (UAS) have seen unprecedented levels of growth during the last decade in both military and civilian domains. It is anticipated that civilian applications will be dominant in the future, although there are still barriers to be overcome and technical challenges to be met. Integrating UAS into, for example, civilian space, navigation, autonomy, see-detect-and-avoid systems, smart designs, system integration, vision-based navigation and training, to name but a few areas, will be of prime importance in the near future. This special volume is the outcome of research presented at the International Symposium on Unmanned Aerial Vehicles, held in Orlando, Florida, USA, from June 23-25, 2008, and presents state-of-the-art findings on topics such as: UAS operations and integration into the national airspace system; UAS navigation and control; micro-, mini-, small UAVs; UAS simulation testbeds and frameworks; UAS research platforms and applications; UAS applications. This book aims at serving as ...

  2. Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project KDP-C Review

    Science.gov (United States)

    Grindle, Laurie; Sakahara, Robert; Hackenberg, Davis; Johnson, William

    2017-01-01

    safety and operational challenges of national airspace access by unmanned aircraft systems, or UAS. In the process, the project will work with other key stakeholders to define necessary deliverables and products to help enable such access. Within the project, NASA is focusing on five sub-projects. These five focus areas include assurance of safe separation of unmanned aircraft from manned aircraft when flying in the national airspace; safety-critical command and control systems and radio frequencies to enable safe operation of UAS; human factors issues for ground control stations; airworthiness certification standards for UAS avionics and integrated tests and evaluation designed to determine the viability of emerging UAS technology. Five Focus Areas of the UAS Integration in the NAS Project Separation Assurance Provide an assessment of how planned Next Generation Air Transportation System (NextGen) separation assurance systems, with different functional allocations, perform for UAS in mixed operations with manned aircraft Assess the applicability to UAS and the performance of NASA NextGen separation assurance systems in flight tests with realistic latencies and uncertain trajectories Assess functional allocations ranging from today's ground-based, controller-provided aircraft separation to fully autonomous airborne self-separation Communications Develop data and rationale to obtain appropriate frequency spectrum allocations to enable safe and efficient operation of UAS in the NAS Develop and validate candidate secure safety-critical command and control system/subsystem test equipment for UAS that complies with UAS international/national frequency regulations, standards and recommended practices and minimum operational and aviation system performance standards for UAS Perform analysis to support recommendations for integration of safety-critical command and control systems and air traffic control communications to ensure safe and efficient operation of UAS in the NAS

  3. 77 FR 63734 - Security Zone; James River, Kingsmill Resort, Williamsburg, VA

    Science.gov (United States)

    2012-10-17

    ...: Table of Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice of Proposed... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Security Zone; James River, Kingsmill Resort... establishing a temporary security zone on the James River in the vicinity of Kingsmill Resort...

  4. Counter Unmanned Aerial Systems Testing: Evaluation of VIS SWIR MWIR and LWIR passive imagers.

    Energy Technology Data Exchange (ETDEWEB)

    Birch, Gabriel Carlisle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Woo, Bryana Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-01-01

    This report contains analysis of unmanned aerial systems as imaged by visible, short-wave infrared, mid-wave infrared, and long-wave infrared passive devices. Testing was conducted at the Nevada National Security Site (NNSS) during the week of August 15, 2016. Target images in all spectral bands are shown and contrast versus background is reported. Calculations are performed to determine estimated pixels-on-target for detection and assessment levels, and the number of pixels needed to cover a hemisphere for detection or assessment at defined distances. Background clutter challenges are qualitatively discussed for different spectral bands, and low contrast scenarios are highlighted for long-wave infrared imagers.

  5. Precision wildlife monitoring using unmanned aerial vehicles

    OpenAIRE

    Jarrod C. Hodgson; Baylis, Shane M.; Rowan Mott; Ashley Herrod; Clarke, Rohan H.

    2016-01-01

    Unmanned aerial vehicles (UAVs) represent a new frontier in environmental research. Their use has the potential to revolutionise the field if they prove capable of improving data quality or the ease with which data are collected beyond traditional methods. We apply UAV technology to wildlife monitoring in tropical and polar environments and demonstrate that UAV-derived counts of colony nesting birds are an order of magnitude more precise than traditional ground counts. The increased count pre...

  6. GPS Based Autonomous Flight Control System for an Unmanned Airship

    Directory of Open Access Journals (Sweden)

    Vishnu G Nair,

    2014-01-01

    Full Text Available An unmanned airship, also known as a Unmanned aircraft System (UAS or a remotely piloted aircraft is a machine which functions either by the remote control of a navigator or pilot. The unmanned airship uses the autonomous flight, navigation and guidance based on the telemetry command of ground station. The Autonomous Flight Control System (AFCS [1] plays a key role in achieving the given requirements and missions. This paper introduces the overall design architecture of the hardware and software of the flight control systems in a 50m long unmanned airship

  7. High-performance computers for unmanned vehicles

    Science.gov (United States)

    Toms, David; Ettinger, Gil J.

    2005-10-01

    The present trend of increasing functionality onboard unmanned vehicles is made possible by rapid advances in high-performance computers (HPCs). An HPC is characterized by very high computational capability (100s of billions of operations per second) contained in lightweight, rugged, low-power packages. HPCs are critical to the processing of sensor data onboard these vehicles. Operations such as radar image formation, target tracking, target recognition, signal intelligence signature collection and analysis, electro-optic image compression, and onboard data exploitation are provided by these machines. The net effect of an HPC is to minimize communication bandwidth requirements and maximize mission flexibility. This paper focuses on new and emerging technologies in the HPC market. Emerging capabilities include new lightweight, low-power computing systems: multi-mission computing (using a common computer to support several sensors); onboard data exploitation; and large image data storage capacities. These new capabilities will enable an entirely new generation of deployed capabilities at reduced cost. New software tools and architectures available to unmanned vehicle developers will enable them to rapidly develop optimum solutions with maximum productivity and return on investment. These new technologies effectively open the trade space for unmanned vehicle designers.

  8. Homeland defence: arguments for a network centric approach

    CSIR Research Space (South Africa)

    Naudé, B

    2011-09-01

    Full Text Available interoperability issues. Several important factors that impact Homeland Defence are indicated in Figure 1. Threats and Characteristics The threats identified come in many guises and are categorised as follows for this discussion: a) Refugees b) Illegal...

  9. Control Systems Security Test Center - FY 2004 Program Summary

    Energy Technology Data Exchange (ETDEWEB)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  10. Autonomous Adaptation and Collaboration of Unmanned Vehicles for Tracking Submerged Contacts

    Science.gov (United States)

    2012-06-01

    MIT). MIT owns and operates two types of ASVs: the SCOUT platform, a robotic kayak that costs roughly $30,000 per unit, and a Clearpath Robotic’s...Department of Homeland Secu- ritys Port Security. • Leading commodities shipped include crude petroleum, petroleum products, chemicals, coal, and natural gas...If the Gaussian Variance is set too low then correct particles could be mistakenly discarded due to 75 natural noise. Table 5.2 shows the results for

  11. Unmanned air vehicle (UAV) ultra-persitence research

    Energy Technology Data Exchange (ETDEWEB)

    Dron, S. B.

    2012-03-01

    Sandia National Laboratories and Northrop Grumman Corporation Integrated Systems, Unmanned Systems (NGIS UMS) collaborated to further ultra-persistence technologies for unmanned air vehicles (UAVs). The greatest shortfalls in UAV capabilities have been repeatedly identified as (1) insufficient flight persistence or 'hang time,' (2) marginal electrical power for running higher power avionics and payload systems, and (3) inadequate communications bandwidth and reach. NGIS UMS requested support from Sandia to develop an ultra-persistent propulsion and power system (UP3S) for potential incorporation into next generation UAV systems. The team members tried to determine which energy storage and power generation concepts could most effectively push UAV propulsion and electrical power capabilities to increase UAV sortie duration from days to months while increasing available electrical power at least two-fold. Primary research and development areas that were pursued included these goals: perform general system engineering and integration analyses; develop initial thermal and electrical power estimates; provide mass, volume, dimensional, and balance estimates; conduct preliminary safety assessments; assess logistics support requirements; perform, preliminary assessments of any security and safeguards; evaluate options for removal, replacement, and disposition of materials; generally advance the potential of the UP3S concept. The effort contrasted and compared eight heat sources technologies, three power conversion, two dual cycle propulsion system configurations, and a single electrical power generation scheme. Overall performance, specific power parameters, technical complexities, security, safety, and other operational features were successfully investigated. Large and medium sized UAV systems were envisioned and operational flight profiles were developed for each concept. Heat source creation and support challenges for domestic and expeditionary operations were

  12. Strengthening Security during Sporting Events by Unmannde Aerial Vehicles

    NARCIS (Netherlands)

    Evers, L.

    2012-01-01

    This paper shows how Unmanned Aerial Vehicles (UAVs) can improve security in major sporting events. Given the increase in violence among sports fans it is important to timely monitor possible conflict locations. A UAV can patrol and remotely monitor the activity at these locations. Such a patrol tou

  13. Regional security assessments : a strategic approach to securing federal facilities

    OpenAIRE

    Consolini, Todd

    2009-01-01

    CHDS State/Local The 18 critical infrastructure sectors identified by the U.S. Department of Homeland Security form a vast and complex network of interdependent assets that supports the functioning of nearly every aspect of business, government, and commerce. The disruption of even one critical infrastructure sector by a terrorist attack or natural or manmade disaster is likely to have cascading effects on other sectors. As the Sector-Specific Agency for the Government Facilities Sector, t...

  14. The unmanned aerial vehicle; a small history of violence

    NARCIS (Netherlands)

    De Koning, R.V.

    2013-01-01

    At Aerospace Engineering, one can hardly miss the Unmanned Aerial Vehicle (UAV). Many commercial purposes have been investigated in recent years. Also, unmanned reconnaissance and combat aircraft attract more interest; in hazardous regions, small aircraft can be deployed to do risky, but necessary j

  15. Integrating the Unmanned Aircraft System into the National Airspace System

    Science.gov (United States)

    2011-06-18

    and the ground control system. The ground control system is comprised of several integrated components to include: avionics , fuel, navigation...accessed January 15, 2011). U.S. Army Unmanned Aircraft Systems Roadmap 2010-2035: Eyes of the Army. Fort Rucker, Ala .: U.S. Army Unmanned Aircraft

  16. EyeRobot TBI unmanned TelePresence reconnaissance mission

    NARCIS (Netherlands)

    Breejen, E. den; Jansen, C.

    2008-01-01

    There is an increasing use of unmanned systems in military operations. Effective use of unmanned ground vehicles (UGVs) for counter IED and reconnaissance tasks under battlefield conditions has been reported. For operations in urban environment, good real time situational awareness for the operator

  17. Unmanned Systems Integrated Roadmap, FY2013-2038

    Science.gov (United States)

    2014-01-01

    UGS must meet. Those environments could include being thrown or launched, climbing hills or stairs , and hopping and landing upright. The technologies...Persistent Resilience ......................................................................................................... 61 4.5.1 Size, Weight ...unmanned systems are inherently more persistent based on significantly better fuel/ weight ratios, unmanned systems’ design schema can be better optimized

  18. Manned-Unmanned Teaming of Aircraft - Literature Search

    Science.gov (United States)

    2013-12-01

    restricted to 2003 2013. Literature searches were conducted in eight databases Aerospace and High Technology, Scopus , NTIS, Inspec, Compendex, DTIC, Jane’si...Buddy Unmanned wingman Manned-Unmanned Teaming Dec 2013 Page 35 of 37 7.1.2 Sources Online databases • Scopus • Aerospace and High Technology

  19. EyeRobot TBI unmanned TelePresence reconnaissance mission

    NARCIS (Netherlands)

    Breejen, E. den; Jansen, C.

    2008-01-01

    There is an increasing use of unmanned systems in military operations. Effective use of unmanned ground vehicles (UGVs) for counter IED and reconnaissance tasks under battlefield conditions has been reported. For operations in urban environment, good real time situational awareness for the operator

  20. Students design unmanned drone to take action against terrorist activity

    OpenAIRE

    Nystrom, Lynn A.

    2010-01-01

    In less than two years, an unmanned aircraft search and rescue competition will be happening in a remote area in Australia. Kevin Kochersberger, director of the Unmanned System Lab at Virginia Tech, says he hopes to take a student design team and believes they have an excellent shot at winning the $50,000 prize money.

  1. The unmanned aerial vehicle; a small history of violence

    NARCIS (Netherlands)

    De Koning, R.V.

    2013-01-01

    At Aerospace Engineering, one can hardly miss the Unmanned Aerial Vehicle (UAV). Many commercial purposes have been investigated in recent years. Also, unmanned reconnaissance and combat aircraft attract more interest; in hazardous regions, small aircraft can be deployed to do risky, but necessary

  2. Optimal Deployment of Unmanned Aerial Vehicles for Border Surveillance

    Science.gov (United States)

    2014-06-01

    and intercept intruders that are trying to trespass a border. These intruders can include terrorists, drug traffickers, smugglers, illegal immigrants ...intruders can include terrorists, drug traffickers, smugglers, illegal immigrants , and others who represent a threat to national interests. Unmanned...traffickers, smugglers, illegal immigrants , and others who represent a threat to national interests. Unmanned aerial vehicles (UAVs) allow a modernization

  3. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  4. Transitioning Unmanned Technologies for Earth Science Applications

    Science.gov (United States)

    Wardell, L. J.; Douglas, J.

    2008-12-01

    Development of small unmanned aerial systems (UAS) has progressed dramatically in recent years along with miniaturization of sensor technology. This confluence of development paths has resulted in greater capability in smaller, less expensive platforms allowing research to be performed where manned airborne platforms are impractical or dangerous. Recent applications include small UAS for studies involving hurricanes, volcanic activity, sea ice changes, glacier melt, biological monitoring of land and sea species, wildfire monitoring, and others. However, the majority of UAS employed in these investigations were originally developed for non-civilian applications and many of the required interfaces are locked behind proprietary specifications, requiring expensive customization by the manufacturer to transform a military UAS into one suitable for civilian work. A small UAS for scientific research should be standards-based, low-cost, user friendly, field serviceable, and be designed to accept a range of payloads. The AV8R UAS is one example of an unmanned system that has been developed for specific application to earth observation missions. This system is designed to be operated by the user with difficult environmental conditions and field logistics in mind. Numerous features and innovations that advance this technology as a research tool as well as its planned science missions will be presented. Most importantly, all interfaces to the system required for successful design and integration of various payloads will be openly available. The environment of open, standards based development allow the small technologies companies that serve as the backbone for much of the technology development to participate in the rapid development of industry capabilities. This is particularly true with UAS technologies. Programs within the USA such as the STTR foster collaborations with small businesses and university researchers. Other innovations related to autonomous unmanned systems

  5. Networked Unmanned Aerial Vehicle Teams (NUAVT)

    Science.gov (United States)

    Ryan, Jack; Hanson, Curt; Jacobson, Steve

    2006-01-01

    A partnership between the NASA Ames Research Center and the NASA Dryden Flight Research Center (DFRC) explored the ability of small unmanned aircraft to support forest fire fighting using teaming behavior. The Networked UAV Teams project flight tested mission planning algorithms for multi-UAV cooperative transit, area search, and waypoint time-of-arrival that might someday allow the early detection of developing forest fires and support the gathering of images and atmospheric samples to help improve predictions of the future behavior of established fires.

  6. Adaptive control of an unmanned aerial vehicle

    Science.gov (United States)

    Nguen, V. F.; Putov, A. V.; Nguen, T. T.

    2017-01-01

    The paper deals with design and comparison of adaptive control systems based on plant state vector and output for unmanned aerial vehicle (UAV) with nonlinearity and uncertainty of parameters of the aircraft incomplete measurability of its state and presence of wind disturbances. The results of computer simulations of flight stabilization processes on the example of the experimental model UAV-70V (Aerospace Academy, Hanoi) with presence of periodic and non-periodic vertical wind disturbances with designed adaptive control systems based on plant state vector with state observer and plant output.

  7. Delivery of Unmanned Aerial Vehicle Data

    Science.gov (United States)

    Ivancic, William D.; Sullivan, Donald V.

    2011-01-01

    To support much of NASA's Upper Atmosphere Research Program science, NASA has acquired two Global Hawk Unmanned Aerial Vehicles (UAVs). Two major missions are currently planned using the Global Hawk: the Global Hawk Pacific (GloPac) and the Genesis and Rapid Intensification Processes (GRIP) missions. This paper briefly describes GloPac and GRIP, the concept of operations and the resulting requirements and communication architectures. Also discussed are requirements for future missions that may use satellite systems and networks owned and operated by third parties.

  8. Autonomous unmanned air vehicles (UAV) techniques

    Science.gov (United States)

    Hsu, Ming-Kai; Lee, Ting N.

    2007-04-01

    The UAVs (Unmanned Air Vehicles) have great potentials in different civilian applications, such as oil pipeline surveillance, precision farming, forest fire fighting (yearly), search and rescue, boarder patrol, etc. The related industries of UAVs can create billions of dollars for each year. However, the road block of adopting UAVs is that it is against FAA (Federal Aviation Administration) and ATC (Air Traffic Control) regulations. In this paper, we have reviewed the latest technologies and researches on UAV navigation and obstacle avoidance. We have purposed a system design of Jittering Mosaic Image Processing (JMIP) with stereo vision and optical flow to fulfill the functionalities of autonomous UAVs.

  9. Cooperative path planning of unmanned aerial vehicles

    CERN Document Server

    Tsourdos, Antonios; Shanmugavel, Madhavan

    2010-01-01

    An invaluable addition to the literature on UAV guidance and cooperative control, Cooperative Path Planning of Unmanned Aerial Vehicles is a dedicated, practical guide to computational path planning for UAVs. One of the key issues facing future development of UAVs is path planning: it is vital that swarm UAVs/ MAVs can cooperate together in a coordinated manner, obeying a pre-planned course but able to react to their environment by communicating and cooperating. An optimized path is necessary in order to ensure a UAV completes its mission efficiently, safely, and successfully.

  10. DESIGN OPTIMISATION OF AN UNMANNED UNDERWATER VEHICLE

    Directory of Open Access Journals (Sweden)

    FIRDAUS ABDULLAH

    2007-08-01

    Full Text Available The results of fluid flow simulation around an unmanned underwater vehicle (UUV are presented in this paper. The UUV represents a small submarine for underwater search and rescue operation, which suits the local river conditions. The flow simulation was performed with a commercially available computational fluid dynamics package, Star-CD. The effects of the UUV geometry on the velocity and pressure distributions on the UUV surface were discussed for Re=500,000 and 3,000,000. The discussion led to an improved design of the UUV with a smoother velocity profile around the UUV body.

  11. Developments and challenges for autonomous unmanned vehicles

    CERN Document Server

    Finn, Anthony

    2010-01-01

    It is widely anticipated that autonomous vehicles will have a transformational impact on military forces and will play a key role in many future force structures. As a result, many tasks have already been identified that unmanned systems could undertake more readily than humans. However, for this to occur, such systems will need to be agile, versatile, persistent, reliable, survivable and lethal. This will require many of the vehicles 'cognitive' or higher order functions to be more fully developed, whereas to date only the 'component' or physical functions have been successfully automated and

  12. Intelligent Unmanned Explorer for Deep Space Exploration

    CERN Document Server

    Kubota, T

    2008-01-01

    asteroids or comets have received remarkable attention in the world. In small body explorations, especially, detailed in-situ surface exploration by tiny rover is one of effective and fruitful means and is expected to make strong contributions towards scientific studies. JAXA ISAS is promoting MUSES C mission, which is the worlds first sample and return attempt to or from the near earth asteroid. Hayabusa spacecraft in MUSES C mission took the tiny rover, which was expected to perform the in-situ surface exploration by hopping. This paper describes the system design, mobility and intelligence of the developed unmanned explorer. This paper also presents the ground experimental results and the flight results.

  13. Unmanned Surface Combatant Considerations for Concept Exploration

    Science.gov (United States)

    2011-06-01

    the Journal of Field Robotics, August 2010. However, adapting this technology will have to take into consideration the larger size of the USC...at 55 ° C ~ 50 kW at 90 ° C 1 Energy efficiency ~ 82% Fire Protection 50 m 3 room size up to several 1,000 m 3 Energy Natural gas / biogas ...R.W.G. and Freire, P.E.M. “Unmanned cargo ships: a 2020 vision?” Journal of Marine Engineering and Technology: Part B: Proceedings of the IMarEST

  14. An Innovative Unmanned System for Advanced Environmental Monitoring: Design and Development

    Science.gov (United States)

    Marsella, Ennio; Giordano, Laura; Evangelista, Lorenza; Iengo, Antonio; di Filippo, Alessandro; Coppola, Aniello

    2015-04-01

    The paper summarizes the design and development of a new technology and tools for real-time coordination and control of unmanned vehicles for advanced environmental monitoring. A new Unmanned System has been developed at Institute for Coastal Marine Environmental - National Research Council (Italy), in the framework of two National Operational Programs (PON): Technological Platform for Geophysical and Environmental Marine Survey-PITAM and Integrated Systems and Technologies for Geophysical and Environmental Monitoring in coastal-marine areas-STIGEAC. In particular, the system includes one Unmanned Aerial Vehicle (UAV) and two Unmanned Marine Vehicles (UMV). Major innovations concern the implementation of a new architecture to control each drone and/or to allow the cooperation between heterogeneous vehicles, the integration of distributed sensing techniques and real-time image processing capabilities. Part of the research in these projects involves, therefore, an architecture, where the ground operator can communicate with the Unmanned Vehicles at various levels of abstraction using pointing devices and video viewing. In detail, a Ground Control Station (GCS) has been design and developed to allow the government in security of the drones within a distance up to twenty kilometers for air explorations and within ten nautical miles for marine activities. The Ground Control Station has the following features: 1. hardware / software system for the definition of the mission profiles; 3. autonomous and semi-autonomous control system by remote control (joystick or other) for the UAV and UMVs; 4. integrated control system with comprehensive visualization capabilities, monitoring and archiving of real-time data acquired from scientific payload; 5. open structure to future additions of systems, sensors and / or additional vehicles. In detail, the UAV architecture is a dual-rotor, with an endurance ranging from 55 to 200 minutes, depending on payload weight (maximum 26 kg) and

  15. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... 9, 2012. Additionally, this meeting will be broadcasted via a web enabled interactive online format... advice, consults with, and makes recommendations to the Secretary of Homeland Security, via the.... 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security...

  16. Sensing Hazards with Operational Unmanned Technology

    Science.gov (United States)

    Hood, R. E.

    2016-12-01

    The Unmanned Aircraft Systems (UAS) Program of the National Oceanic and Atmospheric Administration (NOAA) is working with the National Weather Service, the National Ocean Service, other Federal agencies, private industry, and academia to evaluate the feasibility of UAS observations to provide time critical information needed for situational awareness, prediction, warning, and damage assessment of hazards. This activity is managed within a portfolio of projects entitled "Sensing Hazards with Operational Unmanned Technology (SHOUT)." The diversity of this portfolio includes evaluations of high altitude UAS observations for high impact oceanic storms prediction to low altitude UAS observations of rivers, severe storms, and coastal areas for pre-hazard situational awareness and post-hazard damage assessments. Each SHOUT evaluation project begins with a proof-of-concept field demonstration of a UAS observing strategy for a given hazard and then matures to joint studies of both scientific data impact along with cost and operational feasibility of the observing strategy for routine applications. The technology readiness and preliminary evaulation results will be presented for several UAS observing strategies designed for improved observations of oceanic storms, floods, severe storms, and coastal ecosystem hazards.

  17. Dual field combination for unmanned video surveillance

    Science.gov (United States)

    Sarrabezolles, Louise; Manzanera, Antoine; Hueber, Nicolas; Perrot, Maxime; Raymond, Pierre

    2017-05-01

    Unmanned systems used for threat detection and identification are still not efficient enough for monitoring autonomously the battlefield. The limitation on size and energy makes those systems unable to use most state- of-the-art computer vision algorithms for recognition. The bio-inspired approach based on the humans peripheral and foveal visions has been reported as a way to combine recognition performance and computational efficiency. As a low resolution camera observes a large zone and detects significant changes, a second camera focuses on each event and provides a high resolution image of it. While such biomimetic existing approaches usually separate the two vision modes according to their functionality (e.g. detection, recognition) and to their basic primitives (i.e. features, algorithms), our approach uses common structures and features for both peripheral and foveal cameras, thereby decreasing the computational load with respect to the previous approaches. The proposed approach is demonstrated using simulated data. The outcome proves particularly attractive for real time embedded systems, as the primitives (features and classifier) have already proven good performances in low power embedded systems. This first result reveals the high potential of dual views fusion technique in the context of long duration unmanned video surveillance systems. It also encourages us to go further into miming the mechanisms of the human eye. In particular, it is expected that adding a retro-action of the fovea towards the peripheral vision will further enhance the quality and efficiency of the detection process.

  18. Unmanned vehicle mobility: Limits of autonomous navigation

    Science.gov (United States)

    McCormac, A. W.; Hanna, D. M.; McFee, J.

    Considerable research is being conducted on the development of unmanned vehicles for military and civilian applications, particularly for hostile environments. It is desirable to produce a vehicle which can select its own route, not requiring remote navigation, but then it would be required to sense its surroundings. Although imaging systems and modern computers make this possible, the extreme data processing demands usually make it impractical. It is suggested that an inverse relationship exists between vehicle mobility and the complexity of the autonomous navigation system required for an unmanned vehicle. An overview of vehicle navigation is presented which shows the degree to which navigation is affected by increasing inherent mobility. If the inherent mobility of a vehicle is greatly enhanced, the scene image processing requirements and navigational computations are greatly simplified. This means the vehicle path selection and speed and steering adjustments may be made more quickly, resulting in higher vehicle speeds whenever possible. Combined with reduced deviation from the intended path, this would greatly increase the speed of the vehicle from one given point to another, suggesting that high speed autonomous navigation may be feasible.

  19. Sea Ice Mapping using Unmanned Aerial Systems

    Science.gov (United States)

    Solbø, S.; Storvold, R.

    2011-12-01

    Mapping of sea ice extent and sea ice features is an important task in climate research. Since the arctic coastal and oceanic areas have a high probability of cloud coverage, aerial platforms are superior to satellite measurements for high-resolution optical measurements. However, routine observations of sea ice conditions present a variety of problems using conventional piloted aircrafts. Specially, the availability of suitable aircrafts for lease does not cover the demand in major parts of the arctic. With the recent advances in unmanned aerial systems (UAS), there is a high possibility of establishing routine, cost effective aerial observations of sea ice conditions in the near future. Unmanned aerial systems can carry a wide variety of sensors useful for characterizing sea-ice features. For instance, the CryoWing UAS, a system initially designed for measurements of the cryosphere, can be equipped with digital cameras, surface thermometers and laser altimeters for measuring freeboard of ice flows. In this work we will present results from recent CryoWing sea ice flights on Svalbard, Norway. The emphasis will be on data processing for stitching together images acquired with the non-stabilized camera payload, to form high-resolution mosaics covering large spatial areas. These data are being employed to map ice conditions; including ice and lead features and melt ponds. These high-resolution mosaics are also well suited for sea-ice mechanics, classification studies and for validation of satellite sea-ice products.

  20. Mini Rukma Vimana Unmanned Air Vehicle

    Directory of Open Access Journals (Sweden)

    T. V. Vineeta

    2014-10-01

    Full Text Available Taking advantage of ancient Indian Knowledge of Vimanas, the Mini Rukma Vimana Unmanned Air Vehicle designs make a several advantages for many purposes as mentioned. The MRV UAV concept is proposed mainly to create VTOL, the lift fans configuration similar to Rukma vimana, hence the name Mini Rukma vimana Unmanned Air Vehicle. Lift fans are the main part of the MRV UAV. They can be used to go through mountainous regions. And fans are preferred other than wings for Vertical takeoff. The lift fans configuration is similar to Rukma vimana Mentioned in Vimanika shasthra. Based on Analysis for VTOL, UAVs are having lift fans embedded in Wings. But MRV UAV has simpler configuration, enabling the UAV to lift off with fans provided at the top of the UAV directly connected to the base of UAV with the help of Ducts. The Direction control can be achieved by operating the maneuvering fans acting as propellers, the UAV can move 360 degrees in at mid air in single position. Using the MRV UAV, the missions become much more simpler and easier to be carried out.

  1. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Durling, R L; Price, D E; Spero, K K

    2005-06-06

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  2. Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management

    Energy Technology Data Exchange (ETDEWEB)

    Durling, Jr., R L; Price, D E

    2005-12-16

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  3. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  4. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Durling, Jr., R L; Price, D E; Spero, K K

    2005-01-03

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented.

  5. Adapting existing training standards for unmanned aircraft: finding ways to train staff for unmanned aircraft operations

    CSIR Research Space (South Africa)

    Burger, CR

    2011-09-01

    Full Text Available are governed by the Civil Aviation Authority (CAA) under the terms of an interim policy1. This policy?s paragraph 4.3 describes the process for obtaining a Certificate of Waiver or Authorisation. There is also provision for the issuance of an airworthiness... experience as Designated Flight Examiner for the South African Civil Aviation Authority, and on his three- year project to analyse the strategic development of required technologies to facilitate unmanned aircraft operations in civil airspace. II...

  6. Scalable autonomous operations of unmanned assets

    Science.gov (United States)

    Jung, Sunghun

    Although there have been great theoretical advances in the region of Unmanned Aerial Vehicle (UAV) autonomy, applications of those theories into real world are still hesitated due to unexpected disturbances. Most of UAVs which are currently used are mainly, strictly speaking, Remotely Piloted Vehicles (RPA) since most works related with the flight control, sensor data analysis, and decision makings are done by human operators. To increase the degree of autonomy, many researches are focused on developing Unmanned Autonomous Aerial Vehicle (UAAV) which can takeoff, fly to the interested area by avoiding unexpected obstacles, perform various missions with decision makings, come back to the base station, and land on by itself without any human operators. To improve the performance of UAVs, the accuracies of position and orientation sensors are enhanced by integrating a Unmanned Ground Vehicle (UGV) or a solar compass to a UAV; Position sensor accuracy of a GPS sensor on a UAV is improved by referencing the position of a UGV which is calculated by using three GPS sensors and Weighted Centroid Localization (WCL) method; Orientation sensor accuracy is improved as well by using Three Pixel Theorem (TPT) and integrating a solar compass which composed of nine light sensors to a magnetic compass. Also, improved health management of a UAV is fulfilled by developing a wireless autonomous charging station which uses four pairs of transmitter and receiver magnetic loops with four robotic arms. For the software aspect, I also analyze the error propagation of the proposed mission planning hierarchy to achieve the safest size of the buffer zone. In addition, among seven future research areas regarding UAV, this paper mainly focuses on developing algorithms of path planning, trajectory generation, and cooperative tactics for the operations of multiple UAVs using GA based multiple Traveling Salesman Problem (mTSP) which is solved by dividing into m number of Traveling Salesman

  7. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  8. From School Militarization to School Securitization: National Security Finds Its Place in Schools

    Science.gov (United States)

    Nguyen, Nicole

    2017-01-01

    This ethnography explores daily life at Milton High School, a US public school with its own specialized Homeland Security program. From "military grunts" serving in distant theaters of war to Transportation Security Administration (TSA) agents defending the US borderlands to National Security Administration (NSA) technicians monitoring…

  9. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... information from chemical facilities that may reflect potential consequences of or vulnerabilities to a... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...

  10. 77 FR 75017 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2012-12-19

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI... to read as follows: Sec. 165.T14-215 Security Zone; On the Waters in Kailua Bay, Oahu, HI....

  11. 76 FR 12 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-01-03

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI... to read as follows: Sec. 165.T14-215 Security Zone; On the Waters in Kailua Bay, Oahu, HI....

  12. 78 FR 79312 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2013-12-30

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI... Security Zone; On the Waters in Kailua Bay, Oahu, HI. (a) Location. The following area, within the...

  13. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for...

  14. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  15. 46 CFR 11.811 - Requirements to qualify for an STCW endorsement as vessel security officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Requirements to qualify for an STCW endorsement as vessel security officer. 11.811 Section 11.811 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... § 11.811 Requirements to qualify for an STCW endorsement as vessel security officer. (a) The...

  16. C2 Link Security for UAS: Technical Literature Study and Preliminary Functional Requirements. Version 0.9 (Working Draft)

    Science.gov (United States)

    2005-01-01

    This document provides a study of the technical literature related to Command and Control (C2) link security for Unmanned Aircraft Systems (UAS) for operation in the National Airspace System (NAS). Included is a preliminary set of functional requirements for C2 link security.

  17. Precision wildlife monitoring using unmanned aerial vehicles.

    Science.gov (United States)

    Hodgson, Jarrod C; Baylis, Shane M; Mott, Rowan; Herrod, Ashley; Clarke, Rohan H

    2016-03-17

    Unmanned aerial vehicles (UAVs) represent a new frontier in environmental research. Their use has the potential to revolutionise the field if they prove capable of improving data quality or the ease with which data are collected beyond traditional methods. We apply UAV technology to wildlife monitoring in tropical and polar environments and demonstrate that UAV-derived counts of colony nesting birds are an order of magnitude more precise than traditional ground counts. The increased count precision afforded by UAVs, along with their ability to survey hard-to-reach populations and places, will likely drive many wildlife monitoring projects that rely on population counts to transition from traditional methods to UAV technology. Careful consideration will be required to ensure the coherence of historic data sets with new UAV-derived data and we propose a method for determining the number of duplicated (concurrent UAV and ground counts) sampling points needed to achieve data compatibility.

  18. Precision wildlife monitoring using unmanned aerial vehicles

    Science.gov (United States)

    Hodgson, Jarrod C.; Baylis, Shane M.; Mott, Rowan; Herrod, Ashley; Clarke, Rohan H.

    2016-03-01

    Unmanned aerial vehicles (UAVs) represent a new frontier in environmental research. Their use has the potential to revolutionise the field if they prove capable of improving data quality or the ease with which data are collected beyond traditional methods. We apply UAV technology to wildlife monitoring in tropical and polar environments and demonstrate that UAV-derived counts of colony nesting birds are an order of magnitude more precise than traditional ground counts. The increased count precision afforded by UAVs, along with their ability to survey hard-to-reach populations and places, will likely drive many wildlife monitoring projects that rely on population counts to transition from traditional methods to UAV technology. Careful consideration will be required to ensure the coherence of historic data sets with new UAV-derived data and we propose a method for determining the number of duplicated (concurrent UAV and ground counts) sampling points needed to achieve data compatibility.

  19. Responsibility practices and unmanned military technologies.

    Science.gov (United States)

    Noorman, Merel

    2014-09-01

    The prospect of increasingly autonomous military robots has raised concerns about the obfuscation of human responsibility. This papers argues that whether or not and to what extent human actors are and will be considered to be responsible for the behavior of robotic systems is and will be the outcome of ongoing negotiations between the various human actors involved. These negotiations are about what technologies should do and mean, but they are also about how responsibility should be interpreted and how it can be best assigned or ascribed. The notion of responsibility practices, as the paper shows, provides a conceptual tool to examine these negotiations as well as the interplay between technological development and the ascription of responsibility. To illustrate the dynamics of responsibility practices the paper explores how the introduction of unmanned aerial vehicles has led to (re)negotiations about responsibility practices, focusing particularly on negotiations within the US Armed Forces.

  20. Mathematical Modelling of Unmanned Aerial Vehicles

    Directory of Open Access Journals (Sweden)

    Saeed Sarwar

    2013-04-01

    Full Text Available UAVs (Unmanned Arial Vehicleis UAVs are emerging as requirement of time and it is expected that in next five to ten years, complete air space will be flooded with UAVs, committed in varied assignments ranging from military, scientific and commercial usage. Non availability of human pilot inside UAV necessitates the requirement of an onboard autopilot in order to maintain desired flight profile against any unexpected disturbance and/or parameter variations. Design of such an autopilot requires an accurate mathematical model of UAV. The aim of this paper is to present a consolidated picture of UAV model. This paper first consolidates complete 6 DOF Degree of Freedom equations of motion into a nonlinear mathematical model and its simulation using model parameters of a real UAV. Model is then linearized into longitudinal and lateral modes. State space models of linearized modes are simulated and analyzed for stability parameters. The developed model can be used to design autopilot for UAV

  1. Bioinspired optical sensors for unmanned aerial systems

    Science.gov (United States)

    Chahl, Javaan; Rosser, Kent; Mizutani, Akiko

    2011-04-01

    Insects are dependant on the spatial, spectral and temporal distributions of light in the environment for flight control and navigation. This paper reports on flight trials of implementations of insect inspired behaviors on unmanned aerial vehicles. Optical flow methods for maintaining a constant height above ground and a constant course have been demonstrated to provide navigation capabilities that are impossible using conventional avionics sensors. Precision control of height above ground and ground course were achieved over long distances. Other vision based techniques demonstrated include a biomimetic stabilization sensor that uses the ultraviolet and green bands of the spectrum, and a sky polarization compass. Both of these sensors were tested over long trajectories in different directions, in each case showing performance similar to low cost inertial heading and attitude systems. The behaviors demonstrate some of the core functionality found in the lower levels of the sensorimotor system of flying insects and shows promise for more integrated solutions in the future.

  2. Estimation and Prediction of Unmanned Aerial Vehicle Trajectories Project

    Data.gov (United States)

    National Aeronautics and Space Administration — There is serious concern about the introduction of Unmanned Aerial Vehicles (UAV) in the National Air Space (NAS) because of their potential to increase the risk of...

  3. A Recursive Receding Horizon Planning for Unmanned Vehicles

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper proposes a recursive receding horizon path planning algorithm for unmanned vehicles in nonuniform environments. In the proposed algorithm, the map is...

  4. The feasibility of counting songbirds using unmanned aerial vehicles

    National Research Council Canada - National Science Library

    Andrew M Wilson; Janine Barr; Megan Zagorski

    2017-01-01

    .... We propose that combining bioacoustic monitoring with unmanned aerial vehicle (UAV) technology could reduce some of these biases and allow bird surveys to be conducted in less accessible areas...

  5. Miniature Carbon Dioxide Sensor for Small Unmanned Aircraft Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Phase 1 has seen the development of a revolutionary new type of sensor for making carbon dioxide (CO2) measurements from small Unmanned Aircraft Systems (UAS) and...

  6. Unmanned Aerial Vehicle Diode Laser Sensor for Methane Project

    Data.gov (United States)

    National Aeronautics and Space Administration — A compact, lightweight, and low power diode laser sensor will be developed for atmospheric methane detection on small unmanned aerial vehicles (UAVs). The physical...

  7. Capabilities of unmanned aircraft vehicles for low altitude weed detection

    Science.gov (United States)

    Pflanz, Michael; Nordmeyer, Henning

    2014-05-01

    Sustainable crop production and food security require a consumer and environmental safe plant protection. It is recently known, that precise weed monitoring approaches could help apply pesticides corresponding to field variability. In this regard the site-specific weed management may contribute to an application of herbicides with higher ecologically aware and economical savings. First attempts of precision agriculture date back to the 1980's. Since that time, remote sensing from satellites or manned aircrafts have been investigated and used in agricultural practice, but are currently inadequate for the separation of weeds in an early growth stage from cultivated plants. In contrast, low-cost image capturing at low altitude from unmanned aircraft vehicles (UAV) provides higher spatial resolution and almost real-time processing. Particularly, rotary-wing aircrafts are suitable for precise path or stationary flight. This minimises motion blur and provides better image overlapping for stitching and mapping procedures. Through improved image analyses and the recent increase in the availability of microcontrollers and powerful batteries for UAVs, it can be expected that the spatial mapping of weeds will be enhanced in the future. A six rotors microcopter was equipped with a modified RGB camera taking images from agricultural fields. The hexacopter operates within predefined pathways at adjusted altitudes (from 5 to 10 m) by using GPS navigation. Different scenarios of optical weed detection have been carried out regarding to variable altitude, image resolution, weed and crop growth stages. Our experiences showed high capabilities for site-specific weed control. Image analyses with regard to recognition of weed patches can be used to adapt herbicide application to varying weed occurrence across a field.

  8. Unique Aspects of Flight Testing Unmanned Aircraft Systems

    Science.gov (United States)

    2010-04-01

    High Altitude Endurance HCI Human Computer Interface INS Inertial Navigation System IR Infrared JITC Joint Interoperability Testing Command...highlighting some of the unique aspects of flight testing unmanned air vehicle systems. It is intended to provide a practical set of guidelines in support of...of unmanned aviation systems, it is especially important that even minor changes to the baseline code be carefully reviewed, and that regression

  9. Unmanned vehicles for maritime spill response case study: Exercise Cathach.

    Science.gov (United States)

    Dooly, Gerard; Omerdic, Edin; Coleman, Joseph; Miller, Liam; Kaknjo, Admir; Hayes, James; Braga, Jóse; Ferreira, Filipe; Conlon, Hugh; Barry, Hugh; Marcos-Olaya, Jesús; Tuohy, Thomas; Sousa, João; Toal, Dan

    2016-09-15

    This paper deals with two aspects, namely a historical analysis of the use of unmanned vehicles (UAVs ROVs, AUVs) in maritime spill incidents and a detailed description of a multi-agency oil and HNS incident response exercise involving the integration and analysis of unmanned vehicles environmental sensing equipment. The exercise was a first in terms of the level of robotic systems deployed to assist in survey, surveillance and inspection roles for oil spills and harmful and noxious substances.

  10. Fuzzy Technique Tracking Control for Multiple Unmanned Ships

    OpenAIRE

    Ramzi Fraga; Liu Sheng

    2013-01-01

    A Fuzzy logic control law is presented and implemented for trajectory tracking of multiple under actuated autonomous surface vessels. In this study, an individual unmanned ship is used to be the leader that tracks the desired path; other unmanned ships are used to be the followers which track the leader only by using its position. A fuzzy controller was implemented for the ship leader position with a constant velocity; however, the ship follower needed a fuzzy controller for the position and ...

  11. BASIC PRINCIPLES FOR THE MODERN CLASSIFICATION OF UNMANNED AVIATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    В.П. Харченко

    2012-12-01

    Full Text Available  In view of the basic contemporary classification criteria attempted the classification of unmanned aircraft systems have been attempted  on the basis of available scientific and technical potential, of their applications features,  and prospects for development of information and the aircraft manufacturing technologies. Based on the global trends analysis of unmanned aircraft systems development in determining the prospects for development of unmanned aircraft systems as a class has been discussed the need to use a single general classification system features that reflects the level of functional independence of the aircraft belonging to the UAS and takes into account not only the level of technical excellence, but also the level of development information and logistics systems. The formation principles of unmanned aircraft systems and complexes have been considered due to the UAC development problems, including the issues of the complex architectonics, its full composition, unmanned aircraft controlling methods, and the procedures for the unmanned aviation complex use as a whole taking into account the peculiarities the different UAVs categories application.

  12. M and S supporting unmanned autonomous systems (UAxS) concept development and experimentation

    Science.gov (United States)

    Biagini, Marco; Scaccianoce, Alfio; Corona, Fabio; Forconi, Sonia; Byrum, Frank; Fowler, Olivia; Sidoran, James L.

    2017-05-01

    The development of the next generation of multi-domain unmanned semi and fully autonomous C4ISR systems involves a multitude of security concerns and interoperability challenges. Conceptual solutions to capability shortfalls and gaps can be identified through Concept Development and Experimentation (CD and E) cycles. Modelling and Simulation (M and S) is a key tool in supporting unmanned autonomous systems (UAxS) CD and E activities and addressing associated security challenges. This paper serves to illustrate the application of M and S to UAxS development and highlight initiatives made by the North Atlantic Treaty Organization (NATO) M and S Centre of Excellence (CoE) to facilitate interoperability. The NATO M and S CoE collaborates with other NATO and Nations bodies in order to develop UAxS projects such as the Allied Command for Transformation Counter Unmanned Autonomous Systems (CUAxS) project or the work of Science and Technology Organization (STO) panels. Some initiatives, such as Simulated Interactive Robotics Initiative (SIRI) made the baseline for further developments and to study emerging technologies in M and S and robotics fields. Artificial Intelligence algorithm modelling, Robot Operating Systems (ROS), network operations, cyber security, interoperable languages and related data models are some of the main aspects considered in this paper. In particular, the implementation of interoperable languages like C-BML and NIEM MilOps are discussed in relation to a Command and Control - Simulation Interoperability (C2SIM) paradigm. All these technologies are used to build a conceptual architecture to support UAxS CD and E.In addition, other projects that the NATO M and S CoE is involved in, such as the NATO Urbanization Project could provide credible future operational environments and benefit UAxS project development, as dual application of UAxS technology in large urbanized areas.In conclusion, this paper contains a detailed overview regarding how applying

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  16. Approach for Autonomous Control of Unmanned Aerial Vehicle Using Intelligent Agents for Knowledge Creation

    Science.gov (United States)

    Dufrene, Warren R., Jr.

    2004-01-01

    This paper describes the development of a planned approach for Autonomous operation of an Unmanned Aerial Vehicle (UAV). A Hybrid approach will seek to provide Knowledge Generation through the application of Artificial Intelligence (AI) and Intelligent Agents (IA) for UAV control. The applications of several different types of AI techniques for flight are explored during this research effort. The research concentration is directed to the application of different AI methods within the UAV arena. By evaluating AI and biological system approaches. which include Expert Systems, Neural Networks. Intelligent Agents, Fuzzy Logic, and Complex Adaptive Systems, a new insight may be gained into the benefits of AI and CAS techniques applied to achieving true autonomous operation of these systems. Although flight systems were explored, the benefits should apply to many Unmanned Vehicles such as: Rovers. Ocean Explorers, Robots, and autonomous operation systems. A portion of the flight system is broken down into control agents that represent the intelligent agent approach used in AI. After the completion of a successful approach, a framework for applying an intelligent agent is presented. The initial results from simulation of a security agent for communication are presented.

  17. Surrogate Safety Analysis of Pedestrian-Vehicle Conflict at Intersections Using Unmanned Aerial Vehicle Videos

    Directory of Open Access Journals (Sweden)

    Peng Chen

    2017-01-01

    Full Text Available Conflict analysis using surrogate safety measures (SSMs has become an efficient approach to investigate safety issues. The state-of-the-art studies largely resort to video images taken from high buildings. However, it suffers from heavy labor work, high cost of maintenance, and even security restrictions. Data collection and processing remains a common challenge to traffic conflict analysis. Unmanned Aerial Systems (UASs or Unmanned Aerial Vehicles (UAVs, known for easy maneuvering, outstanding flexibility, and low costs, are considered to be a novel aerial sensor. By taking full advantage of the bird’s eye view offered by UAV, this study, as a pioneer work, applied UAV videos for surrogate safety analysis of pedestrian-vehicle conflicts at one urban intersection in Beijing, China. Aerial video sequences for a period of one hour were analyzed. The detection and tracking systems for vehicle and pedestrian trajectory data extraction were developed, respectively. Two SSMs, that is, Postencroachment Time (PET and Relative Time to Collision (RTTC, were employed to represent how spatially and temporally close the pedestrian-vehicle conflict is to a collision. The results of analysis showed a high exposure of pedestrians to traffic conflict both inside and outside the crosswalk and relatively risking behavior of right-turn vehicles around the corner. The findings demonstrate that UAV can support intersection safety analysis in an accurate and cost-effective way.

  18. New development thoughts on the bio-inspired intelligence based control for unmanned combat aerial vehicle

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Bio-inspired intelligence is in the spotlight in the field of international artificial intelligence,and unmanned combat aerial vehicle(UCAV),owing to its potential to perform dangerous,repetitive tasks in remote and hazardous,is very promising for the technological leadership of the nation and essential for improving the security of society.On the basis of introduction of bioinspired intelligence and UCAV,a series of new development thoughts on UCAV control are proposed,including artificial brain based high-level autonomous control for UCAV,swarm intelligence based cooperative control for multiple UCAVs,hy-brid swarm intelligence and Bayesian network based situation assessment under complicated combating environments, bio-inspired hardware based high-level autonomous control for UCAV,and meta-heuristic intelligence based heterogeneous cooperative control for multiple UCAVs and unmanned combat ground vehicles(UCGVs).The exact realization of the proposed new development thoughts can enhance the effectiveness of combat,while provide a series of novel breakthroughs for the intelligence,integration and advancement of future UCAV systems.

  19. The future of infrastructure security :

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  20. 76 FR 8758 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-002...

    Science.gov (United States)

    2011-02-15

    ... performance evaluations, training, and quality assurance purposes to improve customer service to disaster... to improve customer service to disaster assistance applicants. The purpose of QARS is consistent with... contractors at the NPSCs, so that FEMA can improve customer service to those seeking disaster...