WorldWideScience

Sample records for hypothetical terrorist action

  1. Action against terrorist funding

    OpenAIRE

    Cranston, Ross

    2002-01-01

    Editorial comment on international measures to counter terrorist funding. Short commentary by Ross Cranston QC MP, Chairman of the SLAS Export Working Group on the Legal implications of the interdiction of terrorist property. Published in Amicus Curiae - Journal of the Institute of Advanced Legal Studies and its Society for Advanced Legal Studies. The Journal is produced by the Society for Advanced Legal Studies at the Institute of Advanced Legal Studies, University of London.

  2. Identification of critical locations across multiple infrastructures for terrorist actions

    Energy Technology Data Exchange (ETDEWEB)

    Patterson, S.A. [Department of Nuclear Science and Engineering, and Engineering Systems Division, Massachusetts Institute of Technology, Cambridge, MA 02139-4307 (United States); Apostolakis, G.E. [Department of Nuclear Science and Engineering, and Engineering Systems Division, Massachusetts Institute of Technology, Cambridge, MA 02139-4307 (United States)]. E-mail: apostola@mit.edu

    2007-09-15

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when

  3. Analysis of Al-Qaeda Terrorist Attacks to Investigate Rational Action

    Directory of Open Access Journals (Sweden)

    Daniel P. Hepworth

    2013-04-01

    Full Text Available Many studies have been conducted to demonstrate the collective rationality of traditional terrorist groups; this study seeks to expand this and apply collective rationality to Islamic terrorist groups. A series of statistical analyses were conducted on terrorist attacks carried out by Al-Qaeda and affiliated terrorist organization; these were then compared to two more conventional terrorist groups: the Euskadi Ta Askatasuna (ETA and the Liberation Tigers of Tamil Eelam (LTTE. When viewed through the context of the groups’ various motivations and objectives, the results of these analyses demonstrates collective rationality for those terrorist groups examined. 

  4. Explaining the discrepancy between intentions and actions: the case of hypothetical bias in contingent valuation.

    Science.gov (United States)

    Ajzen, Icek; Brown, Thomas C; Carvajal, Franklin

    2004-09-01

    An experiment was designed to account for intention-behavior discrepancies by applying the theory of planned behavior to contingent valuation. College students (N = 160) voted in hypothetical and real payment referenda to contribute $8 to a scholarship fund. Overestimates of willingness to pay in the hypothetical referendum could not be attributed to moderately favorable latent dispositions. Instead, this hypothetical bias was explained by activation of more favorable beliefs and attitudes in the context of a hypothetical rather than a real referendum. A corrective entreaty was found to eliminate this bias by bringing beliefs, attitudes, and intentions in line with those in the real payment situation. As a result, the theory of planned behavior produced more accurate prediction of real payment when participants were exposed to the corrective entreaty.

  5. Hypothetical Justifications

    Directory of Open Access Journals (Sweden)

    Bernd Lahno

    2009-01-01

    Full Text Available A basic conviction in moral non-cognitivism is: only hypothetical norms may be justified. Hartmut Kliemt argues for a moderate variant: there are only hypothetical justifications of norms whether the norms are hypothetical or categorical in kind. In this paper the concept of 'hypothetical justification' is analyzed. It is argued that hypothetical justifications are not of the kind that we should look for in normative ethics.

  6. Hypothetical mode of action of earthworm extract with hepatoprotective and antioxidant properties

    Institute of Scientific and Technical Information of China (English)

    Mariappan BALAMURUGAN; Kasi PARTHASARATHI; Lalpet Souri RANGANATHAN; Edwin L. COOPER

    2008-01-01

    The hepatoprotective potential of earthworm extract (EE) (Lampito mauritii, Kinberg) was evaluated against paracetamol-induced liver injury in Wistar albino rat, in comparison with silymarin, the standard hepatoprotective drug. We observed a reduction in liver antioxidants, such as glutathione (GSH), superoxide dismutase (SOD), glutathione peroxidase (GPx),and catalase (CAT) and in serum total protein, and an increase in serum alkaline phosphatase (ALP), serum aspertate aminotranferase (AST), serum alanine aminotranferase (ALT), bilirubin and liver thiobarbituric acid reactive substances (TBARS) due to liver injury in the paracetamol-administered rats (2 g/kg). On the contrary, increased activities of liver GSH, SOD, GPx,CAT and serum total protein level, and decrease in the contents of serum ALP, AST, ALT, bilirubin and liver TBARS were observed in rats administered with different doses of EE (100, 200 and 300 mg/kg), which are similar to the activities of hepatoprotective drug silymarin (150 mg/kg). The mode of action of EE as evidenced by the above parameters may suggest that EE, on the one hand, prevents the formation of the reactive oxygen groups, or scavenges these groups, thereby preventing the damage on the hepatic cells, and, on the other hand, modulates the genes responsible for synthesis of antioxidant enzymes such as GPx, CAT and SOD in liver tissue and decreases the serum enzymatic activities such as ALP, AST and ALT.

  7. Restoration projects for decontamination of facilities from chemical, biological and radiological contamination after terrorist actions

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Lumley, T.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Division, Environmental Technology Centre, Science and Technology Branch; Payette, P.; Laframboise, D.; Best, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Krishnan, J.; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Winnipeg, MB (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada); Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada)

    2006-07-01

    This paper reviewed studies that identified better decontamination methods for chemical, biological and radiological/nuclear (CBRN) attacks. In particular, it reviewed aspects of 3 projects in which procedures were tested and validated for site restoration. Cleanup targets or standards for decontaminating buildings and materials after a CBRN attack were also developed. The projects were based on physicochemical and toxicological knowledge of potential terrorist agents and selected surface matrices. The projects also involved modeling and assessing environmental and health risks. The first multi-agent project involved gathering information on known procedures for restoration of areas including interiors and exteriors of buildings, contents, parking lots, lawn, and vehicles. Air inside the building was included. The efficacy of some of the proposed concepts was tested. Results included the determination of appropriate surrogates for anthrax and tests of liquid and gaseous biocides on the surrogates. The development of new contamination procedures using peroxyacetic acid were also discussed. The second project involved decontamination tests on CBRN using specially-constructed buildings at the Counter-terrorism Technology Centre at Defence Research and Development Canada in Suffield. The buildings will be contaminated with chemical and biological agents and with short-lived radionuclides. They will be decontaminated using the best-performing technologies known. Information collected will include fate of the contaminant and decontamination products, effectiveness of the restoration methods, cost and duration of cleanup and logistical problems. The third project is aimed at developing cleanup standards for decontaminating buildings and construction materials after a chemical or biological attack. It will create as many as 12 algorithms for the development of 50 standards which will help cleanup personnel and first-responders to gauge whether proposed methods can achieve

  8. The restoration project : decontamination of facilities from chemical, biological and radiological contamination after terrorist action

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science Div; Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Duncan, L.; Best, M.; Krishnan; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    Bioterrorism poses a real threat to the public health and national security, and the restoration of affected facilities after a chemical, biological or radiological attack is a major concern. This paper reviewed aspects of a project conducted to collect information, test and validate procedures for site restoration after a terrorist attack. The project began with a review of existing technology and then examined new technologies. Restoration included pickup, neutralization, decontamination, removal and final destruction and deposition of contaminants as well as cleaning and neutralization of material and contaminated waste from decontamination. The project was also intended to test existing concepts and develop new ideas. Laboratory scale experiments consisted of testing, using standard laboratory techniques. Radiation decontamination consisted of removal and concentration of the radioisotopes from removal fluid. General restoration guidelines were provided, as well as details of factors considered important in specific applications, including growth conditions and phases of microorganisms in biological decontamination, or the presence of inhibitors or scavengers in chemical decontamination. Various agents were proposed that were considered to have broad spectrum capability. Test surrogates for anthrax were discussed. The feasibility of enhanced oxidation processes was examined in relation to the destruction of organophosphorus, organochlorine and carbamate pesticides. The goal was to identify a process for the treatment of surfaces contaminated with pesticides. Tests included removal from carpet, porous ceiling tile, steel plates, and floor tiles. General radiation contamination procedures and techniques were reviewed, as well as radiological decontamination waste treatment. It was concluded that there is no single decontamination technique applicable for all contaminants, and decontamination methods depend on economic, social and health factors. The amount of

  9. Fremmedkrigere i terroristers tjeneste

    DEFF Research Database (Denmark)

    Vestergaard, Jørn

    2016-01-01

    Fremmedkrigere i terroristers tjeneste – internationale, europæiske og danske regler om foreign terrorist fighters......Fremmedkrigere i terroristers tjeneste – internationale, europæiske og danske regler om foreign terrorist fighters...

  10. Understanding the Terrorist Mind.

    Science.gov (United States)

    Bruneau, Emile

    2016-01-01

    While early research focused on the political roots of terrorism, many of today's investigators are probing the psychological factors that drive adherents to commit their deadly deeds. Are terrorists mentally ill or do they rationally weigh the costs and benefits of their actions and conclude that terrorism is profitable? Our author traces recent advances in using imaging and experimental research to determine what motivates monstrous acts.

  11. Understanding the Terrorist Mind

    OpenAIRE

    Bruneau, Emile

    2016-01-01

    Editor’s Note: While early research focused on the political roots of terrorism, many of today’s investigators are probing the psychological factors that drive adherents to commit their deadly deeds. Are terrorists mentally ill or do they rationally weigh the costs and benefits of their actions and conclude that terrorism is profitable? Our author traces recent advances in using imaging and experimental research to determine what motivates monstrous acts.

  12. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  13. About a hypothetical terrorist attack on a nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-10-01

    After the terrorism attack on the World Trade Center, a record number ( two thirds) of US citizens favour the use of nuclear energy and consider nuclear plants to be safe. At the same time 59% definitely support building more nuclear plants, less than in March during the Californian crisis, but more than earlier., Most american citizens ( 84%) continue to support licence renewal for nuclear plants and 72 % agree with keeping the option open to build new nuclear plants in the future. The strongest supporters are those who have visited a nuclear plant or information centre. (N.C.)

  14. Needs of Terrorist

    OpenAIRE

    Alexander Sh. Tkhostov; Konstantin G. Surnov

    2009-01-01

    This article reveals the motives of the terrorist activity. It analyzes psychological mechanisms of basic human needs that are implemented at diff erent stages of involvement in terrorist organizations. The authors also discuss the causes of psychological attractiveness / desirability of terrorism in the context of infl uence of modern technologies on the dynamics of norm and pathology standards.

  15. Needs of Terrorist

    Directory of Open Access Journals (Sweden)

    Alexander Sh. Tkhostov

    2009-01-01

    Full Text Available This article reveals the motives of the terrorist activity. It analyzes psychological mechanisms of basic human needs that are implemented at different stages of involvement in terrorist organizations. The authors also discuss the causes of psychological attractiveness / desirability of terrorism in the context of influence of modern technologies on the dynamics of norm and pathology standards.

  16. Suicide Terrorists: Are They Suicidal?

    Science.gov (United States)

    Townsend, Ellen

    2007-01-01

    Are suicide terrorists suicidal? A review of the worldwide literature on suicide terrorism uncovered five published empirical studies describing data collected from potential suicide terrorists or the surviving friends and families of deceased terrorists. The many discrepancies uncovered between suicide terrorists and other suicides on key factors…

  17. Terrorist Gang Smashed

    Institute of Scientific and Technical Information of China (English)

    LI LI

    2010-01-01

    @@ Chinese authorities said recently they have broken up a terrorist ring headed by "Eastern Turkistan Islamic Movement (ETIM)" sepamusts and captured more than 10 members,seizing their self-made explosives.

  18. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

    Science.gov (United States)

    2007-01-01

    society’s essential physical assets and natural resources and to enhance the related social assets of safety and security of individuals in transit...relay chat LTTE Liberation Tigers of Tamil Eelam MIT Massachusetts Institute of Technology MMOG massively multiplayer online game MRTA Movimiento ...Technologies for Networked Terrorists Developing a strategy: Terrorist actions are intended to accomplish political or social goals. To guide its actions, a

  19. Actions Speak Louder than Words: A Behavioral Analysis of 183 Individuals Convicted for Terrorist Offenses in the United States from 1995 to 2012.

    Science.gov (United States)

    Horgan, John; Shortland, Neil; Abbasciano, Suzzette; Walsh, Shaun

    2016-09-01

    Involvement in terrorism has traditionally been discussed in relatively simplistic ways with little effort spent on developing a deeper understanding of what involvement actually entails, and how it differs from person to person. In this paper, we present the results of a three-year project focused on 183 individuals associated with the global jihadist movement who were convicted in the United States, for terrorist offenses, between 1995 and 2012. These data were developed by a large-scale, open-source data collection activity that involved a coding dictionary of more than 120 variables. We identify and explore the diversity of behaviors that constitute involvement in terrorism. We also compare lone actors and those who acted as part of a group, finding that lone actors differed from group-based actors in key demographic attributes and were more likely to be involved in attack execution behaviors. Implications for counterterrorism are then discussed. © 2016 American Academy of Forensic Sciences.

  20. A putative RNA-interference-based immune system in prokaryotes: computational analysis of the predicted enzymatic machinery, functional analogies with eukaryotic RNAi, and hypothetical mechanisms of action

    Directory of Open Access Journals (Sweden)

    Wolf Yuri I

    2006-03-01

    Full Text Available Abstract Background All archaeal and many bacterial genomes contain Clustered Regularly Interspaced Short Palindrome Repeats (CRISPR and variable arrays of the CRISPR-associated (cas genes that have been previously implicated in a novel form of DNA repair on the basis of comparative analysis of their protein product sequences. However, the proximity of CRISPR and cas genes strongly suggests that they have related functions which is hard to reconcile with the repair hypothesis. Results The protein sequences of the numerous cas gene products were classified into ~25 distinct protein families; several new functional and structural predictions are described. Comparative-genomic analysis of CRISPR and cas genes leads to the hypothesis that the CRISPR-Cas system (CASS is a mechanism of defense against invading phages and plasmids that functions analogously to the eukaryotic RNA interference (RNAi systems. Specific functional analogies are drawn between several components of CASS and proteins involved in eukaryotic RNAi, including the double-stranded RNA-specific helicase-nuclease (dicer, the endonuclease cleaving target mRNAs (slicer, and the RNA-dependent RNA polymerase. However, none of the CASS components is orthologous to its apparent eukaryotic functional counterpart. It is proposed that unique inserts of CRISPR, some of which are homologous to fragments of bacteriophage and plasmid genes, function as prokaryotic siRNAs (psiRNA, by base-pairing with the target mRNAs and promoting their degradation or translation shutdown. Specific hypothetical schemes are developed for the functioning of the predicted prokaryotic siRNA system and for the formation of new CRISPR units with unique inserts encoding psiRNA conferring immunity to the respective newly encountered phages or plasmids. The unique inserts in CRISPR show virtually no similarity even between closely related bacterial strains which suggests their rapid turnover, on evolutionary scale

  1. Hypothetical constructs, hypothetical questions, and the expert witness.

    Science.gov (United States)

    Brodsky, Stanley L; Titcomb, Caroline; Sams, David M; Dickson, Kara; Benda, Yves

    2012-01-01

    Professor John Henry Wigmore in 1940 described the hypothetical question as an intolerable obstruction of truth. Since that time, the nature and application of the hypothetical question in the courtroom, as well as responses to this line of questioning during expert testimony, have been sources of controversy. Governed by legal philosophical foundations, the hypothetical construct addresses what there is, in a general sense, and what can or ought to be. Alexy (2004) has described the nature of legal philosophy as the epistemological question of what we can know. This article begins by examining the philosophical underpinnings, legal parameters, and teaching purposes of posing hypothetical queries. A social-psychological backdrop for the use of hypothetical questions is then discussed followed by a broader discussion of the hypothetical question's role in court procedures. This paper identifies hypothetical questions used in court as devices to elicit information, or as predictions that potentially change underlying factual interpretations of evidence. In particular, on cross examination hypothetical questions seek to make opposing experts assume facts that are incongruent with their conclusions or opinions. Sometimes in these situations, experts are led to re-evaluate opinions based on alternative understandings of events and behaviors. Thus, this paper's final aim is to explore a foundational understanding of hypothetical questions asked of expert witnesses with special reference to mental health issues. Options for responding to hypothetical questions on the stand are considered along the dimensions of assertiveness-passivity, compliance-resistance, and possible redefinitions of the hypothetical issues.

  2. Fremmedkrigere i terroristers tjeneste - internationale, europæiske og danske regler om foreign terrorist fighters

    DEFF Research Database (Denmark)

    Vestergaard, Jørn

    2016-01-01

    Fremmedkrigere i terroristers tjeneste – internationale, europæiske og danske regler om foreign terrorist fighters......Fremmedkrigere i terroristers tjeneste – internationale, europæiske og danske regler om foreign terrorist fighters...

  3. Terrorist Group Brands: Understanding Terrorist Group Strategies Through Brand Exposure

    Science.gov (United States)

    2016-06-01

    in the same 24-hour period, thereby making brand exposure a percentage of the global news market-share. The percentage is important because the... BRANDS : UNDERSTANDING TERRORIST GROUP STRATEGIES THROUGH BRAND EXPOSURE by Bradley S. Greaver June 2016 Thesis Advisor: Camber Warren...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE TERRORIST GROUP BRANDS : UNDERSTANDING TERRORIST GROUP STRATEGIES THROUGH BRAND

  4. On Modeling Terrorist Frauds

    OpenAIRE

    Vaudenay, Serge

    2013-01-01

    Quite recently, distance-bounding protocols received a lot of attention as they offer a good solution to thwart relay attacks. Their security models at still unstable, especially when considering terrorist fraud. This considers the case where a malicious prover would try to bypass the protocol by colluding with an adversary without leaking his credentials. Two formal models appeared recently: one due to Fischlin and Onete and another one by Boureanu, Mitrokotsa, and Vaudenay. Both were propos...

  5. The development of subcutaneous sarcomas in rodents exposed to peroxisome proliferators agonists: hypothetical mechanisms of action and de-risking attitude.

    Science.gov (United States)

    Pruimboom-Brees, Ingrid M; Francone, Omar; Pettersen, John C; Kerlin, Roy L; Will, Yvonne; Amacher, David E; Boucher, Germaine G; Morton, Daniel

    2012-07-01

    Peroxisome proliferator-activated receptors (PPARs) represent therapeutic targets for the management of type 2 diabetes mellitus and dyslipidemia. Rodent carcinogenicity studies have revealed a link between γ and dual γ/α PPAR agonist treatment and the increased incidence of subcutaneous (SC) liposarcomas/fibrosarcomas or hemangiosarcomas, but very little has been reported for potent and selective PPARα agonists. We present a mode of action framework for the development of SC mesenchymal tumors in rodents given PPAR agonists. (1) Tumor promotion results from pharmacologically mediated recruitment (proliferation and differentiation), thermogenesis and adipogenesis of stromovascular cells, and subsequent generation of oxidative free radicals. (2) Tumor initiation consists of chemotype-driven mitochondrial dysfunction causing uncontrolled oxidative stress and permanent DNA damage. Promotion is characterized by enhanced adipogenesis in the SC adipose tissue, where the baseline PPARγ expression and responsiveness to PPARγ ligands is the highest, and by thermogenesis through expression of the uncoupling protein 1 (UCP-1) and the PPARγ co-activator 1 α (PGC-1α), two factors more highly expressed in brown versus white adipose tissue. Initiation is supported by the demonstration of mitochondrial uncoupling and OXPHOS Complexes dysfunction (Complexes III, IV and V) by compounds associated with increased incidences of sarcomas (muraglitazar and troglitazone), but not others lacking malignant tumor effects (pioglitazone, rosiglitazone).

  6. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  7. Is ALARP applicable to the management of terrorist risks?

    Energy Technology Data Exchange (ETDEWEB)

    Guikema, S.D., E-mail: sguikema@jhu.ed [Department of Geography and Environmental Engineering, Johns Hopkins University, Baltimore, MD 21218 (United States); Department of Industrial Economics, Risk Management and Planning, University of Stavanger (Norway); Aven, T. [Department of Industrial Economics, Risk Management and Planning, University of Stavanger (Norway)

    2010-08-15

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  8. The Terrorist Event

    OpenAIRE

    Nichols, Bill

    2007-01-01

    In his article "The Terrorist Event," Bill Nichols examines how the US media attempted to make meaning of the events of 9/11. How were news anchors and producers to explain an event that escaped their comprehension? Without context or historical equivalence in the US, news outlets groped for a narrative in which to frame the event even if that meant creating the meaning themselves. In their attempt to create meaning, what sorts of fetishes and fantasies did they draw-on and in turn create? Th...

  9. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  10. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  11. DETERMINANTS OF DISTRIBUTION OF TERRORIST THREAT IN NORTH CAUCASUS

    Directory of Open Access Journals (Sweden)

    Beslan A. Tarchokov

    2016-01-01

    Full Text Available Our country, like the rest of the world, has been for many years, it is taking all possible measures in order to find an effective response to terrorism, which, sadly aware, has indeed become one of the main threats to all mankind, one of the most burning issues of the day.Theoretical and practical problems of the nature and spread of the modern terrorist threat in the North Caucasus are subject to careful scrutiny and a greater or lesser extent taken into account in the practice of public authorities.In recent years, in the North Caucasus region remains sufficiently high level of terrorist threats. Illegal armed groups, despite the adoption of various measures, including force action on the part of the security services and police forces, still retain the ability to recover its numerical capacity and infrastructure.Terrorist practice under religious banners is the most well-known, very widespread and prolonged in time. Increasingly growing terrorist potential, largely with religious overtones, it is formed and acutely manifested in the present time in connection with a number of negative processes characteristic of globalization.The special features that define the ability to determine the religion as an effective ideological cover acquire certain conditions extremist, including terrorist orientation, include deep rootedness of religion in the minds of the society as a certain unifying symbols as socialization factor for certain people, their ideas and actions

  12. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  13. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  14. Violent Terrorist Action Characteristics Monitoring of Population in Aviation Security Isolation Zone%民航安检隔离区监控暴恐人群动作特征研究

    Institute of Scientific and Technical Information of China (English)

    张宁; 朱金福

    2015-01-01

    To make judgment on the crowd intelligent processing ofaviation security isolation zone in surveillance video ac-tion recognition and, thus early detection of violent terroristgroups characteristics of the action, effective to prevent crime and terrorist activities in order to maintain the social stability and development has a certain significance.Therefore, a meth-od is proposed to match to mixed Gauss model is established to monitor whether the video using wavelet denoising meth-od for data processing of image segmentation, through background modeling, will first typical motion part division, after on-ly the division of apart of HOG algorithm by using the characteristics that distinguish, use SVM to classify means the estab-lishment of mixed Gauss background model. Experimental results show that based on the matching degree of crowd behav-ior characteristics of POI video data and mixedGauss background model to detect abnormal people, can quickly and effec-tively judged violent fear of populationcharacteristics of the action, effective and provide technical support for aviation secu-rity.%对民航安检隔离区监控视频中人群动作识别并做出智能处理判断,从而及早发现暴恐人群动作特征,有效制止犯罪、恐怖活动的发生为维系社会稳定发展具有一定的意义.提出一种对建立的混合高斯模型是否相匹配的方法,对监控视频采用小波去噪方法对数据影像进行处理,通过背景建模分割,首先将典型的运动部分划分出来,之后仅对划分出的部分采用HOG算法进行特性区分,使用SVM来进行分类的手段建立混合高斯背景模型.实验结果表明,基于视频人群行为特征POI数据与混合高斯背景模型的匹配度来检测异常人群,可以快速有效地判断出暴恐人群动作特征,为民航安检提供技术支持.

  15. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  16. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  17. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  18. Liability for damage caused by terrorist attacks; Haftung fuer Terrorismusschaeden

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2004-10-01

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  19. What makes a terrorist stop being a terrorist?

    Directory of Open Access Journals (Sweden)

    John Horgan

    2014-12-01

    Full Text Available “Feet first”. That’s how one terrorist leader told recruits was the only way out. It makes sense. Allowing members to just walk away wouldn’t be good for the group’s image. And yet – at the same time as Islamic State parades its European jihadis in shocking beheading videos and continues to recruit aggressively around the world – terrorists do disengage all the time. Some quietly disappear. Others go public, telling their stories on TV or in autobiographies. They embrace their new identity as an “ex-“ or “former” to warn others of the dangers of involvement. We have also come to know formers through the rise of so-called de-radicalization programs. For the past decade, I’ve examined how and why terrorists walk away, and I’ve also closely examined programs aimed at helping ease that transition.

  20. A Sociospatial Approach to Understanding Terrorist Networks

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Hepner, George F. [University of Utah

    2011-01-01

    Terrorist networks operate in hybrid space where activities in social and geographic spaces are necessary for logistics and security. The Islamist terrorist network is analyzed as a sociospatial system using social network analysis, Geographic Information Science (GISc), and novel techniques designed for hybrid space analyses. This research focuses on identifying distance and sociospatial dependencies within the terrorist network. A methodology for analyzing sociospatial systems is developed and results lead to a greater understanding of terrorist network structures and activities. Distance and sociospatial dependencies are shown to exist for the Islamist terrorist network structure. These findings are discordant with recent literature that focuses on terrorist network tendencies toward decentralization in the information age. In this research, the Islamist terrorist network is theorized to use multiple structures of hierarchical and decentralized organization for effectiveness, efficiency, and resilience. Implications for counterterrorism policy and strategies are given.

  1. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  2. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  3. The Italian Red Brigades and the structure and dynamics of terrorist groups.

    Science.gov (United States)

    Tarantelli, Carole Beebe

    2010-06-01

    One of the problems in dealing with terrorism is that we have virtually no access to individual terrorists; only their actions are visible. The founders of the Italian terrorist group, the Red Brigades, on the other hand, have written about their experiences and have exhaustively explained their motivations. The author's premise is that these autobiographies and her interviews with several of the group's members give us access to the unconscious processes involved in the formation and operation of the group. After terrorist attacks, it is natural to ask whether the terrorists' capacity for collective violence is an indication of personal pathology. This paper argues that the relevant pathology in the terrorist enterprise is not that of the individual but that of the group. Relying on the theories of groups of Freud (1921), Bion (1961), Anzieu (1984) and Kaes (2007), the author argues that psychoanalytic theory is essential to understanding the motivations and actions of violent groups which otherwise remain obscure. Although the discussion has been confined to one terrorist group, the author hopes that it can also be useful for understanding the unconscious dynamics of other groups structured around an ideology which mandates the destruction of human life.

  4. Computational social network modeling of terrorist recruitment.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, Nina M.; Turnley, Jessica Glicken (Sandia National Laboratories, Albuquerque, NM); Smrcka, Julianne D. (Sandia National Laboratories, Albuquerque, NM); Ko, Teresa H.; Moy, Timothy David (Sandia National Laboratories, Albuquerque, NM); Wu, Benjamin C.

    2004-10-01

    The Seldon terrorist model represents a multi-disciplinary approach to developing organization software for the study of terrorist recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of and abstract agent category provided a means for capturing social concepts like cliques, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This paper provides an overview of the Seldon terrorist model developed to study the formation of cliques, which are used as the major recruitment entity for terrorist organizations.

  5. Understanding the Complexity of Terrorist Networks

    CERN Document Server

    Fellman, Philip V

    2009-01-01

    Complexity science affords a number of novel tools for examining terrorism, particularly network analysis and NK-Boolean fitness landscapes. The following paper explores various aspects of terrorist networks which can be illuminated through applications of non-linear dynamical systems modeling to terrorist network structures. Of particular interest are some of the emergent properties of terrorist networks as typified by the 9-11 hijackers network, properties of centrality, hierarchy and distance, as well as ways in which attempts to disrupt the transmission of information through terrorist networks may be expected to produce greater or lesser levels of fitness in those organizations.

  6. Intuitive visualization of the intelligence for the run-down of terrorist wire-pullers

    CERN Document Server

    Maeno, Yoshiharu

    2008-01-01

    The investigation of the terrorist attack is a time-critical task. The investigators have a limited time window to diagnose the organizational background of the terrorists, to run down and arrest the wire-pullers, and to take an action to prevent or eradicate the terrorist attack. The intuitive interface to visualize the intelligence data set stimulates the investigators' experience and knowledge, and aids them in decision-making for an immediately effective action. This paper presents a computational method to analyze the intelligence data set on the collective actions of the perpetrators of the attack, and to visualize it into the form of a social network diagram which predicts the positions where the wire-pullers conceals themselves.

  7. Countering the Nuclear Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things

  8. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  9. US: PJAK are terrorists - Obama's Iran Overture?

    DEFF Research Database (Denmark)

    Elling, Rasmus Christian

    2009-01-01

    Om den amerikanske stats beslutning om at erklære den iransk-kurdiske guerillagruppe PJAK for terrorister. Udgivelsesdato: 5/2......Om den amerikanske stats beslutning om at erklære den iransk-kurdiske guerillagruppe PJAK for terrorister. Udgivelsesdato: 5/2...

  10. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  11. Assessing Hypothetical Gravity Control Propulsion

    CERN Document Server

    Millis, M G

    2006-01-01

    Gauging the benefits of hypothetical gravity control propulsion is difficult, but addressable. The major challenge is that such breakthroughs are still only notional concepts rather than being specific methods from which performance can be rigorously quantified. A recent assessment by Tajmar and Bertolami used the rocket equation to correct naive misconceptions, but a more fundamental analysis requires the use of energy as the basis for comparison. The energy of a rocket is compared to an idealized space drive for the following cases: Earth-to-orbit, interstellar transit, and levitation. The space drive uses 3.6 times less energy for Earth to orbit. For deep space travel, space drive energy scales as the square of delta-v, while rocket energy scales exponentially. This has the effect of rendering a space drive 150-orders-of-magnitude better than a 17,000-sec Specific Impulse rocket for sending a modest 5000 kg probe to traverse 5 light-years in 50 years. Indefinite levitation, which is impossible for a rocket...

  12. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  13. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  14. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  15. A generative model for predicting terrorist incidents

    Science.gov (United States)

    Verma, Dinesh C.; Verma, Archit; Felmlee, Diane; Pearson, Gavin; Whitaker, Roger

    2017-05-01

    A major concern in coalition peace-support operations is the incidence of terrorist activity. In this paper, we propose a generative model for the occurrence of the terrorist incidents, and illustrate that an increase in diversity, as measured by the number of different social groups to which that an individual belongs, is inversely correlated with the likelihood of a terrorist incident in the society. A generative model is one that can predict the likelihood of events in new contexts, as opposed to statistical models which are used to predict the future incidents based on the history of the incidents in an existing context. Generative models can be useful in planning for persistent Information Surveillance and Reconnaissance (ISR) since they allow an estimation of regions in the theater of operation where terrorist incidents may arise, and thus can be used to better allocate the assignment and deployment of ISR assets. In this paper, we present a taxonomy of terrorist incidents, identify factors related to occurrence of terrorist incidents, and provide a mathematical analysis calculating the likelihood of occurrence of terrorist incidents in three common real-life scenarios arising in peace-keeping operations

  16. The Decision Calculus of Terrorist Leaders

    Directory of Open Access Journals (Sweden)

    J. Tyson Chatagnier

    2012-10-01

    Full Text Available This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizations. After reviewing the results and insights derived from this analysis, we conclude with implications for policies to counter terrorism.

  17. 77 FR 67733 - Unblocking of One Specially Designated Terrorist Pursuant to Executive Order 12947

    Science.gov (United States)

    2012-11-13

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Office of Foreign Assets Control Unblocking of One Specially Designated Terrorist Pursuant to Executive Order 12947 AGENCY: Office of Foreign Assets Control, Treasury. ACTION: Notice. SUMMARY: The...

  18. 76 FR 16855 - Unblocking of One Specially Designated Global Terrorist Pursuant to Executive Order 13224

    Science.gov (United States)

    2011-03-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Office of Foreign Assets Control Unblocking of One Specially Designated Global Terrorist Pursuant to Executive Order 13224 AGENCY: Office of Foreign Assets Control, Treasury. ACTION: Notice. SUMMARY:...

  19. Reducing hypothetical bias in choice experiments

    DEFF Research Database (Denmark)

    Ladenburg, Jacob; Olsen, Søren Bøye; Nielsen, Rasmus Christian Fejer

    Hypothetical bias in stated preference studies is an essential problem which reduces the validity of the obtained welfare estimates for non-market goods. In the attempt to mitigate hypothetical bias, a type of reminder known as Cheap Talk, has been applied in previous studies and found to overall...... eliminate some of the hypothetical bias. The present paper tests an addition to Cheap Talk, an Opt-Out Reminder. The Opt-Out Reminder is an objective short script presented prior to the choice sets, prompting the respondent to choose the opt-out alternative, if he/she finds the proposed policy generated...... alternatives in a choice set too expensive. The results suggest that adding an Opt-Out Reminder to Cheap Talk can in fact reduce hypothetical bias even further and reduces some of the ineffectiveness of CT in relation to the survey bid range and experienced respondents....

  20. The terrorist threat to the UK in the post–9/11 decade

    Directory of Open Access Journals (Sweden)

    Sir David Omand

    2012-07-01

    Full Text Available The overall task for this special issue is to assess the emergency response to terrorism, in particular the threat posed by violent jihadist terrorism. Clearly, planning for emergency responses will have value against other threats and hazards, so it will be difficult to separate out the arrangements made to deal specifically with the aftermath of terrorist attacks, and those to meet other emergencies, for example major natural disasters. A sense of proportion is also needed when examining terrorist risks: the actions of greedy market-makers and incompetent bankers in the recent past is doing much more damage to our national welfare and national security than terrorism today.

  1. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  2. The secret society and the social dynamics of terrorist behavior.

    Science.gov (United States)

    Mackert, Jürgen

    2014-01-01

    The article argues that individualist accounts cannot adequately explain the social dynamics of terrorist behavior as they turn analyses of terrorism into analyses of terrorists. A relational approach that concentrates on the social relations between terrorist organizations and their members would be able to do this, however. Therefore, the article presents a formal analysis that makes the "secret society" of terrorists the lynchpin of an explanation of how terrorist organizations shape the behavioral conditions of volunteers and suicide terrorists in a manner that triggers a type of behavior we might call terrorism.

  3. Adaptive management: a paradigm for remediation of public facilities following a terrorist attack.

    Science.gov (United States)

    Whicker, Jeffrey J; Janecky, David R; Doerr, Ted B

    2008-10-01

    Terrorist actions are aimed at maximizing harm (health, psychological, economical, and political) through the combined physical impacts of the act and fear. Immediate and effective response to a terrorist act is critical to limit human and environmental harm, effectively restore facility function, and maintain public confidence. Though there have been terrorist attacks in public facilities that we have learned from, overall our experiences in restoration of public facilities following a terrorist attack are limited. Restoration of public facilities following a release of a hazardous material is inherently far more complex than in industrial settings and has many unique technical, economic, social, and political challenges. For example, there may be a great need to quickly restore the facility to full operation and allow public access even though it was not designed for easy or rapid restoration, and critical information is needed for quantitative risk assessment and effective restoration must be anticipated to be incomplete and uncertain. Whereas present planning documents have substantial linearity in their organization, the "adaptive management" paradigm provides a constructive parallel paradigm for restoration of public facilities that anticipates and plans for uncertainty, inefficiencies, and stakeholder participation. Adaptive management grew out of the need to manage and restore natural resources in highly complex and changing environments with limited knowledge about causal relationships and responses to restoration actions. Similarities between natural resource management and restoration of a public facility after a terrorist attack suggest that integration of adaptive management principles explicitly into restoration processes will result in substantially enhanced and flexible responses necessary to meet the uncertainties of potential terrorist attacks.

  4. Simulation of a terrorist attack with intent to a source of Iridium-192 and Radium Sulphate-226: procedures for radiation emergency actions; Simulacao de uma intencao de atentado terrorista com uma fonte de Iridio-192 e Sulfato de Radio-226: procedimentos para acoes de emergencia radiologica

    Energy Technology Data Exchange (ETDEWEB)

    Aguiar, Bruno Dias de

    2013-07-01

    The accomplishment of major public events comprises a previous radiological safety planning network, since both public safety and safeguards criteria are based upon risk factors, to which individuals and even the environment may be exposed to, moreover in radiological, nuclear and/or terrorist threats. Therefore, a preventive and extensive local radiological survey must be performed, aiming the detection of unexpected radioactive material, being it a sealed or unsealed source or even in the dispersed form. Once confirmed its presence, protective actions must be started up, with monitoring and restraint of the source/material, followed by dose and dose rate assessment in environment, as well as contamination in air and in surfaces in general. As a consequence, such measures must be carried out at once, according to specific protocols adopted by the responding team, as soon as the incident is confirmed. Aiming a better qualification in the attendance of major events, a simulated scenario is proposed in this study, comprising an incident with the malicious presence of a radioactive source in the Mario Filho Stadium (Maracana). (author)

  5. Lone-Actor Terrorist Target Choice.

    Science.gov (United States)

    Gill, Paul; Corner, Emily

    2016-09-01

    Lone-actor terrorist attacks have risen to the forefront of the public's consciousness in the past few years. Some of these attacks were conducted against public officials. The rise of hard-to-detect, low-tech attacks may lead to more public officials being targeted. This paper explores whether different behavioral traits are apparent within a sample of lone-actor terrorists who plotted against high-value targets (including public officials) than within a sample of lone actors who plotted against members of the public. Utilizing a unique dataset of 111 lone-actor terrorists, we test a series of hypotheses related to attack capability and operational security. The results indicate that very little differentiates those who attack high-value targets from those who attack members of the public. We conclude with a series of illustrations to theorize why this may be the case. Copyright © 2016 John Wiley & Sons, Ltd.

  6. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  7. Reducing hypothetical bias in choice experiments

    DEFF Research Database (Denmark)

    Ladenburg, Jacob; Olsen, Søren Bøye; Nielsen, Rasmus Christian Fejer

    eliminate some of the hypothetical bias. The present paper tests an addition to Cheap Talk, an Opt-Out Reminder. The Opt-Out Reminder is an objective short script presented prior to the choice sets, prompting the respondent to choose the opt-out alternative, if he/she finds the proposed policy generated...... alternatives in a choice set too expensive. The results suggest that adding an Opt-Out Reminder to Cheap Talk can in fact reduce hypothetical bias even further and reduces some of the ineffectiveness of CT in relation to the survey bid range and experienced respondents....

  8. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  9. Reactions to Hypothetical, Jealousy Producing Events.

    Science.gov (United States)

    Hansen, Gary L.

    1982-01-01

    Asked subjects (N=220) how they would feel about their mates' behavior in eight hypothetical situations designed to measure jealousy. Responses indicated that jealousy is likely to be a major issue. Sex role orientation is most consistently related to jealousy with sex role traditional subjects being the most jealous. (Author)

  10. Terrorist Decision-Making: Insights from Economics and Political Science

    Directory of Open Access Journals (Sweden)

    Jacob N. Shapiro

    2012-10-01

    Full Text Available Terrorist groups repeatedly take actions that are ultimately politically counter-productive. Sometimes these are the result of deliberate calculations that happen to be mistaken - Al-Qaeda’s decision to conduct the 9/11 attacks is the most obvious example of an ultimately self-defeating operation. Sometimes they reflect the challenges groups face in controlling their operatives: Al-Qaeda in Iraq’s excessive public violence against other Sunni organisations stand out. At other times they appear to steer difficult political waters quite effectively despite of deep internal divisions—Hamas is the exemplar here. This article reviews recent developments in the literature on terrorist decision-making in economics and political science. Overall, tremendous advances have been made in the last 10 years, but much work remains to be done. In particular, it is  argued that the literature needs to do better at testing its theories in inferentially credible ways and at considering terrorism as one tactical option among many for opposition political groups.

  11. Malaysia and Singapore's terrorist rehabilitation programs : learning and adapting to terrorist threats

    OpenAIRE

    Khor, Laura

    2013-01-01

    The central question of this thesis examines how Malaya/Malaysia and Singapore learned and adapted successful terrorist disengagement programs and policies; through their unique and non-military rehabilitation programs. The methodology is a comparative case study analysis of Malaysia and Singapore. In order to understand how the countries of Malaya/Malaysia and Singapore adapted a colonial-era counter-insurgency program to disengage Communist Terrorists into a program that now rehabilitates r...

  12. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  13. Gravity Helped Terrorists Destory Twin Towers

    Institute of Scientific and Technical Information of China (English)

    李兆增

    2002-01-01

    Though terrorists triggered (触发) the collapse (倒塌) of the World Trade Center's Twin Towers, much of the energy--calculated by a physicist to have been at least 2 percent that of the atomic bomb dropped on Hiroshima(广岛)--was supplied by nature's most ubiquitous(普通存在的)force: gravity.

  14. Definition of Terrorist Act under Eth Law

    African Journals Online (AJOL)

    Wondwossen_D_K

    would have been treated as terrorist under regional and international law. This has a .... The Australian anti-terrorism law, one of the legislation said to have been .... UN Security Council: 1985–2004,' Chinese Journal of International Law, 141, ..... Internationally Protected Persons, including Diplomatic Agents, adopted by.

  15. Estimating Terrorist Risk with Possibility Theory

    Energy Technology Data Exchange (ETDEWEB)

    J.L. Darby

    2004-11-30

    This report summarizes techniques that use possibility theory to estimate the risk of terrorist acts. These techniques were developed under the sponsorship of the Department of Homeland Security (DHS) as part of the National Infrastructure Simulation Analysis Center (NISAC) project. The techniques have been used to estimate the risk of various terrorist scenarios to support NISAC analyses during 2004. The techniques are based on the Logic Evolved Decision (LED) methodology developed over the past few years by Terry Bott and Steve Eisenhawer at LANL. [LED] The LED methodology involves the use of fuzzy sets, possibility theory, and approximate reasoning. LED captures the uncertainty due to vagueness and imprecision that is inherent in the fidelity of the information available for terrorist acts; probability theory cannot capture these uncertainties. This report does not address the philosophy supporting the development of nonprobabilistic approaches, and it does not discuss possibility theory in detail. The references provide a detailed discussion of these subjects. [Shafer] [Klir and Yuan] [Dubois and Prade] Suffice to say that these approaches were developed to address types of uncertainty that cannot be addressed by a probability measure. An earlier report discussed in detail the problems with using a probability measure to evaluate terrorist risk. [Darby Methodology]. Two related techniques are discussed in this report: (1) a numerical technique, and (2) a linguistic technique. The numerical technique uses traditional possibility theory applied to crisp sets, while the linguistic technique applies possibility theory to fuzzy sets. Both of these techniques as applied to terrorist risk for NISAC applications are implemented in software called PossibleRisk. The techniques implemented in PossibleRisk were developed specifically for use in estimating terrorist risk for the NISAC program. The LEDTools code can be used to perform the same linguistic evaluation as

  16. Visualizing disaster attitudes resulting from terrorist activities.

    Science.gov (United States)

    Khalid, Halimahtun M; Helander, Martin G; Hood, Nilwan A

    2013-09-01

    The purpose of this study was to analyze people's attitudes to disasters by investigating how people feel, behave and think during disasters. We focused on disasters induced by humans, such as terrorist attacks. Two types of textual information were collected - from Internet blogs and from research papers. The analysis enabled forecasting of attitudes for the design of proactive disaster advisory scheme. Text was analyzed using a text mining tool, Leximancer. The outcome of this analysis revealed core themes and concepts in the text concerning people's attitudes. The themes and concepts were sorted into three broad categories: Affect, Behaviour, and Cognition (ABC), and the data was visualized in semantic maps. The maps reveal several knowledge pathways of ABC for developing attitudinal ontologies, which describe the relations between affect, behaviour and cognition, and the sequence in which they develop. Clearly, terrorist attacks induced trauma and people became highly vulnerable.

  17. The developmental dynamics of terrorist organizations.

    Science.gov (United States)

    Clauset, Aaron; Gleditsch, Kristian Skrede

    2012-01-01

    We identify robust statistical patterns in the frequency and severity of violent attacks by terrorist organizations as they grow and age. Using group-level static and dynamic analyses of terrorist events worldwide from 1968-2008 and a simulation model of organizational dynamics, we show that the production of violent events tends to accelerate with increasing size and experience. This coupling of frequency, experience and size arises from a fundamental positive feedback loop in which attacks lead to growth which leads to increased production of new attacks. In contrast, event severity is independent of both size and experience. Thus larger, more experienced organizations are more deadly because they attack more frequently, not because their attacks are more deadly, and large events are equally likely to come from large and small organizations. These results hold across political ideologies and time, suggesting that the frequency and severity of terrorism may be constrained by fundamental processes.

  18. The Developmental Dynamics of Terrorist Organizations

    Science.gov (United States)

    Clauset, Aaron; Gleditsch, Kristian Skrede

    2012-01-01

    We identify robust statistical patterns in the frequency and severity of violent attacks by terrorist organizations as they grow and age. Using group-level static and dynamic analyses of terrorist events worldwide from 1968–2008 and a simulation model of organizational dynamics, we show that the production of violent events tends to accelerate with increasing size and experience. This coupling of frequency, experience and size arises from a fundamental positive feedback loop in which attacks lead to growth which leads to increased production of new attacks. In contrast, event severity is independent of both size and experience. Thus larger, more experienced organizations are more deadly because they attack more frequently, not because their attacks are more deadly, and large events are equally likely to come from large and small organizations. These results hold across political ideologies and time, suggesting that the frequency and severity of terrorism may be constrained by fundamental processes. PMID:23185267

  19. The developmental dynamics of terrorist organizations.

    Directory of Open Access Journals (Sweden)

    Aaron Clauset

    Full Text Available We identify robust statistical patterns in the frequency and severity of violent attacks by terrorist organizations as they grow and age. Using group-level static and dynamic analyses of terrorist events worldwide from 1968-2008 and a simulation model of organizational dynamics, we show that the production of violent events tends to accelerate with increasing size and experience. This coupling of frequency, experience and size arises from a fundamental positive feedback loop in which attacks lead to growth which leads to increased production of new attacks. In contrast, event severity is independent of both size and experience. Thus larger, more experienced organizations are more deadly because they attack more frequently, not because their attacks are more deadly, and large events are equally likely to come from large and small organizations. These results hold across political ideologies and time, suggesting that the frequency and severity of terrorism may be constrained by fundamental processes.

  20. Targeting Terrorist Leaders: The Peruvian Untouchables Experience

    Science.gov (United States)

    2005-12-01

    Dedication The Peruvian National Police is a divisional organization82 subdivided into directorates and regions (as divisions ) that are focused on...23 Strong, 203. 24 Revista Debate, El Poder en el Perú. (Power in Peru) (Lima: DESCO, 1983 1992). 25 Max...response to the increasing terrorist attacks in Lima, a division of the State Security Directorate was created with the name of Counter Subversion Division

  1. A Conceptual Framework for Analyzing Terrorist Groups,

    Science.gov (United States)

    1985-06-01

    liberation, and American corporations are considered an element oppressing the work - ing class. 54 A CONCEPTUAL FRAMEWORK FOR ANALYZING TERRORIST GROUPS...personnel and installations in Guatemala, Iran, and Spain to protest American support of Israel’s invasion of Lebanon. Other factors are also at work ...inferred? D7. Are the goals iealistically obtainable? D8. Do the members envisage a long struggle? Are they milleni - alists (a new world after chaos?) E

  2. Terrorist financing beyond 9/11

    OpenAIRE

    Loretta Napoleoni

    2007-01-01

    This article analyzes the impact of counter-terrorism policies, e.g., the Patriot Act and the war in Iraq, on the financial structure of European terror networks and argues that such policies, far from defeating Jihadist activities, ended up boosting them. In response to such measures, terror finances have been skillfully restructured, the main changes being the decentralization of funding activity in Europe and in the Middle East and the declining cost of terrorist attacks.

  3. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  4. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  5. Linguistic evaluation of terrorist scenarios: example application.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2007-03-01

    In 2005, a group of international decision makers developed a manual process for evaluating terrorist scenarios. That process has been implemented in the approximate reasoning Java software tool, LinguisticBelief, released in FY2007. One purpose of this report is to show the flexibility of the LinguisticBelief tool to automate a custom model developed by others. LinguisticBelief evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised of fuzzy sets, and a rule base describes the reasoning on combinations of variables fuzzy sets. Uncertainty is considered and propagated through the rule base using the belief/plausibility measure. This report documents the evaluation and rank-ordering of several example terrorist scenarios for the existing process implemented in our software. LinguisticBelief captures and propagates uncertainty and allows easy development of an expanded, more detailed evaluation, neither of which is feasible using a manual evaluation process. In conclusion, the Linguistic-Belief tool is able to (1) automate an expert-generated reasoning process for the evaluation of the risk of terrorist scenarios, including uncertainty, and (2) quickly evaluate and rank-order scenarios of concern using that process.

  6. VIOLENT FRAMES IN ACTION

    Energy Technology Data Exchange (ETDEWEB)

    Sanfilippo, Antonio P.; McGrath, Liam R.; Whitney, Paul D.

    2011-11-17

    We present a computational approach to radical rhetoric that leverages the co-expression of rhetoric and action features in discourse to identify violent intent. The approach combines text mining and machine learning techniques with insights from Frame Analysis and theories that explain the emergence of violence in terms of moral disengagement, the violation of sacred values and social isolation in order to build computational models that identify messages from terrorist sources and estimate their proximity to an attack. We discuss a specific application of this approach to a body of documents from and about radical and terrorist groups in the Middle East and present the results achieved.

  7. The timing of terrorist attacks: An optimal stopping approach

    Directory of Open Access Journals (Sweden)

    Thomas Jensen

    2016-02-01

    Full Text Available I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later.

  8. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore...

  9. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  10. Students design unmanned drone to take action against terrorist activity

    OpenAIRE

    Nystrom, Lynn A.

    2010-01-01

    In less than two years, an unmanned aircraft search and rescue competition will be happening in a remote area in Australia. Kevin Kochersberger, director of the Unmanned System Lab at Virginia Tech, says he hopes to take a student design team and believes they have an excellent shot at winning the $50,000 prize money.

  11. Offensive Counterterrorism Targeted killing in eliminating terrorist target: the case of the USA and Israel

    Directory of Open Access Journals (Sweden)

    Hermínio Matos

    2012-01-01

    Full Text Available Due to the "global terrorism project", some States have adopted offensive counterterrorism measures which, though within national strategies on security and defense, contemplate the use of military power and the use of lethal force against non-state actors - individuals, groups or terrorist organizations - beyond their national borders. Reformulating the security paradigm has led, in these cases, to policies against terrorism. This is the case of targeted killing - the killing of selected targets - by the USA and Israel. Targeted killing actions - using essentially but not only drones - in Pakistan and Yemen by the American administration, a well as the Israeli response to Palestinian terrorism, are under heated debate in terms of their efficiency and legality. Thus, this paper aims to not only provide an analytical framework on this theme but also analyze the scope and impact of these counter terrorist strategies by the two countries.

  12. Dosage of the intensity of terrorist acts in countries where the phenomenon is endogenous. The Colombian case

    OpenAIRE

    Tania Gabriela Rodríguez Morales

    2015-01-01

    Historically, terrorism -except in outstanding cases- has not opted for a single way to execute its plans. Often it has developed various types of action with the passage of time and changing of technologies. This has constituted a systematic execution of crime; however, not all countries that faced the phenomenon have been consistent in dosage and rating of it. This dosage is related to the intensity in the execution of terrorist actions, also it is related to the implementation of an alarm ...

  13. Hypothetical conflict situations with friends and peers

    Directory of Open Access Journals (Sweden)

    Petrović Danijela S.

    2012-01-01

    Full Text Available This paper deals with age and sex differences in preferred strategies of conflict resolution in friendship and peer relationships. The study was conducted on the sample of 286 adolescents. Conflict resolution strategies have been investigated by the method of hypothetical conflict situations. For the purposes of this research, we have created an instrument consisting of 20 hypothetical situations, with the following subjects of conflict: breaking the agreement, non-compliance with opinion differences, provocations, dishonesty and stubbornness. Conflict resolution strategies we examined were giving in, withdrawal, competition and problem solving. The results have shown that problem solving is the dominant strategy of adolescents in conflict with friends, while in peer conflicts they more often opt for competition. Age differences are reflected in the fact that older adolescents are more likely to choose problem solving than younger, whereas younger adolescents are more likely to choose a retreat (withdrawal strategy than older. Girls are more prone to choosing problem solving than boys, who, on the other hand, tend to withdraw more than girls. Also, gender of the other person in the conflict is proved to be important - in conflict with male peers, adolescents choose competition to a greater extent and withdraw to a minor extent, compared to when they are in conflict with female peers. The results have practical implications as well. In programs for teaching constructive conflict resolution that are designed for younger adolescents there should be more emphasis on empowerment and training for assertive behaviour. In addition, when teaching about constructive conflict resolution strategies, it is important to consider the gender of adolescents as well as the gender of the person with whom they are in conflict.

  14. A Physicist Looks at the Terrorist Threat

    Science.gov (United States)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  15. Radioactive Fallout from Terrorist Nuclear Detonations

    Energy Technology Data Exchange (ETDEWEB)

    Marrs, R E

    2007-05-03

    Responding correctly during the first hour after a terrorist nuclear detonation is the key to reducing casualties from a low-yield surface burst, and a correct response requires an understanding of the rapidly changing dose rate from fallout. This report provides an empirical formula for dose rate as a function of time and location that can guide the response to an unexpected nuclear detonation. At least one post-detonation radiation measurement is required if the yield and other characteristics of the detonation are unknown.

  16. Disrupting Threat Finances: Using Financial Information to Disrupt Terrorist Organizations

    Science.gov (United States)

    2008-04-01

    homicides of U.S. citizens overseas, sabotage, and extortion by threatening the use of WMD. 4.6.2.1. Terrorist Financing Operations Section (TFOS... fraudulent travel documents and, to the extent attainable, by enhancing terrorist screening and passenger security procedures—and b) continue

  17. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  18. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions...

  19. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a practi

  20. 22 CFR 40.32 - Terrorist activities. [Reserved

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Terrorist activities. 40.32 Section 40.32 Foreign Relations DEPARTMENT OF STATE VISAS REGULATIONS PERTAINING TO BOTH NONIMMIGRANTS AND IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Security and Related Grounds § 40.32 Terrorist...

  1. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Foreign terrorist organization. 597.309 Section 597.309 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS General Definitions §...

  2. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions...

  3. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  4. Exploring First Responder Tactics in a Terrorist Chemical Attack

    Science.gov (United States)

    2008-12-01

    DATE December 2008 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Exploring First Responder Tactics in a Terrorist...Approved for public release; distribution is unlimited EXPLORING FIRST RESPONDER TACTICS IN A TERRORIST CHEMICAL ATTACK Kong Pin Gilbert...115 b. Earlier First Responder Entry Times are Associated with a Better Chance of Mean Percentage < 18.9

  5. Benchmark analysis for quantifying urban vulnerability to terrorist incidents.

    Science.gov (United States)

    Piegorsch, Walter W; Cutter, Susan L; Hardisty, Frank

    2007-12-01

    We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric significantly describes both terrorist incidence and occurrence of human casualties from terrorist events in these urban centers. We also introduce benchmark analytic technologies from applications in toxicological risk assessment to this social risk/vulnerability paradigm, and use these to distinguish levels of high and low urban vulnerability to terrorism. It is seen that the benchmark approach translates quite flexibly from its biological roots to this social scientific archetype.

  6. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  7. What explains the survival of terrorist groups? Alliances and competition

    Directory of Open Access Journals (Sweden)

    Brian J. Phillips

    2016-04-01

    Full Text Available Why do some terrorist groups last longer than others? What does this longevity tell us about the effectiveness of terrorist organisations? This article first examines why organisational survival can be considered to be an element of organisational effectiveness. Second, the article reviews the recent literature on terrorist group longevity,including a systematic examination of ten quantitative studies on the subject. The analysis shows that certain factors are repeatedly associated with longevity, such as group size and participation in terrorist group alliances. Third, given the theoretical interest in interorganisational relationships,consideration is then given to arguments on the likely reasons terrorist group alliances and intergroup competition contribute to group longevity. Finally, some suggestions are made to move research on this topic forward.

  8. Evaluation of an expedient terrorist vehicle barrier

    Energy Technology Data Exchange (ETDEWEB)

    McCallen, D; Lewis, P; Wattenburg, B; Mote, P

    2000-02-28

    The threat of terrorist vehicle bombs has become evident in the past few years. The explosive power that can be generated by a ''home made'' bomb carried by a standard van or moderate size truck can generate sufficient blast overpressures to cause major damage or catastrophic collapse to building structures. There are a number of means available to help prevent a successful terrorist attack on a facility. One measure consists of the gathering of intelligence that can be used to thwart an attack before it takes place. The design and retrofit of structures and structural systems which can resist blast loadings and protect occupants is another area which is currently receiving a great deal of attention by the security community. Another measure, which can be used to protect many existing facilities, is to restrict access to the facility. This option consists of keeping unauthorized vehicles as far as possible from the facility so that if a vehicle bomb does approach the facility, the distance at which the bomb is detonated will result in significant reduction in the overpressures by the time the blast wave reaches the protected structure. This paper describes a simple and efficient vehicle barrier concept that can be used to prevent unauthorized vehicle access. The feasibility study described herein consisted of a field experimental program to test the validity of the barrier concept, and demonstrated the ability of the simple barrier to effectively disable speeding vehicles.

  9. Dosage of the intensity of terrorist acts in countries where the phenomenon is endogenous. The Colombian case

    Directory of Open Access Journals (Sweden)

    Tania Gabriela Rodríguez Morales

    2015-06-01

    Full Text Available Historically, terrorism -except in outstanding cases- has not opted for a single way to execute its plans. Often it has developed various types of action with the passage of time and changing of technologies. This has constituted a systematic execution of crime; however, not all countries that faced the phenomenon have been consistent in dosage and rating of it. This dosage is related to the intensity in the execution of terrorist actions, also it is related to the implementation of an alarm to avoid the materialization of the act as well as the construction of an action protocol by the state security forces so that this can be avoided. This protocol allows us to know and repel terrorist activity underway.

  10. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  11. In Silico screening for functional candidates amongst hypothetical proteins

    DEFF Research Database (Denmark)

    Desler, Claus; Suravajhala, Prashanth; Sanderhoff, May

    2009-01-01

    BACKGROUND: The definition of a hypothetical protein is a protein that is predicted to be expressed from an open reading frame, but for which there is no experimental evidence of translation. Hypothetical proteins constitute a substantial fraction of proteomes of human as well as of other...... strategy where eukaryotic hypothetical proteins are sorted according to two criteria that can be reliably identified in silico: the presence of subcellular targeting signals and presence of characterized protein domains. To validate the selection strategy we applied it on a database of human hypothetical......, defined as hypothetical in 2006, have later been characterized as mitochondrial. CONCLUSION: Among the total amount of human proteins hypothetical in 2006, 21% have later been experimentally characterized and 6% of those have been shown to have a role in a mitochondrial context. In contrast, among...

  12. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  13. Cutting the Link Between Drugs and Terrorists: Countering Major Terrorist-Financing Means

    Science.gov (United States)

    2013-06-01

    try to fill these gaps of the terrorist narcotic interactions by providing a model which could offer a reasonable solution for cutting the links...consumption. In addition to undermining economic and social development, the use of these drugs has brought misery to thousands of people and contributed...consists of nine stages: extracting the morphine from raw opium, separating the morphine solution from the water-insoluble opium components, treatment

  14. How Could a Terrorist be De-Radicalised?

    Directory of Open Access Journals (Sweden)

    Luke Bertram

    2015-12-01

    Full Text Available This article addresses the potential to de-radicalize a terrorist, and if so how could this be achieved? The article also outlines the distinction between de-radicalization, counter-radicalization and disengagement. In order to understand the potential of de-radicalization techniques, research examines the factors that might lead to initial radicalization. The strategy of some state-based de-radicalization programs, particularly the Saudi Arabian de-radicalization program are examined and the importance of unique tailoring in these programs is identified. The relevance of ideology and life skill training within de-radicalization programs is also examined. The extensive impact that information communication technology has had on radicalization is also addressed and following on, the potential for de-radicalization and counter-radicalization through information communication platforms is also discussed. The importance of an accurate and appropriately delivered counter-narrative message is examined and the value of such a counter-narrative is discussed in terms of it possibly planting the seed of question in a terrorist, which may eventually support the terrorist questioning of terrorist group ideology. Highly relevant to the future de-radicalization of an ‘in organisation’ terrorist is the issue of how states might manage the potential return of terrorists who are known to be overseas and whether the best solution is or is not to prevent the terrorist from returning to a home-country, which is examined within. It could be presumed that a terrorist who is returning to a home-country may face some term of incarceration, as an extension of this issue that states must address, the effect that incarceration might have on a terrorist is also examined. The discussions in this article are relevant to policy-makers, de-radicalization program designers and security sector actors.

  15. Two Models for Semi-Supervised Terrorist Group Detection

    Science.gov (United States)

    Ozgul, Fatih; Erdem, Zeki; Bowerman, Chris

    Since discovery of organization structure of offender groups leads the investigation to terrorist cells or organized crime groups, detecting covert networks from crime data are important to crime investigation. Two models, GDM and OGDM, which are based on another representation model - OGRM are developed and tested on nine terrorist groups. GDM, which is basically depending on police arrest data and “caught together” information and OGDM, which uses a feature matching on year-wise offender components from arrest and demographics data, performed well on terrorist groups, but OGDM produced high precision with low recall values. OGDM uses a terror crime modus operandi ontology which enabled matching of similar crimes.

  16. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  17. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  18. Preschool Children's Judgments about Hypothetical and Actual Transgressions.

    Science.gov (United States)

    Smetana, Judith G.; And Others

    1993-01-01

    Examined three and four year olds' judgments about transgressions. Children judged moral transgressions to be more serious, punishable, and wrong than conventional transgressions; hypothetical transgressions to be more wrong independent of rules than actual transgressions; and hypothetical moral transgressions to be more independent of rules than…

  19. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  20. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  1. Why Terrorists Overestimate the Odds of Victory 

    Directory of Open Access Journals (Sweden)

    Max Abrahms

    2012-10-01

    Full Text Available Terrorism is puzzling behavior for political scientists. On one hand, terrorist attacks generally hail from the politically aggrieved. On the other hand, a growing body of scholarship finds the tactic politically counterproductive. Unlike guerrilla attacks on military targets, terrorist attacks on civilian targets lower the odds of governments making  concessions. This article proposes and tests a psychological theory to account for why militant groups engage in terrorism, given the political costs of attacking civilians.

  2. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  3. Reality bytes: cyberterrorism and terrorist 'use' of the Internet

    OpenAIRE

    Conway, Maura

    2002-01-01

    This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non-violent 'Use' at one end to 'Cyberterrorism' at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups' 'use' of the Internet, in particular the content of their Web sites, and their 'misuse' of the medium, as in hacking wars, for example. Terrorist groups' use of the Internet for the purpose of inter-group communication is also surveyed, partly be...

  4. Radiological Consequence Analyses Following a Hypothetical Severe Accident in Japan

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Juyub; Kim, Juyoul [FNC Technology Co., Yongin (Korea, Republic of)

    2016-10-15

    In order to reflect the lessons learned from the Fukushima Daiichi nuclear power plant accident, a simulator which is named NANAS (Northeast Asia Nuclear Accident Simulator) for overseas nuclear accident has been developed. It is composed of three modules: source-term estimation, atmospheric dispersion prediction and dose assessment. For the source-term estimation module, the representative reactor types were selected as CPR1000, BWR5 and BWR6 for China, Japan and Taiwan, respectively. Considering the design characteristics of each reactor type, the source-term estimation module simulates the transient of design basis accident and severe accident. The atmospheric dispersion prediction module analyzes the transport and dispersion of radioactive materials and prints out the air and ground concentration. Using the concentration result, the dose assessment module calculates effective dose and thyroid dose in the Korean Peninsula region. In this study, a hypothetical severe accident in Japan was simulated to demonstrate the function of NANAS. As a result, the radiological consequence to Korea was estimated from the accident. PC-based nuclear accident simulator, NANAS, has been developed. NANAS contains three modules: source-term estimation, atmospheric dispersion prediction and dose assessment. The source-term estimation module simulates a nuclear accident for the representative reactor types in China, Japan and Taiwan. Since the maximum calculation speed is 16 times than real time, it is possible to estimate the source-term release swiftly in case of the emergency. The atmospheric dispersion prediction module analyzes the transport and dispersion of radioactive materials in wide range including the Northeast Asia. Final results of the dose assessment module are a map projection and time chart of effective dose and thyroid dose. A hypothetical accident in Japan was simulated by NANAS. The radioactive materials were released during the first 24 hours and the source

  5. A Survey on Terrorist Network Mining: Current Trends and Opportunities

    Directory of Open Access Journals (Sweden)

    Akhilesh Tiwari

    2012-09-01

    Full Text Available Along with the modernization and widespread usage of Internet, the security of the mankind has become one of the major issues today. The threat of human society from the terrorists is the challenge faced dominantly. Advancement in the technology has not only helped the common people for the growth but also these inhuman people to adversely affect the society with sophisticated techniques. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed and detected. To achieve this, the law enforcement agencies are using data mining techniques as one of the effective solution. One such technique of data mining is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways foridentifying terrorist activities.

  6. In Silico screening for functional candidates amongst hypothetical proteins

    Directory of Open Access Journals (Sweden)

    Sanderhoff May

    2009-09-01

    Full Text Available Abstract Background The definition of a hypothetical protein is a protein that is predicted to be expressed from an open reading frame, but for which there is no experimental evidence of translation. Hypothetical proteins constitute a substantial fraction of proteomes of human as well as of other eukaryotes. With the general belief that the majority of hypothetical proteins are the product of pseudogenes, it is essential to have a tool with the ability of pinpointing the minority of hypothetical proteins with a high probability of being expressed. Results Here, we present an in silico selection strategy where eukaryotic hypothetical proteins are sorted according to two criteria that can be reliably identified in silico: the presence of subcellular targeting signals and presence of characterized protein domains. To validate the selection strategy we applied it on a database of human hypothetical proteins dating to 2006 and compared the proteins predicted to be expressed by our selecting strategy, with their status in 2008. For the comparison we focused on mitochondrial proteins, since considerable amounts of research have focused on this field in between 2006 and 2008. Therefore, many proteins, defined as hypothetical in 2006, have later been characterized as mitochondrial. Conclusion Among the total amount of human proteins hypothetical in 2006, 21% have later been experimentally characterized and 6% of those have been shown to have a role in a mitochondrial context. In contrast, among the selected hypothetical proteins from the 2006 dataset, predicted by our strategy to have a mitochondrial role, 53-62% have later been experimentally characterized, and 85% of these have actually been assigned a role in mitochondria by 2008. Therefore our in silico selection strategy can be used to select the most promising candidates for subsequent in vitro and in vivo analyses.

  7. Theoretical perspectives of terrorist enemies as networks.

    Energy Technology Data Exchange (ETDEWEB)

    Spulak, Robert George, Jr.; Glicken, Jessica

    2005-08-01

    This perspective of terrorist enemies as networks by two distinguished associate fellows of the Joint Special Operations University (JSOU) follows as a result of its recent initiative to support USSOCOM strategic planning for the Global War on Terrorism. The paper is a manifestation of JSOU's goals for contributing products that will advance SOF strategic art and generating strategic outreach to the military, civilian, and academic communities to enrich those products. Dr. Robert Spulak and Dr. Jessica Glicken Turnley presented the findings of this paper to assembled strategic planners from USSOCOM, other combatant commands, and interagency players at the Center for Special Operations plan development conference, September 2005, in Tampa, Florida. At that meeting, the authors put forward a number of helpful planning concepts based on their professional studies in science and the humanities and their experiences in government and business. The JSOU Strategic Studies Department is pleased to facilitate the association of USSOCOM strategic planners with civilian expertise and insights that can broaden military thought and encourage planning decisions directly relevant to the changing global environment. Through JSOU's strategic outreach initiative, experts in many professional disciplines have signaled their willingness to support the Nation's counterterrorism efforts. In that spirit, JSOU is proud to commend this paper to SOF readers and appreciates the support of Dr. Spulak and Dr. Turnley.

  8. Administrative instruction relative to the national doctrine of use of rescue and treatments means face to a terrorist action implying radioactive matters n. 800/S.G.D.N./P.S.E./P.P.S. of the 23 april 2003; Circulaire relative a la doctrine nationale d'emploi des moyens de secours et de soins face a une action terroriste mettant en oeuvre des matieres radioactives n. 800/S.G.D.N./P.S.E./P.P.S. du 23 avril 2003

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    This administrative instruction gives the situations where it applies, the principal public services that could get involved. The specific management of alert is detailed by importance level, then come the actions of first aids, the different zones of actions (from the contaminated area to the help area), the protection equipment is specified and the management of damaged people in each area. (N.C.)

  9. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    Energy Technology Data Exchange (ETDEWEB)

    Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

    2010-01-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  10. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  11. A Bayesian belief network of threat anticipation and terrorist motivations

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  12. Mediating the social and psychological impacts of terrorist attacks: the role of risk perception and risk communication.

    Science.gov (United States)

    Rogers, M Brooke; Amlôt, Richard; Rubin, G James; Wessely, Simon; Krieger, Kristian

    2007-06-01

    The public's understanding of chemical, biological, radiological and nuclear (CBRN) related issues and their likely actions following a CBRN incident is an issue of great concern, as public psychological and behavioural responses will help determine subsequent morbidity and mortality rates. This paper explores the role of effective government communication with the public and its role in mediating the social and psychological impact of terrorist attacks. We examine the importance of effective communication in reducing morbidity and mortality in the event of a terrorist attack and explore the impact of risk perceptions in determining the success or failure of risk communication strategies. This includes the examination of the role of fear as a health risk, and the identification of factors relevant to public trust in risk communication. Finally, an investigation of the type of information desired by members of the public leads the authors to make risk communication recommendations targeted at the promotion of more adaptive behaviours in response to CBRN attacks.

  13. Influence of Terrorist Activities on Financial Markets: Evidence from KSE

    Directory of Open Access Journals (Sweden)

    Usman Bashir

    2013-05-01

    Full Text Available This paper investigates the influence of terrorist activities taking place in Pakistan on KSE (Karachi Stock Exchange for the period of 01/2005 to 12/2010 using the GARCH & GARCH- EVT to identify the relationship between these two variables, the study establishes that the terrorist activities adversely affect the financial markets and in case of KSE, it is highly significant relation. Reason for the negative relationship exists because of the foremost increase in number of terrorism attacks in Pakistan.

  14. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical

  15. Comparing hypothetical versus non-hypothetical methods for measuring willingness to pay in a food context

    Directory of Open Access Journals (Sweden)

    Laura Martínez-Carrasco

    2015-12-01

    Full Text Available Choosing a valid procedure to measure willingness to pay (WTP is crucial for designating optimum price policies or for evaluating the demand for new products. This study compares two methods for obtaining WTP in a food context: a random nth price auction and an open-ended contingent valuation (CV question. Participants were regular salad tomato buyers of Alicante and they were randomly assigned to one of the two treatments. The products about which they would show their WTP were traditional tomato varieties. Both treatments were divided into three stages: in the first stage the only available information was a reference price for the tomatoes. In stages 2 and 3 we revealed the local origin and the organic grown of the tomatoes respectively. Our results show that in the auction the percentage of participants willing to pay the same or more than the reference price was between 20 and 30%. In the CV method this percentage was between 40 and 65%. The mean WTP in the auction, considering the whole of the individuals, was situated between 1.90 and 2.13 €/kg. These same results obtained through the CV were situated between 2.54 and 3.21 €/kg. The results confirmed the findings of previous papers in which the hypothetical bias of CV was clarified because it yields higher values for WTP than the auction, especially when referring to the number of individuals willing to pay more. Additionally, hedonic price models were estimated for the prices obtained by both methods with the result that in all the models, WTP was directly related to the price paid for the latest purchase of tomatoes.

  16. Comparing hypothetical versus non-hypothetical methods for measuring willingness to pay in a food context

    Energy Technology Data Exchange (ETDEWEB)

    Martínez-Carrasco, L.; Brugarolas, M.; Martínez-Poveda, A.; Ruiz-Martínez, J.J.

    2015-07-01

    Choosing a valid procedure to measure willingness to pay (WTP) is crucial for designating optimum price policies or for evaluating the demand for new products. This study compares two methods for obtaining WTP in a food context: a random nth price auction and an open-ended contingent valuation (CV) question. Participants were regular salad tomato buyers of Alicante and they were randomly assigned to one of the two treatments. The products about which they would show their WTP were traditional tomato varieties. Both treatments were divided into three stages: in the first stage the only available information was a reference price for the tomatoes. In stages 2 and 3 we revealed the local origin and the organic grown of the tomatoes respectively. Our results show that in the auction the percentage of participants willing to pay the same or more than the reference price was between 20 and 30%. In the CV method this percentage was between 40 and 65%. The mean WTP in the auction, considering the whole of the individuals, was situated between 1.90 and 2.13 €/kg. These same results obtained through the CV were situated between 2.54 and 3.21 €/kg. The results confirmed the findings of previous papers in which the hypothetical bias of CV was clarified because it yields higher values for WTP than the auction, especially when referring to the number of individuals willing to pay more. Additionally, hedonic price models were estimated for the prices obtained by both methods with the result that in all the models, WTP was directly related to the price paid for the latest purchase of tomatoes. (Author)

  17. 3 CFR - Continuation of the National Emergency with Respect to Terrorists Who Threaten to Disrupt the...

    Science.gov (United States)

    2010-01-01

    ... to Terrorists Who Threaten to Disrupt the Middle East Peace Process Presidential Documents Other... Terrorists Who Threaten to Disrupt the Middle East Peace Process On January 23, 1995, by Executive Order... by foreign terrorists who threaten to disrupt the Middle East peace process. On August 20, 1998,...

  18. Selection, Availability, and Opportunity: The Conditional Effect of Poverty on Terrorist Group Participation

    Science.gov (United States)

    Kavanagh, Jennifer

    2011-01-01

    Poverty is often identified as a determinant of terrorist group participation, but existing research reveals mixed support for this relationship. Some studies find that macroeconomic decline is associated with increased production of terrorists, but micro-level research suggests terrorists have above average socioeconomic status and educational…

  19. Selection, Availability, and Opportunity: The Conditional Effect of Poverty on Terrorist Group Participation

    Science.gov (United States)

    Kavanagh, Jennifer

    2011-01-01

    Poverty is often identified as a determinant of terrorist group participation, but existing research reveals mixed support for this relationship. Some studies find that macroeconomic decline is associated with increased production of terrorists, but micro-level research suggests terrorists have above average socioeconomic status and educational…

  20. Terrorists and Fair Trial: The Right to a Fair Trial for Alleged Terrorists Detained in Guantánamo Bay

    Directory of Open Access Journals (Sweden)

    Kai Ambos

    2013-09-01

    Full Text Available This paper inquires into whether the right to a fair trial can be restricted with regard to alleged terrorists within the framework of the ‘war on terror’. After briefly identifying the relevant sources of this right and its content, possible restrictions are analysed. The paper elaborates, in particular, on international humanitarian law, such as the Third and Fourth Geneva Convention, and international human rights law, such as the International Covenant on Civil and Political Rights and the American Declaration of the Rights and Duties of Man. It further deals with US constitutional law. We conclude that the right to a fair trial fully applies to alleged terrorists irrespective of the context of their detention (armed conflict or peace or the qualification of these terrorists (de facto or unlawful combatants and thus amounts to a general principle of transnational criminal law.

  1. Hitting a Moving Target: A Strategic Tool for Analyzing Terrorist Threats.

    Science.gov (United States)

    Coleman, Ken; Ishisoko, Noriko; Trounce, Milana; Bernard, Kenneth

    The subject of terrorism risk can be confusing for both the general public and for those responsible for protecting us from attack. Relatively minor terrorist threats are often conflated with much more serious ones, in part because it is hard to quantify either intent or technical ability to carry out an attack. Plotting threats on a "potential mass casualties" versus "ease of obtainment or production" matrix creates some order out of a seemingly endless array of worldwide threats, and it highlights those threats that are in need of more urgent attention. The specific threats on this 2x2 matrix can fall into one or multiple quadrants, which can be qualitatively described as "most dangerous," "dangerous but difficult," "worrisome," and "persistent terror." By placing threats into these quadrants and illustrating movement within and between them, the matrix can help (1) visualize and parse a diverse set of threats, (2) view how threats have changed over time and judge the efficacy of current countermeasures, and (3) evaluate the merit of future actions and investments. Having a dynamic matrix that can visually map the comparative risk of terrorist threat events in toto and that can help us monitor the effectiveness of present and future resource investments can add intellectual rigor to some of the most difficult and daunting decisions pertaining to our nation's safety and security.

  2. A decision framework for managing risk to airports from terrorist attack.

    Science.gov (United States)

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period.

  3. Lexical exponents of hypothetical modality in Polish and Lithuanian

    Directory of Open Access Journals (Sweden)

    Roman Roszko

    2015-11-01

    To analyse both the languages there is used the method of theoretical contrastive studies, which the most important features are: (1 orienting the studies from the content grounds to the formal grounds, (2 using a semantic interlanguage as tertium comparationis. First of all, the content of hypothetical modality and its definition and paraphrase is given here. Next, the gradational character of this category is discussed. There are distinguished six groups of lexemes expressing the corresponding degrees of hypothetical modality — from a shadow of uncertainty (minimal degree of probability to an almost complete certainty (maximum degree of probability. The experimental Polish-Lithuanian corpus is widely applied in the studies.

  4. Exploring the Current Trends and Future Prospects in Terrorist Network Mining

    Directory of Open Access Journals (Sweden)

    Nisha Chaurasia

    2012-05-01

    Full Text Available In today’s era of hi-tech technologies, criminals are easily fulfilling their inhuman goals against the mankind. Thus, the security of civilians has significantly become important. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed using data mining techniques. One such technique is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways for identifying terrorist activities.

  5. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with religion,…

  6. Speculative security: the politics of pursuing terrorist monies

    NARCIS (Netherlands)

    de Goede, M.

    2012-01-01

    Since the terrorist acts of September 11, 2001, finance and security have become joined in new ways to produce particular targets of state surveillance. In Speculative Security, Marieke de Goede describes how previously unscrutinized practices such as donations and remittances, especially across nat

  7. Understanding Terrorist Network Topologies and Their Resilience Against Disruption

    NARCIS (Netherlands)

    Lindelauf, R.; Borm, P.E.M.; Hamers, H.J.M.

    2009-01-01

    This article investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks

  8. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  9. Speculative security: the politics of pursuing terrorist monies

    NARCIS (Netherlands)

    de Goede, M.

    2012-01-01

    Since the terrorist acts of September 11, 2001, finance and security have become joined in new ways to produce particular targets of state surveillance. In Speculative Security, Marieke de Goede describes how previously unscrutinized practices such as donations and remittances, especially across nat

  10. ECONOMIC AND LEGAL MECHANISMS TO COUNTER TERRORIST THREATS

    Directory of Open Access Journals (Sweden)

    G. V. Startsev

    2010-01-01

    Full Text Available Issues related to problems arising while using economic and legal facilities of counteraction to terroristic threats in Russian Federation A complex of. key national safety maintenance matters vital in modern conditions is analyzed. Particular attention is paid to economic and financial safety in interrelation with issues common to counteraction to organized and economic criminality, corruption and terrorism.

  11. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Specially designated global terrorist; SDGT. 594.310 Section 594.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions §...

  12. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  13. CRIMINAL TERRORIST GROUP IN THE NEW CRIMINAL LEGISLATION OF ROMANIA

    Directory of Open Access Journals (Sweden)

    Mirela GORUNESCU

    2016-05-01

    Full Text Available In the Romanian criminal law, there is a specialized regulation that defines criminal terrorist group, as variant of plurality of offenders. The present study presents this kind of criminal group by identifying the elements of differentiation compared to the organized crime group regulated by the Criminal Code.

  14. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Specially designated terrorist. 595.311 Section 595.311 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially...

  15. [The hospital care of victims of terrorist attacks].

    Science.gov (United States)

    Bouhaddou, Assena; Nion, Nathalie; Riou, Bruno; Blandeau, Fanny; Moreau, Pilar; Guemache, Sofia

    2017-04-01

    The treatment of victims of terrorist attacks in a trauma centre requires the putting in place of plans, training and simulation exercises. Previous experiences have highlighted the areas which require improvement. As exceptional health situations are unpredictable, it is essential to always be vigilant and prepared for an unforeseen event.

  16. Understanding the Dynamic System of Terrorist-Government Interaction

    Science.gov (United States)

    2003-03-01

    The most telling key of Al Qaeda’s success was that they were the first terrorist organization to provide financial and military support to their host ...The Studies in Conflict & Terrorism journal, available on the electronic EBSCO research database, is an amazing source of research material for this

  17. Historical and Geographical Features of Terrorist Activity in the World

    Directory of Open Access Journals (Sweden)

    Suprunchuk I.P.

    2015-10-01

    Full Text Available The article deals with the problem of terrorism as a global security. In a study of terrorism the historical and geographical approach is applied. By the beginning of the 21st century, terrorism has become a global threat to security for all countries, leading to mass casualties, economic damage and political instability. Analysis of the global historical and geographical patterns is one of the most important aspects of the study of the contemporary phenomenon of terrorism. It allows you to better understand the mechanisms of terrorist activities and identify its spatial changes over the long run. The article deals with the historical and geographical features of terrorism in the world and contains the data on the first manifestations of terrorism in various regions of the world. The first premise of terrorism was the emergence of the state, on the one hand, and the presence of a politically active population, on the other hand. The author presents the main factors of such manifestations and the basic historical stages of development of terrorism, since the 18th century. On the basis of the selected stages, the territorial changes of terrorist activities in the world are investigated. Also, the basic directions of terrorist activities, such as a separatist, radical religious, “left” radical and others are described. In compliance with the proposed stages of terrorist activity, the ratio of these directions at different times and in different regions of the world is analyzed.

  18. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    property as a result of popular movements in the course of the Islamic (continued...) Amendment. However, the application of state tort law has...Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held

  19. The role of religious fundamentalism in terrorist violence: a social psychological analysis.

    Science.gov (United States)

    Rogers, M Brooke; Loewenthal, Kate M; Lewis, Christopher Alan; Amlôt, Richard; Cinnirella, Marco; Ansari, Humayan

    2007-06-01

    This paper examines the social-psychological factors often implicated in discussions of terrorist violence/martyrdom, with a particular focus on the role of religion. We offer a brief description of the psychological theories underpinning terrorist research before focusing on social-psychological factors. The roles of psychopathology, irrationality and grievance/threat are examined, followed by empirical research on the beliefs which have been associated with the perpetration and support of terrorist violence, and the social factors which foster those beliefs, including social identity, socially carried interpretations, group leadership and individual differences. Although religion is not a single, simple causal factor in terrorist violence, religious elements often feature strongly in the belief systems associated with terrorist violence, and can also feature in other important fostering factors for terrorist violence, such as the use of rhetoric. Finally, the status of lay explanations of terrorist violence, focusing on the role of religious fundamentalism is examined.

  20. Preferences for Physically Disabled Counselors in Hypothetical Counseling Situations

    Science.gov (United States)

    Mitchell, David C.; Frederickson, William A.

    1975-01-01

    The preferences of 320 undergraduate students for one of three disabled counselors or for a nondisabled counselor on each of Brabham and Thoreson's 20 hypothetical counseling situations were obtained. Significant counselor preferences existed for 18 of the 20 situations, and when categorized by sex, significant counselor preferences existed for 4…

  1. Genome-wide screens for expressed hypothetical proteins

    DEFF Research Database (Denmark)

    Madsen, Claus Desler; Durhuus, Jon Ambæk; Rasmussen, Lene Juel

    2012-01-01

    A hypothetical protein (HP) is defined as a protein that is predicted to be expressed from an open reading frame, but for which there is no experimental evidence of translation. HPs constitute a substantial fraction of proteomes of human as well as of other organisms. With the general belief...

  2. The Chandrasekhar's Equation for Two-Dimensional Hypothetical White Dwarfs

    CERN Document Server

    De, Sanchari

    2014-01-01

    In this article we have extended the original work of Chandrasekhar on the structure of white dwarfs to the two-dimensional case. Although such two-dimensional stellar objects are hypothetical in nature, we strongly believe that the work presented in this article may be prescribed as Master of Science level class problem for the students in physics.

  3. Scaffolding for Argumentation in Hypothetical and Theoretical Biology Concepts

    Science.gov (United States)

    Weng, Wan-Yun; Lin, Yu-Ren; She, Hsiao-Ching

    2017-01-01

    The present study investigated the effects of online argumentation scaffolding on students' argumentation involving hypothetical and theoretical biological concepts. Two types of scaffolding were developed in order to improve student argumentation: continuous scaffolding and withdraw scaffolding. A quasi-experimental design was used with four…

  4. Hypothetical Markets: Educational Application of Ronald Dworkin's "Sovereign Virtue"

    Science.gov (United States)

    Gough, Stephen

    2006-01-01

    The purpose of this paper is to consider, in principle and at the most general level, a particular possible approach to educational policy-making. This approach involves an education-specific application of the notion of hypothetical markets first developed in Ronald Dworkin's book "Sovereign Virtue: The theory and practice of equality" (2000).…

  5. A Hypothetical Learning Trajectory for Conceptualizing Matrices as Linear Transformations

    Science.gov (United States)

    Andrews-Larson, Christine; Wawro, Megan; Zandieh, Michelle

    2017-01-01

    In this paper, we present a hypothetical learning trajectory (HLT) aimed at supporting students in developing flexible ways of reasoning about matrices as linear transformations in the context of introductory linear algebra. In our HLT, we highlight the integral role of the instructor in this development. Our HLT is based on the "Italicizing…

  6. Substance Abuse Counselors and Moral Reasoning: Hypothetical and Authentic Dilemmas

    Science.gov (United States)

    Sias, Shari M.

    2009-01-01

    This exploratory study examined the assumption that the level of moral reasoning (Defining Issues Test; J. R. Rest, 1986) used in solving hypothetical and authentic dilemmas is similar for substance abuse counselors (N = 188). The statistical analyses used were paired-sample t tests, Pearson product-moment correlation, and simultaneous multiple…

  7. Forensic dentistry in a terrorist world.

    Science.gov (United States)

    Glass, R Thomas

    2005-04-01

    While body identification by dental means has not changed substantially since 9/11, or even since the bombing of the Murrah Federal Building in Oklahoma City in 1995, the conditions and potential risks of a bioterrorism action to the dental personnel is new. The purpose of this article is to review general forensic dentistry disaster responses and to address the impact a bioterrorism action might have on primary, secondary and tertiary dental responders. It will also examine the triage role that dental offices might play in the event of such a disaster.

  8. ERPs reveal sensitivity to hypothetical contexts in spoken discourse.

    Science.gov (United States)

    Dwivedi, Veena D; Drury, John E; Molnar, Monika; Phillips, Natalie A; Baum, Shari; Steinhauer, Karsten

    2010-08-04

    We used event-related potentials to examine the interaction between two dimensions of discourse comprehension: (i) referential dependencies across sentences (e.g. between the pronoun 'it' and its antecedent 'a novel' in: 'John is reading a novel. It ends quite abruptly'), and (ii) the distinction between reference to events/situations and entities/individuals in the real/actual world versus in hypothetical possible worlds. Cross-sentential referential dependencies are disrupted when the antecedent for a pronoun is embedded in a sentence introducing hypothetical entities (e.g. 'John is considering writing a novel. It ends quite abruptly'). An earlier event-related potential reading study showed such disruptions yielded a P600-like frontal positivity. Here we replicate this effect using auditorily presented sentences and discuss the implications for our understanding of discourse-level language processing.

  9. ATOME : a blackboard architecture with temporal and hypothetical reasoning

    OpenAIRE

    Laasri, Hassan; Maitre, Brigitte; Mondot, Thierry; Charpillet, François; Haton, Jean-Paul

    1988-01-01

    To cope with high level AI-based applications as signal understanding, process control or decision making, an AI system must take into account various knowledge sources and reasoning schemes. In this paper, we propose a blackboard-based architecture which achieves opportunism and efficiency while controlling multiple knowledge sources. In addition it integrates temporal and hypothetical reasoning to deal with applications evolving in time, and manipulating noisy or errorfull information.

  10. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    Energy Technology Data Exchange (ETDEWEB)

    Redus, Kenneth, S.

    2003-02-26

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R&D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex.

  11. Estimating the historical and future probabilities of large terrorist events

    CERN Document Server

    Clauset, Aaron

    2012-01-01

    Quantities with right-skewed distributions are ubiquitous in complex social systems, including political conflict, economics and social networks, and these systems sometimes produce extremely large events. For instance, the 9/11 terrorist events produced nearly 3000 fatalities, nearly six times more than the next largest event. But, was this enormous loss of life statistically unlikely given modern terrorism's historical record? Accurately estimating the probability of such an event is complicated by the large fluctuations in the empirical distribution's upper tail. We present a generic statistical algorithm for making such estimates, which combines semi-parametric models of tail behavior and a non-parametric bootstrap. Applied to a global database of terrorist events, we estimate the worldwide historical probability of observing at least one 9/11-sized or larger event since 1968 to be 11-35%. These results are robust to conditioning on global variations in economic development, domestic versus international ...

  12. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  13. [Blasting damage in manmade disasters and terrorist attacks].

    Science.gov (United States)

    Shapovalov, V M; Samokhvalov, I M

    2012-01-01

    In the present case of explosive injuries in peacetime, when suddenly there are usually accidental or intentional explosions methane in mines, tanks with gas or explosives, fuel tanks or gas content, gas tanks, gas pipelines, product pipelines, as well as the explosion of military ordnance--grenades, mines, fuses, shells, and accidentally found child or maliciously used by terrorists. Collected statistical data on manmade disasters in coal mines and explosive injuries in terrorist attacks, the physical parameters of which were able to identify only approximately and type of damage incurred,mostly multiple and combinative combined and presented significant challenges in health care. The reasons and circumstances of the explosion in peacetime, gave a detailed description of the damaging factors, mechanisms, and characteristics arise from injuries suffered in the blast injuries. We describe the pathogenesis of blast injury, basic and clinical manifestations of lesions in the explosions.

  14. Processing counterfactual and hypothetical conditionals: an fMRI investigation.

    Science.gov (United States)

    Kulakova, Eugenia; Aichhorn, Markus; Schurz, Matthias; Kronbichler, Martin; Perner, Josef

    2013-05-15

    Counterfactual thinking is ubiquitous in everyday life and an important aspect of cognition and emotion. Although counterfactual thought has been argued to differ from processing factual or hypothetical information, imaging data which elucidate these differences on a neural level are still scarce. We investigated the neural correlates of processing counterfactual sentences under visual and aural presentation. We compared conditionals in subjunctive mood which explicitly contradicted previously presented facts (i.e. counterfactuals) to conditionals framed in indicative mood which did not contradict factual world knowledge and thus conveyed a hypothetical supposition. Our results show activation in right occipital cortex (cuneus) and right basal ganglia (caudate nucleus) during counterfactual sentence processing. Importantly the occipital activation is not only present under visual presentation but also with purely auditory stimulus presentation, precluding a visual processing artifact. Thus our results can be interpreted as reflecting the fact that counterfactual conditionals pragmatically imply the relevance of keeping in mind both factual and supposed information whereas the hypothetical conditionals imply that real world information is irrelevant for processing the conditional and can be omitted. The need to sustain representations of factual and suppositional events during counterfactual sentence processing requires increased mental imagery and integration efforts. Our findings are compatible with predictions based on mental model theory. Copyright © 2013 Elsevier Inc. All rights reserved.

  15. On hypothetical bias and calibration in cost-benefit studies.

    Science.gov (United States)

    Liljas, B; Blumenschein, K

    2000-05-01

    Despite a sound foundation in economic welfare theory, willingness to pay (WTP) has not been used as a measure of benefits in economic evaluations of health and health care to the same extent as in other fields. Some have suggested that this is due to non-economists' reluctance to placing dollar values on the benefits of health care. However, another potential reason could be uncertainties about the validity of the WTP measure. In this paper, we outline the bias problems with the WTP method, and specifically focus on hypothetical bias; i.e. whether the WTP from hypothetical elicitation methods overstates the real WTP or not. This is done by examining the literature in this field, with emphasis on economic experiments where there is a greater possibility for comparison. The findings are that hypothetical WTP in general significantly overestimates real WTP, but that calibration methods to reduce or eliminate this difference are currently being developed. We conclude that while the area is still very much under development, there seem to be reasons to view the use of cost-benefit analysis as a reasonable alternative to the more common cost-effectiveness analysis.

  16. Hypothetical contractarianism and the disclosure requirement problem in informed consent.

    Science.gov (United States)

    Cust, Kenneth F T

    1991-01-01

    Two of the more deeply problematic issues surrounding the doctrine of informed consent are providing a justification for the practice of informed consent and providing an account of the nature and amount of information that must be disclosed in order for informed consent to take place. This paper is concerned with the latter problem, the problem of disclosure requirements, but it deals with this problem in a novel way; it approaches the problem by asking what fully informed and fully rational agents would agree to under certain hypothetical conditions. In general terms I juxtapose the hypothetical contractarianism found in Rawls' A Theory of Justice with that found in Gauthier's Morals By Agreement and ask what their respective hypothetical contractors would agree to with respect to choosing a particular standard of disclosure to govern the practice of informed consent. In more specific terms a contrast is made between what a Rawlsian agent behind a veil of ignorance would choose as compared to what, in Gauthier's terms, an ideal actor making an Archimedean choice would choose. The idea of an Archimedean point, and the subsequent choice made from that point, although technically identified by Rawls, originated with Archimedes of Syracuse.

  17. Structural and Functional Annotation of Hypothetical Proteins of O139

    Directory of Open Access Journals (Sweden)

    Md. Saiful Islam

    2015-06-01

    Full Text Available In developing countries threat of cholera is a significant health concern whenever water purification and sewage disposal systems are inadequate. Vibrio cholerae is one of the responsible bacteria involved in cholera disease. The complete genome sequence of V. cholerae deciphers the presence of various genes and hypothetical proteins whose function are not yet understood. Hence analyzing and annotating the structure and function of hypothetical proteins is important for understanding the V. cholerae. V. cholerae O139 is the most common and pathogenic bacterial strain among various V. cholerae strains. In this study sequence of six hypothetical proteins of V. cholerae O139 has been annotated from NCBI. Various computational tools and databases have been used to determine domain family, protein-protein interaction, solubility of protein, ligand binding sites etc. The three dimensional structure of two proteins were modeled and their ligand binding sites were identified. We have found domains and families of only one protein. The analysis revealed that these proteins might have antibiotic resistance activity, DNA breaking-rejoining activity, integrase enzyme activity, restriction endonuclease, etc. Structural prediction of these proteins and detection of binding sites from this study would indicate a potential target aiding docking studies for therapeutic designing against cholera.

  18. Precipitating the Decline of Terrorist Groups: A Systems Analysis

    Science.gov (United States)

    1994-03-24

    Act on April 30, 1971, signifming the end of the FLQ crisis ."’ 3. Post Critica Error Phase The police lid not want to break up the Viger cell because...36 . The FLQ’s Pre Critical Error Phase . .................... 37 2. The Critical Error Phase: The October Crisis ............... 45 3...organizational crisis ."" These radical innovations are a response by the terrorists to relieve the anxiety Ř|Edgar H. Schein, The Mechanisms of Channe in

  19. Probabilistic Ontology Architecture for a Terrorist Identification Decision Support System

    Science.gov (United States)

    2014-06-01

    participate in multiple organizations (some of which may be associated with terrorism) or have multiple friends and relatives (some of whom may...which captures multiple attributes for each individual. Ontological engineering is performed on this KB to create the Terrorist Identification...certainty of the conclusion (an amputee is Human). isA isComposedOf Probabilistic Ontology Defined A probabilistic ontology is an explicit, formal

  20. Terrorist Precursor Crimes: Issues and Options for Congress

    Science.gov (United States)

    2007-05-24

    alleged Al Qaeda operatives offered the first firm indication of a link between the terrorist network and drug trafficking”- Liz Sly, “Opium Cash Fuels... Jensen were convicted for their role in a $25 million dollar weapons-for-drugs deal to provide material support for Autodefensas Unidos de Colombia...organization. Ruiz received a life sentence for his role in the drugs for weapons plot, Puerta and Jensen received 15 and 14 years respectively.40

  1. Evolution of Terrorist Network using Clustered approach: A Case study

    DEFF Research Database (Denmark)

    2011-01-01

    In the paper we present a cluster based approach for terrorist network evolution. We have applied hierarchical agglomerative clustering approach to 9/11 case study. We show that, how individual actors who are initially isolated from each other are converted in small clusters and result in a fully...... evolved network. This method of network evolution can help intelligence security analysts to understand the structure of the network....

  2. Closing the Gap: Measuring the Social Identity of Terrorists

    Science.gov (United States)

    2008-09-01

    Introduction a la Psychologie Sociale Vol. 1. Paris: Larousse. 6 David W. Brannan, Philip F. Esler, & N.T. Anders Strindberg, “Talking to...St. Andrews, Scotland: Taylor & Francis, January 2001), Vol. 24, No. 1, 9. 6 • Cognitive component – The individual’s knowledge that he or she is a... Cognitive component – An individual is or becomes radicalized and supports the terrorist organization. This is an awareness of being a member of

  3. Illicit Networks: Targeting the Nexus Between Terrorists, Proliferators, and Narcotraffickers

    Science.gov (United States)

    2010-12-01

    bombings in Jakarta on the Ritz Carlton and Marriott hotels in July 2009. JI has engaged in a wide spectrum of criminal activity across Southeast...ambiguous. In recent years, JI’s most visible terrorist activities—the simultaneous bombings on the Ritz Carlton and Marriott hotels in Jakarta in...JI members comprised the core of his following. Implicated in the Marriott Hotel bombing in Jakarta in August 2003, the Australian Embassy bombing

  4. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  5. Roots and Causes That Created the PKK Terrorist Organization

    Science.gov (United States)

    2013-09-01

    can meet even with [Abdullah] Öcalan.”2 But what kinds of political, military and social policies are likely to be necessary to allow this...but also by the European Union and the United States. Yet despite the prolonged history and scale of its violence, the PKK is still an enigma . The...terrorism. Once more, one can understand that unsolved democratic, social and economic problems in Turkey will create new terrorist organizations or

  6. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    for abusing Central American immigrants traveling through Mexico to get to the U.S. Frequently, they forcefully recruit the migrants to carry drugs...violence between rival drug cartels, street gangs, and the government within Mexico has created concern in both Mexico and the United States. The...literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist insurgency in Mexico

  7. Terrorist Networks, Money Laundering Schemes, and Nation Stability

    Science.gov (United States)

    2010-06-01

    2000). He states that people continually “generate and test hypotheses about their worlds.” This innate trait is suggested to be a mechanism that...acts/attacks; pop.: 10,180,000)  From Relative Stability to Instability  Cote d’Ivoire (31; pop.: 18,900,000)  Chad (40; pop.: 10,330,000...state, and subsequent human network system as a whole. Previous points being made, and in light of their functional character traits of terrorist

  8. Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

    Science.gov (United States)

    2007-01-01

    sniper rifles and their accessories and advanced ammunition. For those weapons, only awareness and the precautions taken by security forces can...Qa’idat AI-Jihad fi Bilad al-Rafidayn Revolutionary Armed Forces of Colombia (FARC) al-Fatah Moro Islamic Liberation Front (MILF) Liberation Tigers of...a small terrorist cell that had to raise operational funds on its own. 14 For additional discussion of counterstrategies, see Jackson, Chalk, et al

  9. Radiological Dispersal Device Primer: From A Terrorists Perspective

    Science.gov (United States)

    2008-02-15

    This section will review a real life accident that occurred in Goiania , Brazil to help illustrate the damage that could potentially occur if a RDD...occur in Goiania , Brazil in 1987 that highlights the potential effects of radiation contamination. Two scrap metal scavengers broke into an abandoned...terrorist attack, the Goiania incident provides a concrete example of the potential lethality and psychological/economic destruction of a RDD and provides

  10. Criminal Control and Evaluation of Extreme Nationalist Terrorist Crime

    Institute of Scientific and Technical Information of China (English)

    Ran Hui

    2017-01-01

    After entering the 21st century, ter ̄rorist crimes have become more serious. Terrorism has become one of the worst problems of the mod ̄ern world and will continue to be a serious problem in the future. China is also facing the challenge of terrorist crime. Can the present criminal system accomplish the mission of legislative control of these crimes and fulfill the goal of penalising them? It seems that a review and evaluation of the rele ̄vant criminal legislation and policies is necessary. There are different definitions of terrorist crimes. American scholars Alex P. Schmid and Albert J. Jongman gave a review of 109 different definitions that appeared during the period from 1936 to 1983 , and proposed their own opinions in the book Political Terrorism. Chinese scholar Hu Lianhe analyzed 50 definitions that appeared after 1982, and proposed his own idea. On January 1 2016 , the third article of the Zhonghua renmin gongheguo fan kongbu zhuyi fa ( Anti -terrorism Law of the P. R. C) formally defines “terrorism”and “terrorist activities”. Generally speaking, both the academic and legal definitions have gener ̄alized three characteristics of “terrorist crime”from subjective and objective aspects: 1 ) taking social order, public security, personnel and prop ̄erty as the target of the ( terrorist ) behavior; 2 ) hurting the targets described above or threatening the state organs or international organizations by way of violence, destruction or intimidation; 3 ) taking the realization of some certain political or i ̄deological purpose and claims as the ultimate goal of the ( terrorist) behavior. Concerning the relation between extreme na ̄tionalism and terrorism, the general idea is that“there is no pure form of nationalism; it is always combined with some certain political or social pow ̄er, and characterized with social movement or his ̄torical process”. And seeing from the development course of terrorism,“nationalism is one of the most

  11. Jihadist Terrorist Use of Strategic Communication Management Techniques

    Science.gov (United States)

    2008-12-01

    media and the Internet to compensate for asymmetrical disadvantages has enabled them to keep generating new generations of jihadist terrorists. This...inter- personal media such as mobile phones, iPods , WiFi, etc. and the World Wide Web. The fusion of interpersonal communication and mass...public relations campaign. Their skillful use of the mass media and the Internet to compensate for symmetrical disadvantages has enabled them to

  12. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  13. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  14. We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles

    Science.gov (United States)

    1994-03-24

    of the requirements for the degree of MASTER OF ARTS IN NATIONAL SECURITY AFFAIRS from the NAVAL POSTGRADUATE SCHOOL March 1994 Author...Revolutionary Cell and Palestinian PFLP operation that was led by the international terrorist "Carlos." Urbano . 26 terrorist network. but does imply some...violence. In order to retain the media’s and the public’s attention, a terrorist group continually must raise "Interview with Urbano ," in Urban

  15. The Current Legal Framework of the Use of Force against Terrorist Organizations

    OpenAIRE

    Petra PERISIC

    2013-01-01

    Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are ...

  16. A Glance at Terrorist Organizations from the Perspective of Organizational Theories

    OpenAIRE

    Yılmaz, Sefer

    2013-01-01

    The problem of conceptualizing terrorist organization is still a controversial issue, even though it has been taken place in the literature heavily. In this essay, terrorist organizations will be approached in the context of organizational theories. Terrorist organizations will be introduced as exceptional structures besides being consistent with most of the organizational theories, departing from them in terms of strategies they adapt and life expectancy they experience. According to some th...

  17. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    terrorists have clearly exhibited psychopathy (see Glossary). For example, in April 1986 Nezar Hindawi, a freelance Syrian-funded Jordanian terrorist and...exhibit signs of psychopathy or other mental illness are deselected in the interest of group survival. Terrorist groups need members whose behavior...appears to be normal and who would not arouse suspicion. A member who exhibits traits of psychopathy or any noticeable degree of mental illness would

  18. Demand Curves for Hypothetical Cocaine in Cocaine-Dependent Individuals

    Science.gov (United States)

    Bruner, Natalie R.; Johnson, Matthew W.

    2013-01-01

    Rationale Drug purchasing tasks have been successfully used to examine demand for hypothetical consumption of abused drugs including heroin, nicotine, and alcohol. In these tasks drug users make hypothetical choices whether to buy drugs, and if so, at what quantity, at various potential prices. These tasks allow for behavioral economic assessment of that drug's intensity of demand (preferred level of consumption at extremely low prices) and demand elasticity (sensitivity of consumption to price), among other metrics. However, a purchasing task for cocaine in cocaine-dependent individuals has not been investigated. Objectives This study examined a novel Cocaine Purchasing Task and the relation between resulting demand metrics and self-reported cocaine use data. Methods Participants completed a questionnaire assessing hypothetical purchases of cocaine units at prices ranging from $0.01 to $1,000. Demand curves were generated from responses on the Cocaine Purchasing Task. Correlations compared metrics from the demand curve to measures of real-world cocaine use. Results Group and individual data were well modeled by a demand curve function. The validity of the Cocaine Purchasing Task was supported by a significant correlation between the demand curve metrics of demand intensity and Omax (determined from Cocaine Purchasing Task data) and self-reported measures of cocaine use. Partial correlations revealed that after controlling for demand intensity, demand elasticity and the related measure, Pmax, were significantly correlated with real-world cocaine use. Conclusions Results indicate that the Cocaine Purchasing Task produces orderly demand curve data, and that these data relate to real-world measures of cocaine use. PMID:24217899

  19. Demand curves for hypothetical cocaine in cocaine-dependent individuals.

    Science.gov (United States)

    Bruner, Natalie R; Johnson, Matthew W

    2014-03-01

    Drug purchasing tasks have been successfully used to examine demand for hypothetical consumption of abused drugs including heroin, nicotine, and alcohol. In these tasks, drug users make hypothetical choices whether to buy drugs, and if so, at what quantity, at various potential prices. These tasks allow for behavioral economic assessment of that drug's intensity of demand (preferred level of consumption at extremely low prices) and demand elasticity (sensitivity of consumption to price), among other metrics. However, a purchasing task for cocaine in cocaine-dependent individuals has not been investigated. This study examined a novel Cocaine Purchasing Task and the relation between resulting demand metrics and self-reported cocaine use data. Participants completed a questionnaire assessing hypothetical purchases of cocaine units at prices ranging from $0.01 to $1,000. Demand curves were generated from responses on the Cocaine Purchasing Task. Correlations compared metrics from the demand curve to measures of real-world cocaine use. Group and individual data were well modeled by a demand curve function. The validity of the Cocaine Purchasing Task was supported by a significant correlation between the demand curve metrics of demand intensity and O max (determined from Cocaine Purchasing Task data) and self-reported measures of cocaine use. Partial correlations revealed that after controlling for demand intensity, demand elasticity and the related measure, P max, were significantly correlated with real-world cocaine use. Results indicate that the Cocaine Purchasing Task produces orderly demand curve data, and that these data relate to real-world measures of cocaine use.

  20. Change and Continuity in Indonesian Islamist Ideology and Terrorist Strategies

    Directory of Open Access Journals (Sweden)

    Adam James Fenton

    2015-04-01

    Full Text Available The “Islamisation” of Indonesia has exerted a transformative force on every aspect of Indonesian society. That process continues today. It has created streams of change and continuity in thoughts, ideologies and practices, of enormous complexity. Strict doctrinal interpretation of Koranic text is not a new phenomenon, contrary to what some reports in the mass media might suggest. Its roots stretch back at least as far as the 1800s with the outbreak of violent conflicts between those urging a stricter, scripturalist application of Islam, and those adhering to traditionalist and colonialist ideologies --culminating in the Padri war of West Sumatra of 1821-38. Indicating an ostensible continuity of ideology, modern extremist ideologues, such as Abu Bakar Bashir, urge their followers toward violent conflict and terrorist actions based on an ideology of strict “Middle Eastern” interpretation of fundamental Islamic tenets. This paper argues that the strategies of those carrying out radical and violent ideologies are undergoing change, as are the strategies of the authorities tasked with combating them. Radical groups have displayed a shift away from large-scale, attacks on symbolic foreign targets towards low-level violence primarily aimed at law enforcement authorities. Authorities, on the other hand, have shown a greater tendency to shoot dead those suspected of involvement with violent radical groups. This paper will examine the changing strategies of violent radical groups and the continuity, and evolution, of the underlying Islamic ideology that provides religious justification for their violent acts. The paper will argue that engaging Indonesia’s politically active youth in an ideological dialogue on Islamism and democracy provides the best prospect for disengagement from, and breaking the cycle of recruitment for, radical violence and terrorism.[Proses panjang Islamisasi di Indonesia telah menghasilkan kekuatan transformatif di

  1. Constraints on hypothetical counterexamples to the Casas-Alvero conjecture

    CERN Document Server

    Laterveer, Robert

    2012-01-01

    The Casas-Alvero conjecture states: if a complex univariate polynomial has a common root with each of its derivatives, then it has a unique root. We show that hypothetical counterexamples must have at least 5 different roots. The first case where the conjecture is not known is in degree 12. We study the case of degree 12, and more generally degree p+1, where p is a prime number. While we don't come closing to solving the conjecture in degree 12, we present several further constraints that counterexamples would have to satisfy.

  2. Search for the hypothetical $\\pi$ -> $\\mu$ + x decay

    CERN Document Server

    Bilger, R; Denig, A; Föhl, K; Hautle, P; Kluge, W; Konter, J A; Kurz, G; Mango, S; Schapler, D; Schonleber, F; Siodlaczek, U; Van den Brandt, B; Wagner, G J; Wieser, R

    1995-01-01

    The KARMEN collaboration has reported the possible observation of a hitherto unknown neutral and weakly interacting particle x, which is produced in the decay pi -> mu + x with a mass m(x) = 33.9 MeV. We have searched for this hypothetical decay branch by studying muons from pion decay in flight with the LEPS spectrometer at the piE3 channel at PSI and find branching ratios BR(pi- to mu- anti-x) 2e-8 derived in a recent theoretical paper our result would leave only a narrow region for the existence of x if it is a heavy neutrino.

  3. Consequences of a hypothetical incident for different sectors

    CERN Document Server

    Bertinelli, F; Garion, C; Jimenez, J M; Parma, V; Perin, A; Schmidt, R; Tavian, L; Tock, J P; van Weelderen, R

    2011-01-01

    During the 2009 long shutdown, the LHC machine has been partially consolidated by adding safety relief devices in order to better protect the cryostats against large helium release and consequently to mitigate the risks of collateral damages. After recalling the present relief valve implementation and other mitigations related to the collateral damages, this paper describes the damage process of a hypothetical incident, presents its consequences for the different sectors and for beam energies up to 5 TeV with emphasis on the induced downtime.

  4. Estimating Potential Effects of Hypothetical Oil Spills on Polar Bears

    Science.gov (United States)

    Amstrup, Steven C.; Durner, G.M.; McDonald, T.L.; Johnson, W.R.

    2006-01-01

    Much is known about the transport and fate of oil spilled into the sea and its toxicity to exposed wildlife. Previously, however, there has been no way to quantify the probability that wildlife dispersed over the seascape would be exposed to spilled oil. Polar bears, the apical predator of the arctic, are widely dispersed near the continental shelves of the Arctic Ocean, an area also undergoing considerable hydrocarbon exploration and development. We used 15,308 satellite locations from 194 radiocollared polar bears to estimate the probability that polar bears could be exposed to hypothetical oil spills. We used a true 2 dimensional Gausian kernel density estimator, to estimate the number of bears likely to occur in each 1.00 km2 cell of a grid superimposed over near shore areas surrounding 2 oil production facilities: the existing Northstar oil production facility, and the proposed offshore site for the Liberty production facility. We estimated the standard errors of bear numbers per cell with bootstrapping. Simulated oil spill footprints for September and October, the times during which we hypothesized effects of an oil-spill would be worst, were estimated using real wind and current data collected between 1980 and 1996. We used ARC/Info software to calculate overlap (numbers of bears oiled) between simulated oil-spill footprints and polar bear grid-cell values. Numbers of bears potentially oiled by a hypothetical 5912 barrel spill (the largest spill thought probable from a pipeline breach) ranged from 0 to 27 polar bears for September open water conditions, and from 0 to 74 polar bears in October mixed ice conditions. Median numbers oiled by the 5912 barrel hypothetical spill from the Liberty simulation in September and October were 1 and 3 bears, equivalent values for the Northstar simulation were 3 and 11 bears. In October, 75% of trajectories from the 5912 barrel simulated spill at Liberty oiled 9 or fewer bears while 75% of the trajectories affected 20 or

  5. Effects of hypothetical improvised nuclear detonation on the electrical infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, Christopher L.; Eubank, Stephen; Evrenosoglu, C. Yaman; Marathe, Achla; Marathe, Madhav V.; Phadke, Arun; Thorp, James; Vullikanti, Anil [Virginia Tech, Blacksburg, VA (United States). Network Dynamics and Simulation Science Lab.

    2013-07-01

    We study the impacts of a hypothetical improvised nuclear detonation (IND) on the electrical infrastructure and its cascading effects on other urban inter-dependent infrastructures of a major metropolitan area in the US. We synthesize open source information, expert knowledge, commercial software and Google Earth data to derive a realistic electrical transmission and distribution network spanning the region. A dynamic analysis of the geo-located grid is carried out to determine the cause of malfunction of components, and their short-term and long-term effect on the stability of the grid. Finally a detailed estimate of the cost of damage to the major components of the infrastructure is provided.

  6. Elusive but not hypothetical: axillary meristems in Wollemia nobilis.

    Science.gov (United States)

    Burrows, Geoffrey E

    2012-01-01

    The branches of Wollemia nobilis are unbranched; however, it has been noted that new branches can form from the distal end of damaged ones, and branches can grow from axillary structures once a terminal strobilus has fallen. Tomlinson and Huggett (2011, Annals of Botany 107: 909-916) have recently investigated the formation of these reiterative branches and stated in the title of their paper that 'Partial shoot reiteration in Wollemia nobilis (Araucariaceae) does not arise from "axillary meristems"'. They go on to state 'Further research may reveal the presence of these elusive, but still only hypothetical, axillary meristems'. In this Viewpoint, I argue that Tomlinson and Huggett do not refer to previously published information that indicates that axillary meristems are present in Wollemia nobilis branch leaf axils, and that their anatomical methods were probably not optimal for locating and examining these minute structures. Thus, whilst I would agree that the axillary meristems in branch leaf axils of Wollemia nobilis are elusive, I contend that they are not hypothetical.

  7. On the hypothetical utilization of atmospheric potential energy

    Directory of Open Access Journals (Sweden)

    Thomas Frisius

    2014-09-01

    Full Text Available Atmospheric potential energy is typically divided into an available and a nonavailable part. In this article a hypothetical utilization of a fraction of the nonavailable potential energy is described. This part stems from the water vapor that can be converted into the liquid phase. An energy gain results when the potential energy of the condensate relative to a reference height exceeds the energy necessary to condensate the water vapor. It is shown that this can be the case in a saturated atmosphere without convective available potential energy. Finally, simulations with the numerical cloud model HURMOD are performed to estimate the usability of the device in practice. Indeed, a positive energy output results in a simulation with immediate gathering of the condensate. On the contrary, potential energy gained falls significantly short of the necessary energy for forming the condensate when a realistic cloud microphysical scheme allowing re-evaporation of condensate is applied. Taken together it can be concluded that, a utilization of atmospheric potential energy is hypothetically possible but the practical realization is probably not feasible.

  8. [Science in the crosshairs of enlightenment. Significance of hypothetical thinking].

    Science.gov (United States)

    Wieland, Wolfgang

    2011-01-01

    To further the enlightenment primarily or even only by means of science was the hope of most representatives of the movement of the enlightenment which gave its name to a whole period of European cultural history. Only a few of its representatives, like Montesquieu and Rousseau, doubted for good reasons, whether and how the goals of the enlightenment can be reached at all by the means of science alone. In his Discours préliminaires to the Encyclopédie D'Alembert still wanted to limit science proper to the narrower field of those kinds of research which were strictly based on observations and calculations alone. In this way he remained committed to Descartes' ideal method of receiving authentic knowledge only by deduction from evident axioms or fundamental theorems. Pascal's casual discovery of the calculation of probabilities allowed to apply mathematics on the hidden laws of the apparent casualties of the human life world. Bacon's project of empirical science as a rational and methodological art of conducting experiments could replace the methodological ideal of science more geometrico. Lichtenberg's refined sensibility for the subjunctive linguistic forms of hypothetical thinking indicates a new understanding of inventing and testing hypotheses as the two most important methods of the experimental sciences when compared to the formal sciences of logic and mathematics. Whoever is studying the history of science of modern times in the cross wire of the enlightenment, will realize soon that science has always been in need of being illuminated about its own chances, risks and side effects. The project of enlightenment through science had to be complemented by the project of an enlightenment about science right from its beginning. Because of the implicit risks and side effects the project of enlightenment has to be enlightenment despite of science and because of science. On the one hand, as a special form of human practice the sciences are directed towards

  9. Further tests of entreaties to avoid hypothetical bias in referendum contingent valuation

    Science.gov (United States)

    Thomas C. Brown; Icek Ajzen; Daniel Hrubes

    2003-01-01

    Over-estimation of willingness to pay in contingent markets has been attributed largely to hypothetical bias. One promising approach for avoiding hypothetical bias is to tell respondents enough about such bias that they self-correct for it. A script designed for this purpose by Cummings and Taylor was used in hypothetical referenda that differed in payment amount. In...

  10. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  11. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    2011-01-01

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Co

  12. Terrorist Attacks: Do We Know How to Assess the Results?

    Directory of Open Access Journals (Sweden)

    William J. Manning

    2001-01-01

    Full Text Available On September 11, 2001, terrorists destroyed the World Trade Center (WTC in New York City. Explosions and fires resulted in the complete collapse of the two WTC towers. The collapsing towers served as enormous point sources of gaseous and particulate air pollution, seen as huge plumes of smoke and dust. The smoke contained volatile organic compounds and fine particles and aerosols. The dust fraction contained parts of ceiling tiles, carpets, concrete, adhesives, asbestos, chromium, lead, titanium, and many other elements and materials. Whether there were unusually toxic ingredients in the plumes is largely unknown.

  13. The Clinical Threat Assessment of the Lone-Actor Terrorist.

    Science.gov (United States)

    Meloy, J Reid; Genzman, Jacqueline

    2016-12-01

    The Terrorist Radicalization Assessment Protocol (TRAP-18) is a structured professional judgment instrument for the assessment of individuals who present a concern for lone-actor terrorism. It consists of eight proximal warning behaviors and 10 distal characteristics. Previous research has demonstrated its interrater reliability and some concurrent and postdictive validity. In this article, TRAP-18 is retrospectively applied to the case of US Army psychiatrist and jihadist Malik Nidal Hasan, who committed a mass murder at Fort Hood, Texas in 2009. The strengths and limitations of TRAP-18 as a structured professional judgment instrument for mental health clinicians are discussed, and clinical risk management suggestions are made.

  14. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  15. Generational Changes in Terrorist Movements: The Turkish Case,

    Science.gov (United States)

    1985-07-01

    THE TURKISH CASE * Sabri Sayari * July 1985 DTlC CELECTE AUG 6 1986 LU F Z b -n approved 111 d111d its 44 86 8 5 056 Sabri. Sayar - * ~ % GENERATIONAL...become involved in terrorist groups through family ties, as in the case of Army Captain Orhan Savasci who was Cayan’s brother-in-law. Others, such as...with the TLP, Cayan emerged as one of the central figures of the DEV-GENC. By 1970, Cayan had left b hind his promising student career at the university

  16. Exploring the Structure and Task Dynamics of Terrorist Organizations Using Agent Based Modeling

    Science.gov (United States)

    2008-12-01

    policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release...Terrorist Networks, Agent Based Modeling, 2004 Madrid Attacks, Backcasting , Computational Organization Simulation 16. PRICE CODE 17. SECURITY...be understood in order to apply effective policies and practices to safeguard citizens, assets, and interests. For decades, terrorist cells have

  17. Exploring the Development and Dismantling of Equivalence Classes Involving Terrorist Stimuli

    Science.gov (United States)

    Dixon, Mark R.; Rehfeldt, Ruth Anne; Zlomke, Kimberly R.; Robinson, Ashton

    2006-01-01

    The present paper describes 2 studies that present a conceptual interpretation and experimental findings involving the developing and dismantling of equivalence classes consisting of terrorist stimuli. In the first study, 8 United States citizen participants were trained to match nonterrorist stimuli to American and terrorist images. Afterwards,…

  18. 76 FR 56631 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2011-09-13

    .... (Presidential Sig.) THE WHITE HOUSE, September 9, 2011. [FR Doc. 2011-23609 Filed 9-12-11; 11:15 am] Billing... With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C....

  19. 78 FR 56579 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2013-09-12

    ... the Congress. (Presidential Sig.) THE WHITE HOUSE, September 10, 2013. [FR Doc. 2013-22406 Filed 9-11... Emergency With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... to Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies Act, 50...

  20. 31 CFR 595.408 - Charitable contributions to specially designated terrorists.

    Science.gov (United States)

    2010-07-01

    ... designated terrorists. 595.408 Section 595.408 Money and Finance: Treasury Regulations Relating to Money and... REGULATIONS Interpretations § 595.408 Charitable contributions to specially designated terrorists. (a) Unless... as food, clothing or medicine, may be made to or for the benefit of a specially designated...

  1. 77 FR 56515 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2012-09-12

    ..., 2012. [FR Doc. 2012-22708 Filed 9-11-12; 2:15 pm] Billing code 3295-F2-P ... With Respect to Certain Terrorist Attacks Notice of September 11, 2012--Continuation of the National... the National Emergency With Respect to Certain Terrorist Attacks Consistent with section 202(d) of...

  2. 75 FR 55659 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2010-09-13

    ..., September 10, 2010. [FR Doc. 2010-22988 Filed 9-10-10; 1:30 pm] Billing code 3195-W0-P ... Notice of September 10, 2010--Continuation of the National Emergency With Respect to Certain Terrorist..., 2010 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent...

  3. THE SOCIAL DISCRIMINATION AGAINST FORMER TERRORIST CONVICTS AND THEIR FAMILIES: Psychological Perspectives

    Directory of Open Access Journals (Sweden)

    Siti Nur Asiyah

    2014-06-01

    Full Text Available This study examines the social discrimination against the former terrorist convicts and their families.  It is aimed at knowing about former terrorist convicts’ family patterns of community interaction, the growing social discrimination within the social life of former terrorist’s convicts’ family, the impact of social discrimination against the family of former terrorist convicts, and the coping behavior of former terrorist convicts over that situation. This study uses descriptive qualitative research methods. The study finds that the pattern of interactions between the family of former terrorist convicts and their surrounding communities can be divided into two phases, before and after the arrest. It also maintains that the social discrimination against the family of former terrorist convicts occurs when they are dealing with people outside the village of Tenggulun, in the form of isolation, token and reserve discrimination. The prejudice and social discrimination on the family of former terrorist convicts impact on their self-worth, self-esteem and well being. Coping behavior by former terrorist convicts and their families are two kinds, namely emotion focused coping and problem-focused coping.

  4. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.105 Exemption of Foreign Terrorist Tracking Task...

  5. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  6. The Effect of Terrorist Incidents on the Occupational Attitude of Teachers

    Science.gov (United States)

    Üstün, Ahmet

    2016-01-01

    This study examined how many terrorist incidents affected the teachers' occupational attitude by the variables of gender, marital status, birthplace, the term of employment and occupational status with "the effect of terrorist incidents on the occupational attitude of the teacher" scale. In this study, "descriptive scanning…

  7. Help-Seeking Behaviours of Adolescents in Relation to Terrorist Attacks: The Perceptions of Israeli Parents

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima; Kelman, Talia

    2011-01-01

    Exposure to terrorism poses a challenge for children and adolescents as well as parents. For many years, Israeli citizens have been exposed to ongoing terrorist attacks. The present article is aimed at revealing the reactions of Israeli parents when facing terrorist attacks and their perceptions regarding the help-seeking behaviours of their…

  8. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2009 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent with section 202(d) of the National...

  9. Modeling the Combined Terrorist-Narcotics Trafficker Threat to National Security

    Science.gov (United States)

    2012-05-01

    from Corpus Christi , Texas, approached a U.S. Drug Enforcement Administration (DEA) informant. He was seeking the help of a Mexican drug cartel to...2004 Madrid bombers, with decentralized terrorist cells having in-house criminal capabilities, and the Taliban with coalitions between terrorist groups

  10. METHOD OF FORMING AND ASSESSMENT OF READINESS OF SEAMEN TO COUNTER PIRATES AND TERRORISTS AT SEA

    Directory of Open Access Journals (Sweden)

    Varlamov S. G.

    2016-03-01

    Full Text Available Every year pirates attack hundreds of ships and thousands of sailors. So, by the end of 2014 violent actions of the pirates have undergone more than 5,000 sailors. In 2015, the pirates attacked 246 vessels they had captured 15 ships and 271 of a sailor. While one sailor was killed and 14 wounded. The economic damage from pirates was tens of billions of dollars. For these reasons, the fight against piracy and Maritime terrorism becomes a major concern of the world community. In today's complex for a variety of reasons conditions, convoy of transport ships warships for the passage of areas endangered by pirates is considered the most effective and reliable means of coping with the corsairs of the XXI century, precluding the capture of the ship and its crew. At the same time, the training of personnel to solve specific problems impeding reoperate requires performing the whole complex of preparatory measures, including psychological and physical training of sailors for the upcoming action of a dangerous nature. The article reveals the content of the methodology of forming and evaluating the readiness of military seamen to counter pirates and terrorists at sea represents a set of methods, forms and means of pedagogical influence with the purpose of providing soldiers pedagogical assistance in the development of military-professional activities, standards of behavior and support in preparation for military service in the areas endangered by pirates; the development of military-professional competence; the full realization of personal potential of specialist fleet

  11. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  12. The Influence of Charismatic Authority on Operational Strategies and Attack Outcomes of Terrorist Groups

    Directory of Open Access Journals (Sweden)

    David C. Hofmann

    2016-06-01

    Full Text Available Despite the historical and contemporary prevalence of charismatic terrorist leaders, there has been very little empirical examination of the relationship between charismatic forms of authority and the strategic operation of terrorist groups. In response to this gap in knowledge, this study seeks to investigate if charismatic authority has a real-world impact on strategic choices and attack outcomes of terrorist groups. Using a theoretical framework meant to help measure charisma in terrorist organizations, this study quantitatively examines how differing levels of the presence of charismatic authority contributes to the choice in operational tactics (e.g., weapon and target choices and the results of attack outcomes (e.g., success rates, lethality within a sample of thirty international terrorist groups. In the concluding section, relevant findings, policy recommendations, study limitations, and areas for future research are discussed.

  13. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  14. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims.

  15. Killing Range: Explaining Lethality Variance within a Terrorist Organization.

    Science.gov (United States)

    Asal, Victor; Gill, Paul; Rethemeyer, R Karl; Horgan, John

    2015-04-01

    This paper presents an analysis of the Provisional Irish Republican Army's (PIRA) brigade level behavior during the Northern Ireland Conflict (1970-1998) and identifies the organizational factors that impact a brigade's lethality as measured via terrorist attacks. Key independent variables include levels of technical expertise, cadre age, counter-terrorism policies experienced, brigade size, and IED components and delivery methods. We find that technical expertise within a brigade allows for careful IED usage, which significantly minimizes civilian casualties (a specific strategic goal of PIRA) while increasing the ability to kill more high value targets with IEDs. Lethal counter-terrorism events also significantly affect a brigade's likelihood of killing both civilians and high-value targets but in different ways. Killing PIRA members significantly decreases IED fatalities but also significantly decreases the possibility of zero civilian IED-related deaths in a given year. Killing innocent Catholics in a Brigade's county significantly increases total and civilian IED fatalities. Together the results suggest the necessity to analyze dynamic situational variables that impact terrorist group behavior at the sub-unit level.

  16. SOCIO-PSYCHOLOGICAL, CRIMINOLOGICAL CHARACTERISTICS OF THE PERSONALITY OF EXTREMIST, TERRORIST, ENGAGED IN PROPAGANDA AMONG THE YOUTH

    Directory of Open Access Journals (Sweden)

    V. M. KHARZINOVA

    2016-01-01

    Full Text Available The article reveals: socio-psychological criminological characteristics of personality advocate extremism and terrorism. The focus of the author focuses on specific moral, psychological, spiritual and moral values of the extremist, terrorist propagandizing extremism and terrorism. The purpose of writing this article is to review the socio-psychological, criminological characteristics of persons advocating extremism and terrorism. Criminologists point out that the identity of the perpetrator is characterized by the following data: socio-biological, demographic, criminal law, moral-psychological sphere of life and social relationships. Analysis of the sociobiological data allows you to note that the most active promoters of the involvement of young people in extremist and terrorist activities are males. Extremists propagandists are people who are characterized by the special moral and psychological qualities: 1 a fanatical adherence to an ideology promoted; 2 Group fanaticism and narcissism; 3 the group nature of the action; 4 radicalism, which is expressed in the form of violence and intimidation. [3] Unlike other extremism and terrorism are criminal acts carried out in order to implement some ideas. In this regard, it must be assumed that the moral-psychological features of extremists and terrorists based on the ideology of extremism and terrorism, which are reflected in its specificity, emotional and mental health, ways of perception and attitude towards the outside world, on the interaction between its inner and outer world. Involving youth in terrorist and extremist activities, they realize that they are on offense and even to death, but they do not stop, because they are fans of radical Islam. Representatives of nontraditional radical trend of Islam is peculiar to the religious fanaticism that borders on physical and spiritual violence.

  17. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  18. A Theory on the Ventilation over Hypothetical Urban Areas

    Science.gov (United States)

    Liu, Chun-Ho; Ng, Chi-To; Wong, Colman C. C.

    2013-04-01

    Urban roughness is one of the major factors affecting the flows and turbulence structures in the bottom of the atmospheric boundary layer (ABL). Whereas, our understanding of their relation is limited. In this paper, we attempt to examine the interaction among aerodynamic resistance (friction factor f), ventilation (air exchange rate ACH), and pollutant removal (pollutant removal rate PCH). Using the method of characteristic, analytical solution shows that the turbulent ventilation of a hypothetical urban area is directly proportional to the square root of friction factor (ACH? f1-2) regardless of the building geometry. Next, a series of computational fluid dynamics (CFD) sensitivity tests are performed to verify the theory. In addition to the commonly employed rectangular building models, seven types of urban roughness elements, in the form of idealized building models, are tested. As a pilot study, the building models are of the same height so a roof level is easily defined across the entire hypothetical urban areas. Two configurations of passive scalar sources, ground-level-only (vehicular emission) and all-solid-boundary (heat dissipation), are employed to contrast their transport behaviors. To look into the mechanism of ventilation and pollutant removal, the ACH and PCH are partitioned into their respective mean and turbulent components. The CFD results show that both the ventilation and pollutant removal are mainly attributed to their turbulent components (over 60%). Moreover, the ACH″ and f1-2 calculation from the CFD results agree very well with the analytical solution (correlation coefficient over 0.9). However, the pollutant and heat exhibit different removal behaviors so simple estimates using friction factor have not yet arrived. Because of the substantial aged air removal by ACH″ and its linear relation with f1-2, it is proposed to use friction factor, which can be determined by wind tunnel experiments or mathematical modeling, as a

  19. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  20. Disability and marginal utility of income: evidence from hypothetical choices.

    Science.gov (United States)

    Tengstam, Sven

    2014-03-01

    It is often assumed that disability reduces the marginal utility of income. In this article, individuals' marginal utility of income in two states-(i) paralyzed in both legs from birth and (ii) not mobility impaired at all-is measured through hypothetical choices between imagined lotteries behind a so-called veil of ignorance. The outcomes of the lotteries include both income and disability status. It is found that most people have higher marginal utility when paralyzed than when not mobility impaired at all. The two marginal utilities are evaluated at the same levels of income. Having personal experience of mobility impairment and supporting the Left Party, the Social Democratic Party, the Green Party, or the Liberal Party are associated with having a higher marginal utility when paralyzed. The results suggest that more than full insurance of income losses connected to being disabled is optimal. The results further suggest that, given a utilitarian social welfare function, resources should be transferred to rather than from disabled people. Finally, if the transfers are not large enough to smooth out the marginal utilities of the disabled and the nondisabled, distributional weights based on disability status should be used in cost-benefit analysis.

  1. Comprehensive computerized medical imaging: interim hypothetical economic evaluation

    Science.gov (United States)

    Warburton, Rebecca N.; Fisher, Paul D.; Nosil, Josip

    1990-08-01

    The 422-bed Victoria General Hospital (VGH) and Siemens Electric Limited have since 1983 been piloting the implementation of comprehensive computerized medical imaging, including digital acquisition of diagnostic images, in British Columbia. Although full PACS is not yet in place at VGH, experience to date habeen used to project annual cost figures (including capital replacement) for a fully-computerized department. The resulting economic evaluation has been labelled hypothetical to emphasize that some key cost components were estimated rather than observed; this paper presents updated cost figures based on recent revisions to proposed departmental equipment configuration which raised the cost of conventional imaging equipment by 0.3 million* and lowered the cost of computerized imaging equipment by 0.8 million. Compared with conventional diagnostic imaging, computerized imaging appears to raise overall annual costs at VGH by nearly 0.7 million, or 11.6%; this is more favourable than the previous results, which indicated extra annual costs of 1 million (16.9%). Sensitivity analysis still indicates that all reasonable changes in the underlying assumptions result in higher costs for computerized imaging than for conventional imaging. Computerized imaging offers lower radiation exposure to patients, shorter waiting times, and other potential advantages, but as yet the price of obtaining these benefits remains substantial.

  2. Large-scale screening of hypothetical metal-organic frameworks

    Science.gov (United States)

    Wilmer, Christopher E.; Leaf, Michael; Lee, Chang Yeon; Farha, Omar K.; Hauser, Brad G.; Hupp, Joseph T.; Snurr, Randall Q.

    2012-02-01

    Metal-organic frameworks (MOFs) are porous materials constructed from modular molecular building blocks, typically metal clusters and organic linkers. These can, in principle, be assembled to form an almost unlimited number of MOFs, yet materials reported to date represent only a tiny fraction of the possible combinations. Here, we demonstrate a computational approach to generate all conceivable MOFs from a given chemical library of building blocks (based on the structures of known MOFs) and rapidly screen them to find the best candidates for a specific application. From a library of 102 building blocks we generated 137,953 hypothetical MOFs and for each one calculated the pore-size distribution, surface area and methane-storage capacity. We identified over 300 MOFs with a predicted methane-storage capacity better than that of any known material, and this approach also revealed structure-property relationships. Methyl-functionalized MOFs were frequently top performers, so we selected one such promising MOF and experimentally confirmed its predicted capacity.

  3. Large-scale screening of hypothetical metal-organic frameworks.

    Science.gov (United States)

    Wilmer, Christopher E; Leaf, Michael; Lee, Chang Yeon; Farha, Omar K; Hauser, Brad G; Hupp, Joseph T; Snurr, Randall Q

    2011-11-06

    Metal-organic frameworks (MOFs) are porous materials constructed from modular molecular building blocks, typically metal clusters and organic linkers. These can, in principle, be assembled to form an almost unlimited number of MOFs, yet materials reported to date represent only a tiny fraction of the possible combinations. Here, we demonstrate a computational approach to generate all conceivable MOFs from a given chemical library of building blocks (based on the structures of known MOFs) and rapidly screen them to find the best candidates for a specific application. From a library of 102 building blocks we generated 137,953 hypothetical MOFs and for each one calculated the pore-size distribution, surface area and methane-storage capacity. We identified over 300 MOFs with a predicted methane-storage capacity better than that of any known material, and this approach also revealed structure-property relationships. Methyl-functionalized MOFs were frequently top performers, so we selected one such promising MOF and experimentally confirmed its predicted capacity.

  4. Fandoriana - 3 : terrorist-gossudarstvennik protiv terrorista-revoljutsionera / Boris Tuch

    Index Scriptorium Estoniae

    Tuch, Boris, 1946-

    2005-01-01

    Mängufilm "Riiginõunik" Boriss Akunini romaani järgi : režissöör Filipp Jankovski. Fandorini osas Oleg Menshikov, terrorist Grin - Konstantin Habenski, krahv Pozharski - Nikita Mihhalkov : Venemaa 2005

  5. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    ... engaging in the trafficking of women, and groups committing financial crimes against U.S. interests. The terrorist organizations examined were those that are viewed as potentially planning attacks...

  6. BOOK REVIEW--Branding Terror: The Logotypes and Iconography of Insurgent Groups and Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Christian Luc Carnus

    2016-05-01

    Full Text Available Book review of Branding Terror: The Logotypes and Iconography of Insurgent Groups and Terrorist Organizations by Artur Beifuss and Francesco Trivini Bellini, Merrell Publishers, London, 2013, 336 pages, ISBN–978–1858946016, reviewed by Christian Luc Carnus

  7. MINIMIZING THE VULNERABILITY OF WATER SUPPLIES TO NATURAL AND TERRORIST THREATS

    Science.gov (United States)

    There is increasing concern that drinking water utilities may be vulnerable to attacks by terrorists. In the US the President's Commission on Critical Infrastructure Protection has concluded the US drinking water utilities are vulnerable to physical, cyber and biological terroris...

  8. From Terrorist to Persona: Para-Social Interaction and the ETA Website

    Directory of Open Access Journals (Sweden)

    Yotam Ophir

    2012-03-01

    Full Text Available The great virtues of the Internet - ease of access, lack of regulation, vast potential audiences, and fast flow of information, among others - have been exploited by terrorist groups. Consequently, the Internet has become a useful and effective platform for terrorist organizations and their supporters. Applying para-social relationships theory, this study examines the ways terrorist groups utilize the Internet to gain sympathy and support for their appeals and goals. The case of ETA’s website (ETA - Euskadi Ta Askatasuna, an armed Basque nationalist and separatist organization, dedicated to Basque prisoners imprisoned in Ireland and fighting extradition to Spain, is used as an illustrative example of the applicability of the para-social theorem. The various tactics adopted for establishing and promoting para-social relationships between media characters and the audiences as revealed in Basque terrorist video clips on YouTube are analyzed.  

  9. Fandoriana - 3 : terrorist-gossudarstvennik protiv terrorista-revoljutsionera / Boris Tuch

    Index Scriptorium Estoniae

    Tuch, Boris, 1946-

    2005-01-01

    Mängufilm "Riiginõunik" Boriss Akunini romaani järgi : režissöör Filipp Jankovski. Fandorini osas Oleg Menshikov, terrorist Grin - Konstantin Habenski, krahv Pozharski - Nikita Mihhalkov : Venemaa 2005

  10. The Psychological Development of the Terrorist Mind Set: Pertinence in the Sentencing Phase of Capital Trial

    Directory of Open Access Journals (Sweden)

    Leslie Dawn Culpepper

    2016-03-01

    Full Text Available This paper reviews past and current scholarly literature about the psychological development of the terrorist mind set with a special focus on how adverse life experiences early in one’s lifetime negatively impacts the normal psychological development. Information that pertains to childhood trauma, social psychological factors, psycho-social causes, and psycho-cultural foundations that play a role in the development of terrorist beliefs and behaviors are explored. This paper also reviews several theories that attempt to explain terrorism; a few from a social and cultural perspective, as a constellation of terrorism research scholars suggest that the development of terrorist behavior is in every way contextual. The lives of two known terrorists, Dzhokhar Tsarnaev and Ted Kaczynski, are analyzed to illustrate how the psychological, social, and cultural factors that make up their backgrounds were applied in the sentencing (mitigation phases of their trials resulting in the death penalty being replaced with a life sentence for both. 

  11. BOOK REVIEW--Branding Terror: The Logotypes and Iconography of Insurgent Groups and Terrorist Organizations

    OpenAIRE

    Christian Luc Carnus

    2016-01-01

    Book review of Branding Terror: The Logotypes and Iconography of Insurgent Groups and Terrorist Organizations by Artur Beifuss and Francesco Trivini Bellini, Merrell Publishers, London, 2013, 336 pages, ISBN–978–1858946016, reviewed by Christian Luc Carnus

  12. Maintaining the Legal High Ground: The Legal Implications of Using Armed Force to Combat Terrorists

    Science.gov (United States)

    2007-11-02

    2001, also demonstrated the codependent relationship between the Taliban and Usama Bin Laden’s organization. “Bin Laden could not operate his...STRIKES ON TERRORISTS In leading the campaign against terrorism, we are forging new, productive international relationships and redefining existing... relationship between the target (or lack there of) and the terrorist act was unclear. And, the failure to support the claim that the plant produced chemical

  13. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available . Propaganda ? a form of communication aimed at influencing the terrorist community toward a specific cause; both web literature and social networking tools can be applied for this purpose. Funding ? financial support provided to make a specific terrorist... instructions on how to make letter bombs; use poison and chemicals; detonate car bombs; shoot US soldiers; navigate by the stars (Coll, Glasser 2005) and assemble a suicide bomb vest (Lachow, Richardson 2007). The use of dedicated websites within...

  14. Terrorist Group Dynamics Through the Lens of the Tigantourine Assault in Algeria

    Directory of Open Access Journals (Sweden)

    Richard J. Chasdi

    2013-07-01

    Full Text Available The Algerian terrorist assault in January 2013 that was carried out by Mokhtar Belmokhtar and his “Battalion of Blood” activists against a BP-Norwegian-Algerian-Japanese gas facility in In Amenas, Algeria, is worth considering as it provides a rare glimpse into several key dimensions of terrorist group dynamics that are important for scholars and counter- terrorism practitioners to understand.

  15. Cycles of violence, and terrorist attacks index for the State of Oklahoma

    OpenAIRE

    Gómez-Sorzano, Gustavo

    2007-01-01

    I apply the Beveridge-Nelson business cycle decomposition method to the time series of per capita murder of Florida State (1933-2005). Separating out “permanent” from “cyclical” murder, I hypothesize that the cyclical part coincide with documented waves of organized crime, internal tensions, crime legislation, social, and political unrest, and with the periodic terrorist attacks to the U.S. The estimated cyclical component of murder shows that terrorist attacks against the U.S. have affecte...

  16. Evidences of Persuasion Coercive for Indoctrination of Jihadists Terrorists: Towards Violent Radicalization

    OpenAIRE

    Humberto M. Trujillo; Juan J. Ramírez; Ferran Alonso

    2009-01-01

    This work analyzes two processes of psychological manipulation for indoctrination and violent radicalization of jihadist terrorists in Spain: coercive persuasion and psychological group abuse. This research is based on the trustworthy information used in findings of the Spanish “Audiencia Nacional”(the Spanish High Court charged with terrorist trials) about the affidavits NOVA Operation I, II, and III. This research facilitates a reliable analysis of the possible processes of psychological ma...

  17. Major depressive disorder following terrorist attacks: A systematic review of prevalence, course and correlates

    Science.gov (United States)

    2011-01-01

    Background Terrorist attacks are traumatic events that may result in a wide range of psychological disorders for people exposed. This review aimed to systematically assess the current evidence on major depressive disorder (MDD) after terrorist attacks. Methods A systematic review was performed. Studies included assessed the impact of human-made, intentional, terrorist attacks in direct victims and/or persons in general population and evaluated MDD based on diagnostic criteria. Results A total of 567 reports were identified, 11 of which were eligible for this review: 6 carried out with direct victims, 4 with persons in general population, and 1 with victims and general population. The reviewed literature suggests that the risk of MDD ranges between 20 and 30% in direct victims and between 4 and 10% in the general population in the first few months after terrorist attacks. Characteristics that tend to increase risk of MDD after a terrorist attack are female gender, having experienced more stressful situations before or after the attack, peritraumatic reactions during the attack, loss of psychosocial resources, and low social support. The course of MDD after terrorist attacks is less clear due to the scarcity of longitudinal studies. Conclusions Methodological limitations in the literature of this field are considered and potentially important areas for future research such as the assessment of the course of MDD, the study of correlates of MDD or the comorbidity between MDD and other mental health problems are discussed. PMID:21627850

  18. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  19. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  20. Adolescents' explicit and implicit evaluations of hypothetical and actual peers with different bullying participant roles.

    Science.gov (United States)

    Pouwels, J Loes; Lansu, Tessa A M; Cillessen, Antonius H N

    2017-07-01

    This study examined how adolescents evaluate bullying at three levels of specificity: (a) the general concept of bullying, (b) hypothetical peers in different bullying participant roles, and (c) actual peers in different bullying participant roles. Participants were 163 predominantly ethnic majority adolescents in The Netherlands (58% girls; Mage=16.34years, SD=0.79). For the hypothetical peers, we examined adolescents' explicit evaluations as well as their implicit evaluations. Adolescents evaluated the general concept of bullying negatively. Adolescents' explicit evaluations of hypothetical and actual peers in the bullying roles depended on their own role, but adolescents' implicit evaluations of hypothetical peers did not. Adolescents' explicit evaluations of hypothetical peers and actual peers were different. Hypothetical bullies were evaluated negatively by all classmates, whereas hypothetical victims were evaluated relatively positively compared with the other roles. However, when adolescents evaluated their actual classmates, the differences between bullies and the other roles were smaller, whereas victims were evaluated the most negatively of all roles. Further research should take into account that adolescents' evaluations of hypothetical peers differ from their evaluations of actual peers. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. 47 CFR 69.608 - Carrier Common Line hypothetical net balance.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Carrier Common Line hypothetical net balance. 69.608 Section 69.608 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER... net balance. The hypothetical net balance shall be equal to a Carrier Common Line revenue...

  2. Combining aptamers and in silico interaction studies to decipher the function of hypothetical proteins

    DEFF Research Database (Denmark)

    Suravajhala, Prashanth; Burri, Harsha Vardhan Reddy; Heiskanen, Arto

    2014-01-01

    We present the potential role of aptamers in elucidating the function of hypothetical proteins, as well as the possibilities provided by bioinformatics for establishing a benchmark for aptamer-protein prediction methods. With these future perspectives, the role of hypothetical proteins as target ...

  3. Hidden Markov Models for the Activity Profile of Terrorist Groups

    CERN Document Server

    Raghavan, Vasanthan; Tartakovsky, Alexander G

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and in general, tracking it over a period of time. Toward this goal, a d-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of d = 2 corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, respectively. Two strategies for spurt detection and tracking are developed here: a model-independent strategy that uses the exponential weighted moving-average (EWMA) filter to track the strength of the group as measured by the number of attacks perpetrated by it, and a state estimation strategy that exploits the underlying HMM structure. The EWMA strategy is robust to modeling uncertainties and errors, and tracks persistent changes (changes that last for a sufficiently long duration) in the strength of the group. On the othe...

  4. Suburban Bliss or Disillusionment - Why Do Terrorists Quit?

    Directory of Open Access Journals (Sweden)

    Liesbeth van der Heide

    2016-09-01

    Full Text Available This study explores the explanatory value of two theories of desistance – the cessation of criminal behavior – in explaining why 27 individuals left the Islamic State in Syria and Iraq (ISIS. The article focuses specifically on jihadists that turned away from ISIS after March 2011, asking why individuals desist from ISIS and choose to leave the caliphate. A dataset of 27 narratives of desistance was analysed to answer the question to what extent desistance from ISIS by jihadists can be explained by the Laub & Sampson’s life course theory and by Altier, Thorogughood & Horgan’s model of push and pull factors. The primary pathways for desistance are coded according to the two theories. The results show that of the 27 individuals, the majority desisted from the caliphate because of their perception of the excessive use of force by ISIS and their inability to cope with the effects. A minority desisted because of their perception of alternative options outside the terrorist group or because of important life events that happened ‘at home’. Thus, the article concludes that the push and pull factors model is valid in the explanation of desistance from the Islamic State in Syria and Iraq whereas life course theory does not hold explanatory value

  5. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  6. Anti-terrorist vehicle crash impact energy absorbing barrier

    Energy Technology Data Exchange (ETDEWEB)

    Swahlan, D.J.

    1989-04-18

    An anti-terrorist vehicle crash barrier includes side support structures, crushable energy absorbing aluminum honeycomb modules, and an elongated impact-resistant beam extending between, and at its opposite ends through vertical guideways defined by, the side support structures. An actuating mechanism supports the beam at its opposite ends for movement between a lowered barrier-withdrawn position in which a traffic-supporting side of the beam is aligned with a traffic-bearing surface permitting vehicular traffic between the side support structures and over the beam, and a raised barrier-imposed position in which the beam is aligned with horizontal guideways defined in the side support structures above the traffic-bearing surface, providing an obstruction to vehicular traffic between the side support structures. The beam is movable rearwardly in the horizontal guideways with its opposite ends disposed transversely therethrough upon being impacted at its forward side by an incoming vehicle. The crushable modules are replaceably disposed in the horizontal guideways between aft ends thereof and the beam. The beam, replaceable modules, side support structures and actuating mechanism are separate and detached from one another such that the beam and replaceable modules are capable of coacting to disable and stop an incoming vehicle without causing structural damage to the side support structures and actuating mechanism. 6 figs.

  7. Posttraumatic Stress Disorder Following the September 11, 2001, Terrorist Attacks

    Science.gov (United States)

    Neria, Yuval; DiGrande, Laura; Adams, Ben G.

    2012-01-01

    The September 11, 2001 (9/11), terrorist attacks were unprecedented in their magnitude and aftermath. In the wake of the attacks, researchers reported a wide range of mental and physical health outcomes, with posttraumatic stress disorder (PTSD) the one most commonly studied. In this review, we aim to assess the evidence about PTSD among highly exposed populations in the first 10 years after the 9/11 attacks. We performed a systematic review. Eligible studies included original reports based on the full Diagnostic and Statistical Manual of Mental Disorders (4th ed., rev.; American Psychiatric Association, 2000) criteria of PTSD among highly exposed populations such as those living or working within close proximity to the World Trade Center (WTC) and the Pentagon in New York City and Washington, DC, respectively, and first responders, including rescue, cleaning, and recovery workers. The large body of research conducted after the 9/11 attacks in the past decade suggests that the burden of PTSD among persons with high exposure to 9/11 was substantial. PTSD that was 9/11-related was associated with a wide range of correlates, including sociodemographic and background factors, event exposure characteristics, loss of life of significant others, and social support factors. Few studies used longitudinal study design or clinical assessments, and no studies reported findings beyond six years post-9/11, thus hindering documentation of the long-term course of confirmed PTSD. Future directions for research are discussed. PMID:21823772

  8. Screening Cargo Containers to Remove a Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Hazi, A

    2005-09-20

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S.

  9. Review on emergency medical response against terrorist attack.

    Science.gov (United States)

    Wang, De-Wen; Liu, Yao; Jiang, Ming-Min

    2014-01-01

    Terrorism is a global issue and a constant international threat. As a result, anti-terrorism and emergency response strategies are tasks of critical importance that have a direct impact on the national security of every country in the world. This paper reviews new characteristics of international anti-terrorism measures and offers an in-depth reflection on emergency medical response countermeasures; additionally, this paper presents the goals of related research, which include: 1) to present a model of a highly efficient medical response command; 2) to introduce the pre-planning phases of the emergency medical response; 3) to establish a response system capable of handling various types of terror attacks; 4) to promote anti-terrorism awareness to the general public and emphasize its prevention; and 5) to continue basic investigations into emergency medical responses for various types of terrorist attacks (for example, the classifications and characteristics of new injuries, pathophysiology, prevention and treatment of the resultant stress disorders, improved high-efficiency medical response measures and equipment, etc.).

  10. Anti-terrorist vehicle crash impact energy absorbing barrier

    Energy Technology Data Exchange (ETDEWEB)

    Swahlan, David J. (Albuquerque, NM)

    1989-01-01

    An anti-terrorist vehicle crash barrier includes side support structures, crushable energy absorbing aluminum honeycomb modules, and an elongated impact-resistant beam extending between, and at its opposite ends through vertical guideways defined by, the side support structures. An actuating mechanism supports the beam at its opposite ends for movement between a lowered barrier-withdrawn position in which a traffic-supporting side of the beam is aligned with a traffic-bearing surface permitting vehicular traffic between the side support structures and over the beam, and a raised barrier-imposed position in which the beam is aligned with horizontal guideways defined in the side support structures above the traffic-bearing surface, providing an obstruction to vehicular traffic between the side support structures. The beam is movable rearwardly in the horizontal guideways with its opposite ends disposed transversely therethrough upon being impacted at its forward side by an incoming vehicle. The crushable modules are replaceably disposed in the horizontal guideways between aft ends thereof and the beam. The beam, replaceable modules, side support structures and actuating mechanism are separate and detached from one another such that the beam and replaceable modules are capable of coacting to disable and stop an incoming vehicle without causing structural damage to the side support structures and actuating mechanism.

  11. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  12. A Chronology of Terrorist Attacks and Other Criminal Actions Against Maritime Targets

    Science.gov (United States)

    1983-09-01

    directed against the Government of the Bahamas for the murder of Cuban nationals. (This Cuban liberation group may be FLNC--Frente de Liberacion ...It appeared likely, however, that the incident was related to the previously stated intention of the FLNC (Frente de Liberacion Nacional Cubana) to

  13. Response to the Terrorist Attack on the Pentagon: Pentagon Family Assistance Center (PFAC) After Action Report

    Science.gov (United States)

    2003-03-01

    ANSI Std Z39-18 PERSONNEL AND READINESS THE UNDER SECRETARY OF DEFENSE 4000 DEFENSE PENTAGON WASHINGTON , DC 20301-4000 FEB 2 0 2003 The...Base, Delaware Port Mortuary. This expert discussed the entire mortuary and identifi cation process, including the importance of DNA specimens and... adolescent counseling, family counseling, consultation services and referral for longer-term follow-up counseling. The staff also attended all special

  14. An approach for estimating the radiological significance of a hypothetical major nuclear accident over long distance transboundary scales

    Energy Technology Data Exchange (ETDEWEB)

    Mitrakos, D., E-mail: dimitris.mitrakos@eeae.gr; Potiriadis, C.; Housiadas, C.

    2016-04-15

    Highlights: • Actions may be warranted after a major nuclear accident even at long distances. • Distance may not be the decisive parameter for longer term radiological impact. • Remote impact may vary orders of magnitude depending on the meteorological conditions. • The potential impact can be assessed using computationally inexpensive calculations. - Abstract: After the Fukushima accident important initiatives were taken in European level to enhance the nuclear safety level of the existing and planned nuclear reactors, such as the so-called nuclear “stress-tests” and the amendment of the Nuclear Safety Directive. A recent work of HERCA and WENRA focused on the need for a more consistent and harmonized response in a transboundary context in case of a hypothetical major nuclear accident in Europe. Such an accident, although very improbable, cannot be totally excluded and so, should be considered in emergency preparedness arrangements among the various European countries. In case of a hypothetical severe Fukushima-like accident in Europe, the role of the neighboring countries may be important, since the authorities should be able to provide information and advice to the government and the public, but also can contribute to the overall assessment of the situation be their own means. In this work we assess the radiological significance of a hypothetical major nuclear accident for distances longer than 300 km that are not typically covered by the internationally accepted emergency planning zones. The approach is simple and computationally inexpensive, since it is based on the calculation of only a few release scenarios at dates selected within a whole year on the basis of bounding the deposition levels at long distances in relation to the occurrence of precipitation. From the calculated results it is evident that distance is not the only decisive parameter in estimating the potential radiological significance of a severe nuclear accident. The hypothetical

  15. Mass spectrometric analysis of chemical warfare agents in support of a chemical terrorist event

    Energy Technology Data Exchange (ETDEWEB)

    Hancock, J.R.; D' Agostino, P.A.; Chenier, C.L. [Defence R and D Canada Suffield, Medicine Hat, AB (Canada)

    2003-07-01

    Chemical warfare (CW) agents are considered to be any chemicals which, through their chemical action on life processes can cause death, temporary incapacitation or permanent harm to humans or animals. In Canada, the probability of a CW terrorist attack is low despite the catastrophic consequences that would result from such an attack. The three levels of government would be responding to such an event. CW agent response training for all levels of government is offered at Defence R and D Canada-Suffield. Appropriate samples must be collected for analysis in a laboratory, as such an event would lead to a criminal investigation. Research into new methods for the identification of CW agents is being conducted by the analytical laboratory at Defence R and D Canada-Suffield. Gas chromatography and mass spectrometry (GC-MS) are being used extensively to separate and characterize CW agents in organic extracts. In the case of aqueous samples, another method might be more appropriate, since additional sample handling is required before GC-MS analysis can be performed. Minimal sample handling is required when using liquid chromatography-electrospray ionization-mass spectrometry (LC-ESI-MS) for direct analysis of CW agents. The authors demonstrated the use of LC-ESI-MS for analyzing CW agents and their hydrolysis products in aqueous samples. For the analysis of nerve agents and phosphonic acids in soil, comparable or superior results to organic extraction and GC-MS were obtained for aqueous extractions followed by LC-ESI-MS. The combination of GC-MS and LC-ESI-MS for the analysis of mustard related compounds in soil extracts from a former mustard storage area showed that the two methods are complementary in this situation. 9 refs., 3 tabs., 5 figs.

  16. MODFLOW-NWT model of a hypothetical stream-aquifer system to assess capture map bias

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — A MODFLOW-NWT (version 1.0.9) model of a hypothetical stream-aquifer system is presented for the evaluation and characterization of capture map bias. The...

  17. Detection and Mitigation of Hypothetical Bias in Contingent Valuation With An Application To Curbside Recycling

    OpenAIRE

    Aadland, David; Caplan, Arthur J.

    2001-01-01

    In this paper, we use a unique curbside-recycling data set to test the effectiveness of "cheap talk" and "preference uncertainty" in mitigating hypothetical bias in contingent valuation. The sample includes two types of households-those located in communities with curbside recycling programs (mandatory or voluntary) and those in communities without curbside recycling. Using stated and revealed preference data, detect significant hypothetical bias. Cheap talk and preference-uncertainty control...

  18. Mitigating Hypothetical Bias in Stated Preference Data: Evidence from Sports Tourism

    OpenAIRE

    John Whitehead; Melissa S. Weddell; Pete Groothuis

    2014-01-01

    One of the major criticisms of stated preference data is hypothetical bias. Using a unique data set of both stated and actual behavior we test for hypothetical bias of stated preference survey responses. We consider whether respondents tend to overstate their participatory sporting event behavior ex ante when compared to their actual behavior at different registration fees. We find that behavioral intentions accurately predicts actual behavior at a middle level of respondent certainty, over p...

  19. Proceedings of the Conference on Hypothetical Reasoning, 23-24 August 2014, Tübingen

    OpenAIRE

    Piecha, Thomas; Schroeder-Heister, Peter

    2015-01-01

    Hypothetical reasoning or reasoning under assumptions is a key concept of logic, philosophy of science and mathematics. The Conference on Hypothetical Reasoning focussed on its logical aspects, such as assumption-based calculi and their proof theory, logical consequence from a proof-theoretic or model-theoretic point of view, logics of conditionals, proof systems, structure of assumption-based proofs, hypotheses in proof-theoretic semantics, notions of implication, substructural logics, hy...

  20. Increasing membrane interactions of local anaesthetics as hypothetic mechanism for their cardiotoxicity enhanced by myocardial ischaemia.

    Science.gov (United States)

    Tsuchiya, Hironori; Mizogami, Maki; Shigemi, Kenji

    2012-11-01

    While myocardial ischaemia enhances the cardiotoxicity of local anaesthetics, the pharmacological background remains unclear. Cardiolipin (CL) localized in mitochondrial membranes is possibly the site of cardiotoxic action of local anaesthetics and peroxynitrite is produced by cardiac ischaemia and reperfusion. We verified the hypothetic mechanism that local anaesthetics may interact with CL-containing biomembranes to change the membrane biophysical property and their membrane interactions may be increased by peroxynitrite. Biomimetic membranes were prepared with different phospholipids and cholesterol of varying compositions. The membrane preparations were reacted with peroxynitrite of pathologically relevant concentrations and local anaesthetics (bupivacaine and lidocaine) of a cardiotoxic concentration separately or in combination. Changes in membrane fluidity were determined by measuring fluorescence polarization. Peroxynitrite decreased the fluidity of biomimetic membranes at 0.1-10 μM with the relative potency being CL>1-stearoyl-2-arachidonoylphosphatidylcholine>1,2-dipalmitoylphosphatidylcholine-constituting membranes, indicating the lipid peroxidation-induced membrane rigidification determined by the unsaturation degree of membrane lipids. When treated with 0.1-10 μM peroxynitrite, biomimetic membranes were more rigid with elevating the CL content from 0% to 30 mol%, suggesting that CL is a primary target of peroxynitrite. Bupivacaine and lidocaine fluidized at 200 μM biomimetic membranes containing 10 mol% CL and their effects were increased by pre-treating the membranes with 0.1 and 1 μM peroxynitrite. Cardiotoxic bupivacaine and lidocaine increasingly interact with CL-containing mitochondria model membranes which are relatively rigidified by peroxynitrite. Such an increasing membrane interaction may be, at least in part, responsible for the local anaesthetic cardiotoxicity enhanced by myocardial ischaemia.

  1. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  2. Angry at the unjust, scared of the powerful: emotional responses to terrorist threat.

    Science.gov (United States)

    Giner-Sorolla, Roger; Maitner, Angela T

    2013-08-01

    The threat of terrorist attacks motivates emotional reactions that elicit functional behavioral responses to characteristics of a threatening group. We argue that the more the group is seen as unjust, the more anger arises, whereas the more it is seen as powerful, the more fear arises. In Experiment 1, British participants read about terrorist groups with varied levels of injustice and power. As expected, the manipulation of injustice increased anger, and power increased fear. Anger and fear predicted offensive and defensive reactions. Experiment 2 used a representative sample of U.S. residents and again found distinct effects of an injustice manipulation on anger, and a power manipulation on fear. Anger was a primary motivator of support for offensive and defensive measures in both experiments. Willingness to negotiate was reduced with more injustice and anger, but increased with more outgroup power and fear. These findings have implications on public reactions to terrorist organizations.

  3. Steeper delay and probability discounting of potentially real versus hypothetical cigarettes (but not money) among smokers.

    Science.gov (United States)

    Green, Ryan M; Lawyer, Steven R

    2014-10-01

    There is a strong relationship between drug use and the tendency to discount the value of outcomes as a function of their delay and probability. Most discounting researchers use hypothetical monetary outcomes to establish discounting patterns among human subjects, who tend to discount the value of hypothetical money and real money similarily. However, no research to date has examined whether hypothetical non-monetary outcomes are discounted similarly to real non-monetary outcomes. In this study, smokers were assigned randomly to complete delay and probability discounting tasks for money and cigarettes that were either potentially real (n=33) or hypothetical (n=31). Consistent with previous research, smokers discounted the value of hypothetical and potentially real money similarly. However, smokers evidenced steeper rates of discounting for potentially real cigarettes in both delay and probability discounting. These findings suggest domain-specific discounting patterns in which potentially real and hypothetical outcomes may be synonymous in the context of monetary outcomes, but not in the context of non-monetary outcomes. Copyright © 2014 Elsevier B.V. All rights reserved.

  4. 76 FR 3007 - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2011-01-18

    ... Sig.) THE WHITE HOUSE, January 13, 2011. [FR Doc. 2011-1106 Filed 1-14-11; 11:15 am] Billing code 3195... Notice of January 13, 2011--Continuation of the National Emergency With Respect to Terrorists Who... Terrorists Who Threaten To Disrupt the Middle East Peace Process On January 23, 1995, by Executive...

  5. 77 FR 3065 - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2012-01-20

    ....) THE WHITE HOUSE, January 19, 2012. [FR Doc. 2012-1316 Filed 1-19-12; 2:00 pm] Billing code 3295-F2-P ... With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process #0; #0; #0... National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process...

  6. 78 FR 39057 - In the Matter of the Designation of Eric Breininger as a Specially Designated Global Terrorist...

    Science.gov (United States)

    2013-06-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE In the Matter of the Designation of Eric Breininger as a Specially Designated Global Terrorist Pursuant To... aforementioned individual as a Specially Designated Global Terrorist pursuant to section 1(b) of the Order....

  7. 75 FR 3845 - Continuation of the National Emergency With Respect To Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2010-01-22

    ... Sig.) THE WHITE HOUSE, January 20, 2010. [FR Doc. 2010-1400 Filed 1-21-10; 8:45 am] Billing code 3195... Terrorists Who Threaten To Disrupt the Middle East Peace Process On January 23, 1995, by Executive Order... by foreign terrorists who threaten to disrupt the Middle East peace process. On August 20, 1998,...

  8. 78 FR 4303 - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2013-01-22

    ... 17, 2013. [FR Doc. 2013-01296 Filed 1-18-13; 8:45 am] Billing code 3295-F3 ... Terrorists Who Threaten To Disrupt the Middle East Peace Process On January 23, 1995, by Executive Order... by foreign terrorists who threaten to disrupt the Middle East peace process. On August 20, 1998,...

  9. The Meaning of Collective Terrorist Threat: Understanding the Subjective Causes of Terrorism Reduces Its Negative Psychological Impact

    Science.gov (United States)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    2011-01-01

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of…

  10. Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States Since September 11, 2001

    Science.gov (United States)

    2010-01-01

    sporadic terrorist attacks in the United States, as did remnants of the Ku Klux Klan .2 Some of these groups clearly benefited from the support of...Communist Party or the Ku Klux Klan did not work with the tiny, more- fluid terrorist gangs of the 1970s. Domestic intel- ligence also operated under

  11. Risks to emergency medical responders at terrorist incidents: a narrative review of the medical literature.

    Science.gov (United States)

    Thompson, Julian; Rehn, Marius; Lossius, Hans Morten; Lockey, David

    2014-09-24

    As the threat of international terrorism rises, there is an increasing requirement to provide evidence-based information and training for the emergency personnel who will respond to terrorist incidents. Current major incident training advises that emergency responders prioritize their own personal safety above that of the 'scene and survivors'. However, there is limited information available on the nature of these threats and how they may be accurately evaluated. This study reviews the published medical literature to identify the hazards experienced by emergency responders who have attended previous terrorist incidents. A PubMed literature search identified 10,894 articles on the subject of 'terrorism', and there was a dramatic increase in publications after the 9/11 attacks in 2001. There is heterogeneity in the focus and quality of this literature, and 307 articles addressing the subject of scene safety were assessed for information regarding the threats encountered at terrorist incidents. These articles demonstrate that emergency responders have been exposed to both direct terrorist threats and environmental scene hazards, including airborne particles, structural collapse, fire, and psychological stress. The emphasis of training and preparedness for terrorist incidents has been primarily on the direct threats, but the published literature suggests that the dominant causes of mortality and morbidity in responders after such incidents are the indirect environmental hazards. If the medical response to terrorist incidents is to be based on evidence rather than anecdote, analysis of the current literature should be incorporated into major incident training, and consistent collection of key data from future incidents is required.

  12. Atmospheric mercury dispersion modelling from two nearest hypothetical point sources

    Energy Technology Data Exchange (ETDEWEB)

    Al Razi, Khandakar Md Habib; Hiroshi, Moritomi; Shinji, Kambara [Environmental and Renewable Energy System (ERES), Graduate School of Engineering, Gifu University, Yanagido, Gifu City, 501-1193 (Japan)

    2012-07-01

    The Japan coastal areas are still environmentally friendly, though there are multiple air emission sources originating as a consequence of several developmental activities such as automobile industries, operation of thermal power plants, and mobile-source pollution. Mercury is known to be a potential air pollutant in the region apart from SOX, NOX, CO and Ozone. Mercury contamination in water bodies and other ecosystems due to deposition of atmospheric mercury is considered a serious environmental concern. Identification of sources contributing to the high atmospheric mercury levels will be useful for formulating pollution control and mitigation strategies in the region. In Japan, mercury and its compounds were categorized as hazardous air pollutants in 1996 and are on the list of 'Substances Requiring Priority Action' published by the Central Environmental Council of Japan. The Air Quality Management Division of the Environmental Bureau, Ministry of the Environment, Japan, selected the current annual mean environmental air quality standard for mercury and its compounds of 0.04 ?g/m3. Long-term exposure to mercury and its compounds can have a carcinogenic effect, inducing eg, Minamata disease. This study evaluates the impact of mercury emissions on air quality in the coastal area of Japan. Average yearly emission of mercury from an elevated point source in this area with background concentration and one-year meteorological data were used to predict the ground level concentration of mercury. To estimate the concentration of mercury and its compounds in air of the local area, two different simulation models have been used. The first is the National Institute of Advanced Science and Technology Atmospheric Dispersion Model for Exposure and Risk Assessment (AIST-ADMER) that estimates regional atmospheric concentration and distribution. The second is the Hybrid Single Particle Lagrangian Integrated trajectory Model (HYSPLIT) that estimates the atmospheric

  13. Atmospheric mercury dispersion modelling from two nearest hypothetical point sources

    Directory of Open Access Journals (Sweden)

    Khandakar Md Habib Al Razi, Moritomi Hiroshi, Kambara Shinji

    2012-01-01

    Full Text Available The Japan coastal areas are still environmentally friendly, though there are multiple air emission sources originating as a consequence of several developmental activities such as automobile industries, operation of thermal power plants, and mobile-source pollution. Mercury is known to be a potential air pollutant in the region apart from SOX, NOX, CO and Ozone. Mercury contamination in water bodies and other ecosystems due to deposition of atmospheric mercury is considered a serious environmental concern. Identification of sources contributing to the high atmospheric mercury levels will be useful for formulating pollution control and mitigation strategies in the region. In Japan, mercury and its compounds were categorized as hazardous air pollutants in 1996 and are on the list of "Substances Requiring Priority Action" published by the Central Environmental Council of Japan. The Air Quality Management Division of the Environmental Bureau, Ministry of the Environment, Japan, selected the current annual mean environmental air quality standard for mercury and its compounds of 0.04 μg/m3. Long-term exposure to mercury and its compounds can have a carcinogenic effect, inducing eg, Minamata disease. This study evaluates the impact of mercury emissions on air quality in the coastal area of Japan. Average yearly emission of mercury from an elevated point source in this area with background concentration and one-year meteorological data were used to predict the ground level concentration of mercury. To estimate the concentration of mercury and its compounds in air of the local area, two different simulation models have been used. The first is the National Institute of Advanced Science and Technology Atmospheric Dispersion Model for Exposure and Risk Assessment (AIST-ADMER that estimates regional atmospheric concentration and distribution. The second is the Hybrid Single Particle Lagrangian Integrated trajectory Model (HYSPLIT that estimates the

  14. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researchers...... to use their intelligence data (Ressler S., 2006).  Very few researchers (Krebs, V., 2002, Sageman, M., 2004 and Rodriguez, J. A., 2004) collected data from open sources, and to the best of our knowledge, no knowledge base is available in academia for the analysis of the terrorist events.   To counter...... of Investigative Data Mining (IDM). In addition, we present iMiner Information Harvesting System and describe how intelligence agencies could be benefited from detecting hierarchy in non-hierarchical terrorist networks.  In this paper we present results of detection of hidden hierarchy of Riyadh Bombing Terrorist...

  15. Elements of the terrorism reviewed through instrumentum operandi, organizational setup and phases of realization of the terrorist act

    Directory of Open Access Journals (Sweden)

    Zlate Dimovski

    2016-03-01

    Full Text Available Terrorism is a global threat to all countries regardless their social, economic and religious setting. For the realization of their activities, terrorists use different models. As funds for realization of the terrorist act they use different types of weapons, mainly firearms. Terrorist organizations that practice modern forms of terrorism also use weapons of mass destruction. According to that, they improve the ways of getting funds for the realization of the terrorist acts, its internal organization and the ways of practicing terrorism. In this article, we will give a brief overview of the instrumentum operandi, organizational setup and phases of realization of the terrorist act, with special emphasis on the situation in the Republic of Macedonia.

  16. UN Targeted Terrorist Sanctions and the Rule of Law: The UKs Response

    Directory of Open Access Journals (Sweden)

    Joe Stevens

    2012-09-01

    Full Text Available This article will examine the effect of instigating United Nations Security Council Resolutions (UNSCR’s in relation to assets freezing of those suspected of being involved in terrorist activity. It will discuss the decision by the UK Supreme Court in the leading judgment and the subsequent government’s responses concerning the introduction into the UK of UNSCR’s by means of secondary legislation in relation to Parliamentary supremacy. The main UK case under discussion will be 'R v A (& others'. This case found that the freezing of assets of those suspected of terrorist activity in the UK, in compliance with various UNSC resolutions was ultra vires

  17. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  18. Estimating the Importance of Terrorists in a Terror Network

    Science.gov (United States)

    Elhajj, Ahmed; Elsheikh, Abdallah; Addam, Omar; Alzohbi, Mohamad; Zarour, Omar; Aksaç, Alper; Öztürk, Orkun; Özyer, Tansel; Ridley, Mick; Alhajj, Reda

    While criminals may start their activities at individual level, the same is in general not true for terrorists who are mostly organized in well established networks. The effectiveness of a terror network could be realized by watching many factors, including the volume of activities accomplished by its members, the capabilities of its members to hide, and the ability of the network to grow and to maintain its influence even after the loss of some members, even leaders. Social network analysis, data mining and machine learning techniques could play important role in measuring the effectiveness of a network in general and in particular a terror network in support of the work presented in this chapter. We present a framework that employs clustering, frequent pattern mining and some social network analysis measures to determine the effectiveness of a network. The clustering and frequent pattern mining techniques start with the adjacency matrix of the network. For clustering, we utilize entries in the table by considering each row as an object and each column as a feature. Thus features of a network member are his/her direct neighbors. We maintain the weight of links in case of weighted network links. For frequent pattern mining, we consider each row of the adjacency matrix as a transaction and each column as an item. Further, we map entries into a 0/1 scale such that every entry whose value is greater than zero is assigned the value one; entries keep the value zero otherwise. This way we can apply frequent pattern mining algorithms to determine the most influential members in a network as well as the effect of removing some members or even links between members of a network. We also investigate the effect of adding some links between members. The target is to study how the various members in the network change role as the network evolves. This is measured by applying some social network analysis measures on the network at each stage during the development. We report

  19. Insider Threat: Preventing Direct Action Attacks Within the United States Army

    Science.gov (United States)

    2017-06-09

    definition differs from workplace violence. In the case of the Fort Hood shootings of 2009, the ties to Islamic extremism and a known international terrorist...bonding, and a spirit of teamwork ; by smartness of appearance and action; by cleanliness and maintenance of dress, equipment, and quarters; by

  20. Effects of disclosing hypothetical genetic test results for salt sensitivity on salt restriction behavior

    Directory of Open Access Journals (Sweden)

    Takeshima T

    2013-05-01

    Full Text Available Taro Takeshima,1,2 Masanobu Okayama,1 Masanori Harada,3 Ryusuke Ae,4 Eiji Kajii1 1Division of Community and Family Medicine, Center for Community Medicine, Jichi Medical University, Tochigi, Japan; 2Department of Healthcare Epidemiology, Kyoto University Graduate School of Medicine and Public Health, Kyoto, Japan; 3Department for Support of Rural Medicine, Yamaguchi Grand Medical Center, Yamaguchi, Japan; 4Department of General Internal Medicine, Hamasaka Public Hospital, Mikata, Japan Background: A few studies have explored the effects of disclosure of genetic testing results on chronic disease predisposition. However, these effects remain unclear in cases of hypertension. Reducing salt intake is an important nonpharmacological intervention for hypertension. We investigated the effects of genetic testing for salt sensitivity on salt restriction behavior using hypothetical genetic testing results. Methods: We conducted a cross-sectional study using a self-completed questionnaire. We enrolled consecutive outpatients who visited primary care clinics and small hospitals between September and December 2009 in Japan. We recorded the patients’ baseline characteristics and data regarding their salt restriction behavior, defined as reducing salt intake before and after disclosure of hypothetical salt sensitivity genetic test results. Behavioral stage was assessed according to the five-stage transtheoretical model. After dividing subjects into salt restriction and no salt restriction groups, we compared their behavioral changes following positive and negative test results and analyzed the association between the respondents’ characteristics and their behavioral changes. Results: We analyzed 1562 participants with a mean age of 58 years. In the no salt restriction group, which included patients at the precontemplation, contemplation, and preparation stages, 58.7% stated that their behavioral stage progressed after a positive test result, although 29

  1. Expression profiling of hypothetical genes in Desulfovibrio vulgaris leads to improved functional annotation

    Energy Technology Data Exchange (ETDEWEB)

    Elias, Dwayne A.; Mukhopadhyay, Aindrila; Joachimiak, Marcin P.; Drury, Elliott C.; Redding, Alyssa M.; Yen, Huei-Che B.; Fields, Matthew W.; Hazen, Terry C.; Arkin, Adam P.; Keasling, Jay D.; Wall, Judy D.

    2008-10-27

    Hypothetical and conserved hypothetical genes account for>30percent of sequenced bacterial genomes. For the sulfate-reducing bacterium Desulfovibrio vulgaris Hildenborough, 347 of the 3634 genes were annotated as conserved hypothetical (9.5percent) along with 887 hypothetical genes (24.4percent). Given the large fraction of the genome, it is plausible that some of these genes serve critical cellular roles. The study goals were to determine which genes were expressed and provide a more functionally based annotation. To accomplish this, expression profiles of 1234 hypothetical and conserved genes were used from transcriptomic datasets of 11 environmental stresses, complemented with shotgun LC-MS/MS and AMT tag proteomic data. Genes were divided into putatively polycistronic operons and those predicted to be monocistronic, then classified by basal expression levels and grouped according to changes in expression for one or multiple stresses. 1212 of these genes were transcribed with 786 producing detectable proteins. There was no evidence for expression of 17 predicted genes. Except for the latter, monocistronic gene annotation was expanded using the above criteria along with matching Clusters of Orthologous Groups. Polycistronic genes were annotated in the same manner with inferences from their proximity to more confidently annotated genes. Two targeted deletion mutants were used as test cases to determine the relevance of the inferred functional annotations.

  2. Structure and functional annotation of hypothetical proteins having putative Rubisco activase function from Vitis vinifera.

    Science.gov (United States)

    Kumar, Suresh

    2015-01-01

    Rubisco is a very large, complex and one of the most abundant proteins in the world and comprises up to 50% of all soluble protein in plants. The activity of Rubisco, the enzyme that catalyzes CO2 assimilation in photosynthesis, is regulated by Rubisco activase (Rca). In the present study, we searched for hypothetical protein of Vitis vinifera which has putative Rubisco activase function. The Arabidopsis and tobacco Rubisco activase protein sequences were used as seed sequences to search against Vitis vinifera in UniprotKB database. The selected hypothetical proteins of Vitis vinifera were subjected to sequence, structural and functional annotation. Subcellular localization predictions suggested it to be cytoplasmic protein. Homology modelling was used to define the three-dimensional (3D) structure of selected hypothetical proteins of Vitis vinifera. Template search revealed that all the hypothetical proteins share more than 80% sequence identity with structure of green-type Rubisco activase from tobacco, indicating proteins are evolutionary conserved. The homology modelling was generated using SWISS-MODEL. Several quality assessment and validation parameters computed indicated that homology models are reliable. Further, functional annotation through PFAM, CATH, SUPERFAMILY, CDART suggested that selected hypothetical proteins of Vitis vinifera contain ATPase family associated with various cellular activities (AAA) and belong to the AAA+ super family of ring-shaped P-loop containing nucleoside triphosphate hydrolases. This study will lead to research in the optimization of the functionality of Rubisco which has large implication in the improvement of plant productivity and resource use efficiency.

  3. Aptitude for Destruction. Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups

    Science.gov (United States)

    2005-01-01

    Neuffer , 1990).12 The increasing specificity and sophistication of the devices also increased the risk to the group’s capabilities, since the security...Croomhelm, 1984, pp. 3-3 1. Neuffer , Elizabeth, "Tapes Key to IRA High-Tech Trial," The Boston Globe, May 1, 1990, p. 17. "No One Hurt as Terrorist Grenade

  4. Critical incident stress debriefing following the terrorist bombing at Army Headquarters Northern Ireland.

    Science.gov (United States)

    Finnegan, A P; Cumming, P A; Piper, M E

    1998-02-01

    On the 7 October 1996 the Provisional Irish Republican Army launched a terrorist attack within Northern Ireland. This paper provides a descriptive reflective account of the psychological support and Critical Incident Stress Debriefings (CISD) provided for civilian/military personnel and service families. Between 66 hours and 96 hours following the incident, 407 people were debriefed.

  5. Providing Crisis Counseling to New Yorkers after the Terrorist Attack on the World Trade Center.

    Science.gov (United States)

    Jordan, Karin

    2002-01-01

    This article provides an overview of two crisis intervention techniques used by a marriage and family counselor who served as a crisis counselor in New York City after the September 11th terrorist attack. The intervention techniques described are Critical Incident Stress Debriefing and one-on-one crisis counseling. An overview of both techniques…

  6. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  7. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Office of Foreign Assets Control 31 CFR Parts 594, 595, and 597 Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions Regulations AGENCY: Office of... (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations...

  8. After a terrorist attack: Challenges for political and administrative leadership in norway

    NARCIS (Netherlands)

    T. Christensen (Tom); P. Laegreid (Per); L.H. Rykkja (Lise Hellebø)

    2013-01-01

    textabstractThis article addresses the challenges that the terrorist attacks on 22 July 2011 in Norway created for central government and, more particularly, for the political and police leadership. The emphasis is on 'meaning making', focusing on how the leaders played out their reactions in the

  9. [Stories and drawings by children after the 2015 terrorist attacks in Paris].

    Science.gov (United States)

    Poget, Marc; Bouaziz, Nora; Apter, Gisèle

    2016-01-01

    Through the stories and drawings of children in a medical-psychological centre, it is possible to explore their psychological representations of the terrorist attacks which took place in Paris in January 2015. This work highlights the need to rethink the methods of care provided to these children in order to adapt them to their specific needs.

  10. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  11. Social Work Students' Experiences and Training Needs after the September 11, 2001 Terrorist Attacks

    Science.gov (United States)

    Colarossi, Lisa; Berlin, Scott; Harold, Rena D.; Heyman, Janna

    2007-01-01

    The terrorist attacks of 9/11/01 created a major life disruption for citizens near and far from New York. This study describes field work experiences of social work students in two different geographic locations inside and outside of New York in the six months after 9/11 in terms of their: (1) reports of client problems, (2) receipt of special…

  12. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  13. There and back again: The study of mental disorder and terrorist involvement.

    Science.gov (United States)

    Gill, Paul; Corner, Emily

    2017-04-01

    For the past 40 years, researchers studied the relationship between mental disorder and terrorist involvement. The literature developed in 4 paradigms, each of which differs in terms of their empirical evidence, the specific mental disorders studied, and their conceptualizations of terrorist involvement. These paradigms have not, however, witnessed linear and incremental improvements upon 1 another. Although 1 paradigm has generally tended to dominate a temporal period, many false assumptions and incorrect interpretations of earlier work permeate into today's discourse. This article provides a history of the study of mental disorders and the terrorist. First, we briefly outline the core fundamental principles of the first 2 paradigms, The article then outlines the core arguments produced by the seminal reviews conducted in Paradigm 3. We highlight how these findings were consistently misinterpreted in subsequent citations. We then highlight recent innovations in the study of terrorism and mental disorder since the various influential literature reviews of 1997-2005. We conclude by outlining how future research in this area may improve in the coming years by broadening our understanding of both terrorist involvement and psychopathology away from simple dichotomous thinking. (PsycINFO Database Record

  14. Social Network Analysis: A case study of the Islamist terrorist network

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL

    2012-01-01

    Social Network Analysis is a compilation of methods used to identify and analyze patterns in social network systems. This article serves as a primer on foundational social network concepts and analyses and builds a case study on the global Islamist terrorist network to illustrate the use and usefulness of these methods. The Islamist terrorist network is a system composed of multiple terrorist organizations that are socially connected and work toward the same goals. This research utilizes traditional social network, as well as small-world, and scale-free analyses to characterize this system on individual, network and systemic levels. Leaders in the network are identified based on their positions in the social network and the network structure is categorized. Finally, two vital nodes in the network are removed and this version of the network is compared with the previous version to make implications of strengths, weaknesses and vulnerabilities. The Islamist terrorist network structure is found to be a resilient and efficient structure, even with important social nodes removed. Implications for counterterrorism are given from the results of each analysis.

  15. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  16. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  17. Patterns of maxillofacial injuries caused by terrorist attacks in Iraq: retrospective study.

    Science.gov (United States)

    Gataa, I S; Muassa, Q H

    2011-01-01

    Over the past 5 years, Iraq has witnessed daily terrorist attacks mainly using improvised explosive devices. The aim of this study was to analyze the patterns of maxillofacial injuries caused by terrorist attacks in a sample of Iraqi casualties. Records from two hospitals, including 551 patients who sustained maxillofacial injuries due to terrorists attacks, were analyzed according to the patients' age, sex, site of injury, type of injury and cause of injury. Concomitant injuries and mortality were also considered. The most common age group affected was those aged 15-29 years. Most of these injuries were caused by improvised explosive devices (71%). More than one facial zone was injured in 212 patients (38%). Isolated soft tissues injuries were detected in (54%) of victims. Pure maxillofacial injuries comprised 33%. The most common injuries associated with this type of trauma were eye injuries (29%). The mortality rate was 2% from pure maxillofacial injuries. Terrorist attacks cause unique maxillofacial injuries, which should be considered a new entity in the trauma field.

  18. The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World

    Science.gov (United States)

    2004-01-01

    reconnaissance, with a team sent to survey, plan, and prepare for the attack with help from local dissi- ______________ 104“El Silencio de las Armas...Ha’aretz, June 21, 2001. 104 The Dynamic Terrorist Threat “El Silencio de las Armas,” Cambio, August 14, 2000. Sobelman, Daniel, “Hizbullah Lends Its

  19. Striking at the Underbelly: Influencing Would-Be Terrorists

    Science.gov (United States)

    2013-12-01

    of environment, emotions towards others, motivation for actions, personality in general and behavior as a consequence of interpersonal relationships...that my economic circumstances were not good. They … exploited it. … They approached me with warmth that I later understood to be false.”57 C

  20. On the Path of Election and Martyrdom: Some Psychic Mechanisms Involved in the Anders Behring Breivik's Determination as a Terrorist.

    Science.gov (United States)

    Cotti, Patricia

    2015-08-01

    On 22 July 2011, the Norwegian Anders Behring Breivik carried out two attacks in Oslo that cost the lives of 77 people, injured many others, and plunged the entire Norwegian nation into mourning. When he was arrested, Breivik presented himself as a member of the Knights Templar, whose mission is to defend the Christian Western world. He considers that he has sacrificed himself by his actions for his people and says that he has prepared himself for martyrdom. In analysing Breivik's words and writings, this article attempts to identify the thought mechanisms involved in Breivik's idea of election (megalomania) and martyrology. It highlights the importance of a mechanism of "return to the sender," whereby Breivik returns the reproaches directed at him by an agency of judgment (ego ideal or superegoic object). It emphasizes the existence of a "burning desire" and yearning (Sehnsucht) for this same persecuting superegoic object, an object that Breivik constantly wants to find again, even if in death. Taking into consideration Searles's hypothesis that the sense of being persecuted is a defence against the impossibility of mourning, and also H. Blum's hypothesis that persecutory feelings are indicative of fears of a "regressive loss of object constancy," the different psychic mechanisms and modes of functioning underlying Breivik's terrorist determination are related here to what we know about his affective development and infantile relationships.

  1. Structural Analysis of Hypothetical Proteins from Helicobacter pylori: An Approach to Estimate Functions of Unknown or Hypothetical Proteins

    Directory of Open Access Journals (Sweden)

    Bong-Jin Lee

    2012-06-01

    Full Text Available Helicobacter pylori (H. pylori have a unique ability to survive in extreme acidic environments and to colonize the gastric mucosa. It can cause diverse gastric diseases such as peptic ulcers, chronic gastritis, mucosa-associated lymphoid tissue (MALT lymphoma, gastric cancer, etc. Based on genomic research of H. pylori, over 1600 genes have been functionally identified so far. However, H. pylori possess some genes that are uncharacterized since: (i the gene sequences are quite new; (ii the function of genes have not been characterized in any other bacterial systems; and (iii sometimes, the protein that is classified into a known protein based on the sequence homology shows some functional ambiguity, which raises questions about the function of the protein produced in H. pylori. Thus, there are still a lot of genes to be biologically or biochemically characterized to understand the whole picture of gene functions in the bacteria. In this regard, knowledge on the 3D structure of a protein, especially unknown or hypothetical protein, is frequently useful to elucidate the structure-function relationship of the uncharacterized gene product. That is, a structural comparison with known proteins provides valuable information to help predict the cellular functions of hypothetical proteins. Here, we show the 3D structures of some hypothetical proteins determined by NMR spectroscopy and X-ray crystallography as a part of the structural genomics of H. pylori. In addition, we show some successful approaches of elucidating the function of unknown proteins based on their structural information.

  2. The effect of the solemn oath script in hypothetical choice experiment survey: A pilot study

    NARCIS (Netherlands)

    Magistris, de T.; Pascucci, S.

    2014-01-01

    We test the effect of the solemn oath (HO) in Hypothetical CE Survey (CE). We conducted CE surveys with three treatments: (1) CE without a cognitive task, (2) CE with a CT script, and (3) CE with a HO. Results generally suggest lower WTPs values with the HO, than without the HO script.

  3. An Assessment of the Hypothetical Impact of Drug Abuse on Combat Capability. Volume I.

    Science.gov (United States)

    1979-12-01

    25 I .4 Jill 1.6 MICROCOPY RESOLUTION TEST CHART NATIONAt BIURIA OF gMANI£ IWOI) A LEVEL AD SAI-80-113-WA AN ASSESSMENT OF THE HYPOTHETICAL IMPACTo OF...potential loss of unit effectiveness in each of these units. The resulting measure of unit effectiveness provides a powerful analy- tic tool for comparing

  4. Developing a Hypothetical Multi-Dimensional Learning Progression for the Nature of Matter

    Science.gov (United States)

    Stevens, Shawn Y.; Delgado, Cesar; Krajcik, Joseph S.

    2010-01-01

    We describe efforts toward the development of a hypothetical learning progression (HLP) for the growth of grade 7-14 students' models of the structure, behavior and properties of matter, as it relates to nanoscale science and engineering (NSE). This multi-dimensional HLP, based on empirical research and standards documents, describes how students…

  5. Can a Repeated Opt-Out Reminder remove hypothetical bias in discrete choice experiments?

    DEFF Research Database (Denmark)

    Alemu, Mohammed Hussen; Olsen, Søren Bøye

    Recent papers have suggested that use of a so-called Repeated Opt-Out Reminder (ROOR) might mitigate hypothetical bias in stated Discrete Choice Experiments (DCE), but evidence so far has only been circumstantial. We provide the first comprehensive test of whether a ROOR can actually mitigate...

  6. What We Say and What We Do: The Relationship between Real and Hypothetical Moral Choices

    Science.gov (United States)

    FeldmanHall, Oriel; Mobbs, Dean; Evans, Davy; Hiscox, Lucy; Navrady, Lauren; Dalgleish, Tim

    2012-01-01

    Moral ideals are strongly ingrained within society and individuals alike, but actual moral choices are profoundly influenced by tangible rewards and consequences. Across two studies we show that real moral decisions can dramatically contradict moral choices made in hypothetical scenarios (Study 1). However, by systematically enhancing the…

  7. The impact of arbitrarily applicable relational responding on evaluative learning about hypothetical money and shock outcomes.

    Science.gov (United States)

    Dymond, Simon; Molet, Mikael; Davies, Lynette

    2017-08-01

    Evaluative learning comprises changes in preferences after co-occurrences between conditioned stimuli (CSs) and an unconditioned stimulus (US) of affective value. Co-occurrences may involve relational responding. Two experiments examined the impact of arbitrary relational responding on evaluative preferences for hypothetical money and shock outcomes. In Experiment 1, participants were trained to make arbitrary relational responses by placing CSs of the same size but different colours into boxes and were then instructed that these CSs represented different intensities of hypothetical USs (money or shock). Liking ratings of the CSs were altered in accordance with the underlying bigger/smaller than relations. A reversal of preference was also observed: the CS associated with the smallest hypothetical shock was rated more positively than the CS associated with the smallest amount of hypothetical money. In Experiment 2, procedures from Relational Frame Theory (RFT) established a relational network of more than/less than relations consisting of five CSs (A-B-C-D-E). Overall, evaluative preferences were altered, but not reversed, depending on (a) how stimuli had been related to one another during the learning phase and (b) whether those stimuli referred to money or shocks. The contribution of RFT to evaluative learning research is discussed.

  8. Understanding Solitude: Young Children's Attitudes and Responses toward Hypothetical Socially Withdrawn Peers

    Science.gov (United States)

    Coplan, Robert J.; Girardi, Alberta; Findlay, Leanne C.; Frohlick, Sherri L.

    2007-01-01

    The goal of the present study was to explore young children's attitudes and responses to different forms of social withdrawal by eliciting responses to hypothetical vignettes. Participants included 137 children (49 boys, 88 girls) in kindergarten and grade 1 classes (M[subscript age] = 75.94 months, SD = 9.03) in Ottawa, Canada. Parents rated…

  9. fMRI evidence of a hot-cold empathy gapin hypothetical and real aversive choices

    Directory of Open Access Journals (Sweden)

    Min Jeong Kang

    2013-06-01

    Full Text Available Hypothetical bias is the common finding that hypothetical monetary values for goods are higher than real values. We extend this research to the domain of bads such as consumer and household choices made to avoid aversive outcomes (e.g., insurance. Previous evidence of hot-cold empathy gaps suggest food disgust is likely to be strongly underestimated in hypothetical (cold choice. Depending on relative underestimation of food disgust and pain of spending, the hypothetical bias for aversive bads can go in the typical direction for goods, disappear, or reverse in sign. We find that the bias is reversed in sign—subjects pay more to avoid bads when choice is real. fMRI shows that real choice more strongly activates striatum and medial prefrontal cortex (reward regions and shows distinct activity in insula and amygdala (disgust and fear regions. The neural findings suggest ways to exogeneously manipulate or record brain activity in order to create better forecasts of actual consumer choice.

  10. Consequences in Norway after a hypothetical accident at Sellafield - Predicted impacts on the environment.

    Energy Technology Data Exchange (ETDEWEB)

    Thoerring, H.; Liland, A.

    2010-12-15

    This report deals with the environmental consequences in Norway after a hypothetical accident at Sellafield. The investigation is limited to the terrestrial environment, and focus on animals grazing natural pastures, plus wild berries and fungi. Only 137Cs is considered. The predicted consequences are severe, in particular for mutton and goat milk production. (Author)

  11. Physicians' willingness to grant requests for assistance in dying for children: a study of hypothetical cases

    NARCIS (Netherlands)

    Vrakking, A.M.; Heide, van der A.; Looman, C.W.; Delden, van J.J.M.; Philipsen, B.D.; Maas, van der P.J.; Wal, van der G.

    2005-01-01

    OBJECTIVE: To study the willingness of Dutch physicians to use potentially life-shortening or lethal drugs for severely ill children. STUDY DESIGN: We asked 63 pediatricians about their approach to 10 hypothetical cases of children with cancer. The age of the child (15, 11, or 6 years), the child's

  12. Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

    2009-01-31

    This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

  13. CRIMINAL LIABILITY FOR ORGANIZING TERRORIST COMMUNITY AND PARTICIPATION IN IT AS A DIRECTION NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Z. K. KONDRATENKO

    2016-01-01

    Full Text Available The aim of the present work is to develop a comprehensive scientific understanding of the criminal responsibility for a terrorist organization and community participation in it as the directions of national security. To achieve this goal the author was raised a number of scientific tasks, in particular the study of certain provisions of the National Security Strategy, the main threats to the state and public security of the Russian Federation, the main directions of ensuring state and public security, public areas and ensuring public safety. In the study, the author used scientific methods (hypothesis, analysis, synthesis, deduction, and induction, special used historical, legal and technical, interdisciplinary, comparative legal, system and other methods of scientific knowledge. The author researches of the problems of qualification of crimes related to the terrorist organization and community participation in it are discussed in detail. The article analyzes the modern jurisprudence on the application of Article 205.4 and 205.5 of the Criminal Code of the Russian Federation. The author examines the conditions of qualification criminal groups as a terrorist or terrorist organization community. The author comes to the conclusion about the need to improve the legal regulation of criminal responsibility for the commission of terrorist-related crimes. So, the author proposes to supplement the dispositions of article 205.4 of the Criminal Code of the Russian Federation indicating that the terrorist community a stable group of persons can be considered, united not only in Russia, but also in other states as well as international organizations, concerned other grounds specified in Art. 205.4 of the Criminal Code. The author considers it necessary to clarify the question of qualification of crimes under Art. 205.4 and 205.5 of the Criminal Code of the Russian Federation in the Resolution of the Plenum of the Russian

  14. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  15. 体育恐怖袭击事件探析%Analysis of Sports Terrorist Attacks

    Institute of Scientific and Technical Information of China (English)

    刘松

    2014-01-01

    通过对体育赛事中发生的恐怖袭击事件进行梳理,探析重大体育恐怖袭击事件发生的特征与深层次原因,发现:政治霸权与政治纷争是体育恐怖袭击事件发生的本质原因;体育赛事的高影响度是体育恐怖袭击事件发生的主要原因;不同体育文明冲突与意识形态是体育恐怖袭击事件发生的重要原因。提出预防和消除体育恐怖袭击事件的对策:全球共同努力建立公正合理的国际政治经济新秩序;发挥体育推动世界和平共处与社会和谐发展的功能;加强大型体育赛事的安保措施。%Through the terrorist attacks on sporting events to sort out, characteristic of major sporting events of the terrorist attacks and the deep-seated reasons, found that:political hegemony and political strife is the essential rea-son for sporting events of the terrorist attacks;High Impact sporting events is the main reason sports terrorist attacks;the clash of civilizations and ideologies of different sports is an important cause of sports terrorist attacks occurred. Proposed to prevent and eliminate terrorist attacks coun-termeasures sports:a global effort to establish a fair and rational new international political and economic order;play sports to promote peaceful coexistence and harmoni-ous social development of the world functions;strengthen security measures of major sports events.

  16. LC-MS/MS based proteomic analysis and functional inference of hypothetical proteins in Desulfovibrio vulgaris.

    Science.gov (United States)

    Zhang, Weiwen; Culley, David E; Gritsenko, Marina A; Moore, Ronald J; Nie, Lei; Scholten, Johannes C M; Petritis, Konstantinos; Strittmatter, Eric F; Camp, David G; Smith, Richard D; Brockman, Fred J

    2006-11-03

    High efficiency capillary liquid chromatography-tandem mass spectrometry (LC-MS/MS) was used to examine the proteins extracted from Desulfovibrio vulgaris cells across six treatment conditions. While our previous study provided a proteomic overview of the cellular metabolism based on proteins with known functions [W. Zhang, M.A. Gritsenko, R.J. Moore, D.E. Culley, L. Nie, K. Petritis, E.F. Strittmatter, D.G. Camp II, R.D. Smith, F.J. Brockman, A proteomic view of the metabolism in Desulfovibrio vulgaris determined by liquid chromatography coupled with tandem mass spectrometry, Proteomics 6 (2006) 4286-4299], this study describes the global detection and functional inference for hypothetical D. vulgaris proteins. Using criteria that a given peptide of a protein is identified from at least two out of three independent LC-MS/MS measurements and that for any protein at least two different peptides are identified among the three measurements, 129 open reading frames (ORFs) originally annotated as hypothetical proteins were found to encode expressed proteins. Functional inference for the conserved hypothetical proteins was performed by a combination of several non-homology based methods: genomic context analysis, phylogenomic profiling, and analysis of a combination of experimental information, including peptide detection in cells grown under specific culture conditions and cellular location of the proteins. Using this approach we were able to assign possible functions to 20 conserved hypothetical proteins. This study demonstrated that a combination of proteomics and bioinformatics methodologies can provide verification of the expression of hypothetical proteins and improve genome annotation.

  17. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    Directory of Open Access Journals (Sweden)

    Russell L. Bennett

    2006-03-01

    Full Text Available The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11 and the tragic incidents involving twentythree people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection

  18. A Comparative View of Terrorist Acts and Legislative Measures Countering this Phenomenon in Albania and the United States of America

    OpenAIRE

    Lirime Çukaj

    2013-01-01

    Terrorist acts have been a worrisome phenomenon for all nations. Paradoxically, although states have been conscious about the danger of this phenomenon, there is no definition of terrorist acts so far. States have been skeptical and they have not agreed that the judgment of these criminal offences be performed by international jurisdictions, thus opting for the domestic jurisdiction. Nevertheless, states have lacked the willingness to establish joint criminal policies and find efficacious mea...

  19. Disrupting Threat Finances: Utilization of Financial Information to Disrupt Terrorist Organization in the Twenty-First Century

    Science.gov (United States)

    2007-04-01

    Affairs, “The State Department Role in Combating the Financing of Terrorism,” 4 April 2006, Available from http://www.state.gov/e/ eeb /rls/rm/2006/ 64109... EEB ) has primary responsibility for international coalition building.99 In addition, DOS has several other bureaus and offices that manage various...programs and activities that help combat terrorist financing.100 EEB : EEB maintains the leadership role in the IA effort to combat terrorist financing

  20. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-08-11

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  1. Psychological interventions for terroristic trauma: prevention, crisis management, and clinical treatment strategies.

    Science.gov (United States)

    Miller, Laurence

    2011-01-01

    Terrorist attacks combine features of a criminal assault, a mass casualty disaster and an act of war Accordingly, this article presents a model for prevention, response and recovery from the psychological impact of a terror attack. The nature of terrorism is delineated and the various psychological effects are described, including diagnostic clinical syndromes, as well as individual reactions. Interventions in the immediate aftermath of a terrorist attack include on-scene crisis intervention, short-term psychological stabilization, and longer-term psychotherapeutic approaches. Special techniques are described for individuals, families, children, and large groups of survivors and responders. Finally, the ways that mental health clinicians can serve as valuable consultants to community recovery efforts are discussed.

  2. Optimizing topological cascade resilience based on the structure of terrorist networks.

    Directory of Open Access Journals (Sweden)

    Alexander Gutfraind

    Full Text Available Complex socioeconomic networks such as information, finance and even terrorist networks need resilience to cascades--to prevent the failure of a single node from causing a far-reaching domino effect. We show that terrorist and guerrilla networks are uniquely cascade-resilient while maintaining high efficiency, but they become more vulnerable beyond a certain threshold. We also introduce an optimization method for constructing networks with high passive cascade resilience. The optimal networks are found to be based on cells, where each cell has a star topology. Counterintuitively, we find that there are conditions where networks should not be modified to stop cascades because doing so would come at a disproportionate loss of efficiency. Implementation of these findings can lead to more cascade-resilient networks in many diverse areas.

  3. Experiences from coordinating research after the 2011 terrorist attacks in Norway.

    Science.gov (United States)

    Refsdal, Nils O

    2014-01-01

    This brief report presents some of the lessons learned from coordinating research in which people directly affected by terrorist attacks in Norway in 2011 are taking part. After the terrorist attacks, it was decided to establish a national coordinating function in order to protect those who were affected when they participate in research. By gathering key stakeholders, it is possible to avoid duplication of research through practical measures such as information sharing, facilitating cooperation, and working toward sharing of data. In addition, a coordinating function provides a platform for working to increase the impact of the research among practitioners and policy makers, and inform the general public. The conclusions are that coordination should be interdisciplinary, that it is important to plan for the sharing and reuse of data, and that both the research community and the research infrastructure should take steps to improve preparedness when disaster inevitably strikes again.

  4. A Systematic Review of the Literature on Posttraumatic Stress Disorder in Victims of Terrorist Attacks.

    Science.gov (United States)

    Paz García-Vera, María; Sanz, Jesús; Gutiérrez, Sara

    2016-08-01

    This article was aimed at systematically reviewing the literature on posttraumatic stress disorder (PTSD) among victims of terrorist attacks. Electronic and hand searches of the literature identified 35 studies addressing PTSD prevalence based on validated diagnostic interviews. Overall, in the year after terrorist attacks, 33% to 39% of direct victims developed PTSD, whereas the percentage of indirect victims with PTSD was lower (4% in the affected community, 5%-6% among emergency, rescue, and recovery workers, and 17%-29% among relatives and friends of the injured or killed victims), but nonetheless above the prevalence in the general population. With the passing of time, a significant reduction of PTSD can be expected in the affected community and in the emergency and rescue personnel, but not in the injured victims, in the relatives and friends of the injured or killed victims, and in nontraditional, more vulnerable disaster workers. The implications of these results for the psychological treatment of terrorism victims are discussed.

  5. Case Studies in Exploiting Terrorist Group Divisions with Disinformation and Divisive/Black Propaganda

    Directory of Open Access Journals (Sweden)

    George Garner

    2010-07-01

    Full Text Available Counterterrorism operations should be exploiting the divisions and infighting of terrorist groups.  The overall goal should be to make fewer mistakes than the jihadis, help increase inter-group and intra-group tension, and further their disconnection from the wider public. This paper argues that strategic psychological operations (PSYOP that focus on exploiting rifts in leadership, differences in strategic planning, and ethnic, national and tribal differences within and among terrorist groups could be an integral part of overall counterterrorism efforts. Using three case studies, chosen because of the attention given to them in the international community and the illuminating group and leadership characteristics that can be found in many other jihadist organisations, the paper illustrates that PSYOP that expand on the existing framework could be very effective in countering the jihadist threat.

  6. The process of institutionalising the EU’s anti-terrorist policy

    Directory of Open Access Journals (Sweden)

    Javier Argomaniz

    2010-09-01

    Full Text Available This article applies the perspective of historical institutionalism to the empirical analysis of the motors and characteristics of the institutionalisation process of the European Union’s anti-terrorist policies. Based on a theoretical model developed by Stone Sweet, Sandholtz and Fligstein, this contribution critically analyses the impact of external crises in the form of a series of terrorist attacks on the emergence of antiterrorism as an sphere of European governance. The article also examines political developments and key institutions, studies the role of policy entrepreneurs during this period and compares the importance of “revolutionary” and “evolutionist” perspectives to our understanding of the process of institutional change in this field.

  7. Optimizing Topological Cascade Resilience Based on the Structure of Terrorist Networks

    Science.gov (United States)

    Gutfraind, Alexander

    2010-01-01

    Complex socioeconomic networks such as information, finance and even terrorist networks need resilience to cascades - to prevent the failure of a single node from causing a far-reaching domino effect. We show that terrorist and guerrilla networks are uniquely cascade-resilient while maintaining high efficiency, but they become more vulnerable beyond a certain threshold. We also introduce an optimization method for constructing networks with high passive cascade resilience. The optimal networks are found to be based on cells, where each cell has a star topology. Counterintuitively, we find that there are conditions where networks should not be modified to stop cascades because doing so would come at a disproportionate loss of efficiency. Implementation of these findings can lead to more cascade-resilient networks in many diverse areas. PMID:21085710

  8. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  9. The quest for significance model of radicalization: implications for the management of terrorist detainees.

    Science.gov (United States)

    Dugas, Michelle; Kruglanski, Arie W

    2014-01-01

    Radicalization and its culmination in terrorism represent a grave threat to the security and stability of the world. A related challenge is effective management of extremists who are detained in prison facilities. The major aim of this article is to review the significance quest model of radicalization and its implications for management of terrorist detainees. First, we review the significance quest model, which elaborates on the roles of motivation, ideology, and social processes in radicalization. Secondly, we explore the implications of the model in relation to the risks of prison radicalization. Finally, we analyze the model's implications for deradicalization strategies and review preliminary evidence for the effectiveness of a rehabilitation program targeting components of the significance quest. Based on this evidence, we argue that the psychology of radicalization provides compelling reason for the inclusion of deradicalization efforts as an essential component of the management of terrorist detainees. Copyright © 2014 John Wiley & Sons, Ltd.

  10. Framework for Research on Children’s Reactions to Disasters and Terrorist Events

    OpenAIRE

    Pfefferbaum, Betty; Noffsinger, Mary A.; Sherrieb, Kathleen; Norris, Fran H.

    2012-01-01

    Clinical work and research relative to child mental health during and following disaster are especially challenging due to the complex child maturational processes and family and social contexts of children’s lives. The effects of disasters and terrorist events on children and adolescents necessitate diligent and responsible preparation and implementation of research endeavors. Disasters present numerous practical and methodological barriers that may influence the selection of participants, t...

  11. The Study of New Religious Movements and the Process of Radicalization in Terrorist Groups

    Science.gov (United States)

    2009-11-01

    persona ; (2) moderating the psychological identification of followers; (3) negotiating the routinization of charisma; and (4) achieving new successes. In...des formes réelles ou même relatives de privation. Au dire de deux sociologues bien connus dans le domaine de la religion, les cultes qui ont bien ...quand ils se tournent vers la violence et la socialisation des nouveaux membres de groupes terroristes. 6) Croyances apocalyptiques : Bien qu’en

  12. Countering Terrorist Financing: A Case Study of the Kurdistan Workers Party (PKK)

    Science.gov (United States)

    2014-12-01

    FINANCING: A CASE STUDY OF THE KURDISTAN WORKERS’ PARTY (PKK) by Mehmet A. Kanmaz December 2014 Thesis Advisor: Victoria Clement...DATES COVERED December 20 14 Master ’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS COUNTERING TERRORIST FINANCING: A CASE STUDY OF THE KURDISTAN ...on a specific tetTorist organization, the Kurdistan Workers ’ Party (PKK), which has been a problem in Turkey for over 30 years. The study

  13. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  14. Analysis of Protection Measures for Naval Vessels Berthed at Harbor Against Terrorist Attacks

    Science.gov (United States)

    2016-06-01

    by the Mexican Navy to prevent terrorist attacks on the strategic Campeche Sound (petroleum production area) in the Gulf of Mexico. Martinez used... visualization techniques (Lucas, Kelton, Sanchez, Sanchez, & Anderson, 2015). After choosing factors and the ranges of these factors to explore, an...accurate map possible would be the territory, and thus would be perfectly accurate and perfectly useless. — Neil Gaiman, American Gods “One of the

  15. TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH, SESSION VIII: TECHNOLOGY FORUM FOCUS GROUPS.

    Energy Technology Data Exchange (ETDEWEB)

    INDUSI,J.P.

    2003-06-16

    Since the events of 9/11, there have been considerable concerns and associated efforts to prevent or respond to acts of terrorism. Very often we hear calls to reduce the threat from or correct vulnerabilities to various terrorist acts. Others fall victim to anxiety over potential scenarios with the gravest of consequences involving hundreds of thousands of casualties. The problem is complicated by the fact that planners have limited, albeit in some cases significant, resources and less than perfect intelligence on potential terrorist plans. However, valuable resources must be used prudently to reduce the overall risk to the nation. A systematic approach to this process of asset allocation is to reduce the overall risk and not just an individual element of risk such as vulnerabilities. Hence, we define risk as a function of three variables: the threat (the likelihood and scenario of the terrorist act), the vulnerability (the vulnerability of potential targets to the threat), and the consequences (health and safety, economic, etc.) resulting from a successful terrorist scenario. Both the vulnerability and consequences from a postulated adversary scenario can be reasonably well estimated. However, the threat likelihood and scenarios are much more difficult to estimate. A possible path forward is to develop scenarios for each potential target in question using experts from many disciplines. This should yield a finite but large number of target-scenario pairs. The vulnerabilities and consequences for each are estimated and then ranked relative to one another. The resulting relative risk ranking will have targets near the top of the ranking for which the threat is estimated to be more likely, the vulnerability greatest, and the consequences the most grave. In the absence of perfect intelligence, this may be the best we can do.

  16. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  17. Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks

    Science.gov (United States)

    2006-12-01

    None of these studies used advanced data mining technologies that have been applied widely in other domains such as finance , marketing, and business to...different kinds of criminal networks, for example in financing terrorists by illegal diamond and drug trafficking. Recently, computer scientists have...Complex Networks can help in developing Strategy against Terrorism, Chaos, Solitons and Fractals 20, 69-75 (2004) [28] Bali Night Club Bombing

  18. Decomposing violence: terrorist murder in the twentieth century in the U.S.

    OpenAIRE

    Gomez-Sorzano, Gustavo

    2006-01-01

    Abstract: I apply the Beveridge-Nelson business cycle decomposition method to the time series of murder in the United States (1900-2004). Separating out “permanent” from “cyclical” murder, I hypothesize that the cyclical part coincides with documented waves of organized crime, internal tensions, breakdowns in social order, crime legislation, alternation in power, social, and political unrest overseas as wars, and recently with the periodic terrorist attacks in the country. The cyclical com...

  19. The terrorist threat to the UK in the post–9/11 decade

    OpenAIRE

    Sir David Omand

    2012-01-01

    The overall task for this special issue is to assess the emergency response to terrorism, in particular the threat posed by violent jihadist terrorism. Clearly, planning for emergency responses will have value against other threats and hazards, so it will be difficult to separate out the arrangements made to deal specifically with the aftermath of terrorist attacks, and those to meet other emergencies, for example major natural disasters. A sense of proportion is also needed when examining te...

  20. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    Security Strategy contains a goal labeled “Champion Aspirations for Human Dignity.”2 When a boat filled with women and children leaves the shores of a...are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists...Eurasian countries are rife with human trafficking violations. Human trafficking occurs when men, women and children are procured, transported and then

  1. Internet Posting of Chemical "Worst Case" Scenarios: A Roadmap for Terrorists

    Science.gov (United States)

    1999-02-10

    cal personnel into crisis areas. Panic spreads as vaccines and antibiotics run short— and then run out. The killer is a hybrid of smallpox and the...groups, religious fanatics, and assorted crazies eager to launch a major attack on the civilized world—preferably on U.S. territory. Walter Laqueur...terrorists possess political objectives, whether Basque independence, Kash- miri separatism, or Palestinian Marxism. Neither crazy nor stupid, they

  2. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat.

    Science.gov (United States)

    Ackerman, Gary A; Zhuang, Jun; Weerasuriya, Sitara

    2017-02-01

    This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists' collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision-making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right-wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right- or left-wing extremists. The game-theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed.

  3. Styles of International Mediation in Peace Processes Between States and Terrorist Organizations

    Science.gov (United States)

    2016-06-01

    way, both culturally and historically.40 Zartman and Faure seem to have a broader perspective on negotiating with terrorists, and they recommend...ensure that the leadership will actually 63 Glenn E. Robinson, “Palestine Liberation Organization,” The Oxford Encyclopedia of the Islamic World, Oxford...2007. Robinson, Glenn E. “Palestine Liberation Organization.” The Oxford Encyclopedia of the Islamic World. Oxford Islamic Studies Online. Accessed 4

  4. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  5. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  6. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  7. Stock Market Reaction to Terrorist Attacks: Empirical Evidence from a Front Line State

    Directory of Open Access Journals (Sweden)

    Muhammad Tahir Suleman

    2012-03-01

    Full Text Available The world financial markets have reacted in a highly consistent pattern to the incident of 9/11 in the United States, suicide blasts at night clubs at Bali in 2002, the Madrid and London train bombings in 2004-2005 and a series of continuous blasts and suicide attacks in Pakistan. In this study, we examined the effect of terrorist attack news on returns and volatility for the Karachi Stock Exchange. We employ the EGARCH model proposed by Engle and Ng (1993as it allows good and bad news to have a different impact on volatility. Our results indicate that terrorist attack news has negative impact on the returns of all the sector indices. However, news of these events increased the volatility of KSE100 index and financial sector index. Further it is concluded that the results of oil and gas, and industry are not statistically significant in response to terrorist attack news, indicating that such type of news does not affect the volatility of these two sectors. Moreover, volatility asymmetry is negative in all of the sectors including KSE100 confirming leverage effect.

  8. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  9. The Representation of Islam in Western Media: The Coverage of Norway Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Emad A. Alghamdi

    2015-05-01

    Full Text Available Undeniably mass media have become the primary source of information and communication for the majority of, if not all, members of modern societies. The nature of the information thus communicated and the manner in which it is dispensed through media certainly have a profound influence on people’s perceptions of the world around them. The relation between the media, on one hand, and culture, social life, and politics on the other, is an interesting one in which media fulfills dual functions, reflecting and also shaping issues occurring within these three domains (Bell & Garrett, 1998. In the initial media coverage of the 2011 Norway terrorist attacks, some western media authors, inaccurately and unjustly, held Muslims and Islamic groups as being responsible for the attacks. Using Critical Discourse Analysis (CDA, this study seeks to ascertain how language was manipulated in this coverage of the terrorist attacks in order to give expression to blind prejudice against Islam and Muslims. As findings of the analyses reveal, the tones of allegation in these articles and reports differed dramatically from one article to another ranging from tones of mere suspicion to those of overt accusation. The varying degrees of uncertainty or assertion of the authors’ statements were reflected in the varied linguistic forms and devices used within the discourse. Keywords: Media discourse analysis, Norway terrorist attacks, Islam, Western media

  10. Children's Mental Health in the Context of Terrorist Attacks, Ongoing Threats, and Possibilities of Future Terrorism.

    Science.gov (United States)

    Comer, Jonathan S; Bry, Laura J; Poznanski, Bridget; Golik, Alejandra M

    2016-09-01

    Over the past two decades, the field has witnessed tremendous advances in our understanding of terrorism and its impacts on affected youth. It is now well established that a significant proportion of exposed youth show elevated PTSD symptoms in the months following a terrorist attack. In more recent years, research has expanded beyond confirming our understanding of the association between direct terrorism exposure and child PTSD symptoms by elucidating (a) links between terrorism exposure and non-PTSD clinical outcomes (e.g., externalizing problems, substance use), (b) individual differences associated with divergent patterns of risk and resilience, (c) the clinical correlates of media-based contact with terrorism, (d) clinical outcomes associated with exposure to recurrent terrorist attacks, and (e) exposure to extended contexts of uncertainty and the possibilities of future terrorism. Researchers studying the effects of terrorism and political violence on youth have increasingly examined a much broader range of regions in the world, affording needed opportunities to consider the generalizability of prior findings to youth living in different political contexts, in less developed regions of the world, and/or in regions with different rates of recurrent terrorism. In order to understand and, in turn, best meet the clinical needs of the majority of terrorism-affected youth across the globe, more targeted research on exposed youth is needed in developing regions of the world and regions enduring more recurrent terrorist attacks.

  11. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  12. Cost-effectiveness models for chronic obstructive pulmonary disease : cross-model comparison of hypothetical treatment scenarios

    NARCIS (Netherlands)

    Hoogendoorn, Martine; Feenstra, Talitha L; Asukai, Yumi; Borg, Sixten; Hansen, Ryan N; Jansson, Sven-Arne; Samyshkin, Yevgeniy; Wacker, Margarethe; Briggs, Andrew H; Lloyd, Adam; Sullivan, Sean D; Rutten-van Mölken, Maureen P M H

    2014-01-01

    OBJECTIVES: To compare different chronic obstructive pulmonary disease (COPD) cost-effectiveness models with respect to structure and input parameters and to cross-validate the models by running the same hypothetical treatment scenarios. METHODS: COPD modeling groups simulated four hypothetical inte

  13. Retro-information in Wheeler-Feynman Universe Model: Applications Over an Hypothetical Concept in Quantum Mechanics

    OpenAIRE

    Jacquet, Philippe; Joly, Véronique

    1998-01-01

    Twisting the non-locality concept in quantum mechanics we introduce the hypothetical concept of retro-information. We analyse the effect of paradoxal coupling on source of retro-information in order to quantify the new means of computing that could be derived from such an hypothetical concept.

  14. Is Silence Golden? Elementary School Teachers' Strategies and Beliefs regarding Hypothetical Shy/Quiet and Exuberant/Talkative Children

    Science.gov (United States)

    Coplan, Robert J.; Hughes, Kathleen; Bosacki, Sandra; Rose-Krasnor, Linda

    2011-01-01

    The primary goal of the present study was to examine elementary teachers' strategies, attitudes, and beliefs regarding hypothetical shy (i.e., quiet), exuberant (i.e., overly talkative), and average (i.e., typical) children. We explored whether these strategies and beliefs varied as a function of the gender of the hypothetical child as well as…

  15. A randomized controlled effectiveness trial of cognitive behavior therapy for post-traumatic stress disorder in terrorist-affected people in Thailand

    OpenAIRE

    Bryant, Richard A.; EKASAWIN, SUPARAT; CHAKRABHAND, SOMCHAI; SUWANMITRI, SOAWALUK; DUANGCHUN, ORAWAN; CHANTALUCKWONG, THANANET

    2011-01-01

    Although cognitive behaviour therapy (CBT) is the treatment of choice for post-traumatic stress disorder (PTSD), there is no evidence of its success with PTSD patients still under direct threat of terrorist attacks. This study reports the first randomized controlled trial of CBT for PTSD terrorist-affected people. Twenty-eight survivors of terrorist attacks in southern Thailand were randomized to 8 sessions of either CBT or treatment as usual (TAU). CBT was modified to accom...

  16. Practising of radiological emergency caused by a terrorist attack; Ejercicio de emergencia radiologica ocasionada por un atentado terrorista

    Energy Technology Data Exchange (ETDEWEB)

    Racana, R.; Terrado, C. [Autoridad Regulatoria Nuclear, Av. Del Libertador 8250, Buenos Aires (Argentina)]. e-mail: rrcana@sede.ar.gov.ar

    2006-07-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  17. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  18. The marginal willingness-to-pay for attributes of a hypothetical HIV vaccine.

    Science.gov (United States)

    Cameron, Michael P; Newman, Peter A; Roungprakhon, Surachet; Scarpa, Riccardo

    2013-08-12

    This paper estimates the marginal willingness-to-pay for attributes of a hypothetical HIV vaccine using discrete choice modeling. We use primary data from 326 respondents from Bangkok and Chiang Mai, Thailand, in 2008-2009, selected using purposive, venue-based sampling across two strata. Participants completed a structured questionnaire and full rank discrete choice modeling task administered using computer-assisted personal interviewing. The choice experiment was used to rank eight hypothetical HIV vaccine scenarios, with each scenario comprising seven attributes (including cost) each of which had two levels. The data were analyzed in two alternative specifications: (1) best-worst; and (2) full-rank, using logit likelihood functions estimated with custom routines in Gauss matrix programming language. In the full-rank specification, all vaccine attributes are significant predictors of probability of vaccine choice. The biomedical attributes of the hypothetical HIV vaccine (efficacy, absence of VISP, absence of side effects, and duration of effect) are the most important attributes for HIV vaccine choice. On average respondents are more than twice as likely to accept a vaccine with 99% efficacy, than a vaccine with 50% efficacy. This translates to a willingness to pay US$383 more for a high efficacy vaccine compared with the low efficacy vaccine. Knowledge of the relative importance of determinants of HIV vaccine acceptability is important to ensure the success of future vaccination programs. Future acceptability studies of hypothetical HIV vaccines should use more finely grained biomedical attributes, and could also improve the external validity of results by including more levels of the cost attribute.

  19. The Ability of Children With Language Impairment to Dissemble Emotions in Hypothetical Scenarios and Natural Situations.

    Science.gov (United States)

    Brinton, Bonnie; Fujiki, Martin; Hurst, Noel Quist; Jones, Emily Rowberry; Spackman, Matthew P

    2015-10-01

    This study examined the ability of children with language impairment (LI) to dissemble (hide) emotional reactions when socially appropriate to do so. Twenty-two children with LI and their typically developing peers (7;1-10;11 [years;months]) participated in two tasks. First, participants were presented with hypothetical scenarios in which the main character was exposed to situations that would require dissembling an emotional reaction for social purposes (e.g., receiving a disappointing gift from a grandparent). In the second task, children were presented with four naturally occurring opportunities to dissemble emotion (e.g., receiving a disappointing reward for taking part in the study). Although the ability to dissemble emotion was still emerging in children in both groups, typically developing children judged that dissemblance was appropriate significantly more often than did children with LI in the hypothetical scenarios. In naturalistic scenarios, there was little difference between groups in low-cost scenarios (those in which the child had nothing to lose by hiding emotion). In the high-cost scenario (hiding emotion meant accepting a disappointing prize), more typically developing children concealed their disappointment than did children with LI. These differences neared statistical significance (p = .058). Children with typically developing language showed a greater ability to dissemble in hypothetical scenarios. In naturalistic scenarios, performance was more nuanced. In low-cost scenarios, there was little difference between groups. In the high-cost scenario, typically developing children tended to dissemble more often than did children with LI.

  20. Parent and medical professional willingness to enroll children in a hypothetical pediatric optic neuritis treatment trial

    Directory of Open Access Journals (Sweden)

    Amy eWaldman

    2011-11-01

    Full Text Available The Optic Neuritis Treatment Trial and subsequent studies have had a tremendous impact on the treatment and prognosis of optic neuritis and multiple sclerosis in adults. The results of these studies have been extrapolated to children; however, pediatric data are sparse. Using the method of prospective preference assessment, the willingness of parents and medical professionals to enroll children in a hypothetical Pediatric Optic Neuritis Treatment Trial was assessed using a mock consent form and questionnaire. A 3-arm trial was proposed: 1 intravenous corticosteroids, 2 high-dose oral corticosteroids, and 3 an oral placebo. The forms were completed by 198 parents and 49 physicians. After reviewing the hypothetical scenario, trial design, risks and benefits, and alternatives to the study, 21% of parents would enroll their children in the trial whereas 98% of medical professionals would enroll their patients. With medical professional recommendation, 43% of parents would enroll their children. The manner in which this hypothetical trial was presented to parents, specifically with respect to the recommendation of their child’s health care team, influenced a parent’s willingness to participate.

  1. In Silico Structural and Functional Annotation of Hypothetical Proteins of Vibrio cholerae O139

    Science.gov (United States)

    Islam, Md. Saiful; Shahik, Shah Md.; Sohel, Md.; Patwary, Noman I. A.

    2015-01-01

    In developing countries threat of cholera is a significant health concern whenever water purification and sewage disposal systems are inadequate. Vibrio cholerae is one of the responsible bacteria involved in cholera disease. The complete genome sequence of V. cholerae deciphers the presence of various genes and hypothetical proteins whose function are not yet understood. Hence analyzing and annotating the structure and function of hypothetical proteins is important for understanding the V. cholerae. V. cholerae O139 is the most common and pathogenic bacterial strain among various V. cholerae strains. In this study sequence of six hypothetical proteins of V. cholerae O139 has been annotated from NCBI. Various computational tools and databases have been used to determine domain family, protein-protein interaction, solubility of protein, ligand binding sites etc. The three dimensional structure of two proteins were modeled and their ligand binding sites were identified. We have found domains and families of only one protein. The analysis revealed that these proteins might have antibiotic resistance activity, DNA breaking-rejoining activity, integrase enzyme activity, restriction endonuclease, etc. Structural prediction of these proteins and detection of binding sites from this study would indicate a potential target aiding docking studies for therapeutic designing against cholera. PMID:26175663

  2. Structural and functional analysis of hypothetical and conserved proteins of Clostridium tetani.

    Science.gov (United States)

    Enany, Shymaa

    2014-01-01

    The progress in biological technologies has led to rapid accumulation of microbial genomic sequences with a vast number of uncharacterized genes. Proteins encoded by these genes are usually uncharacterized, hypothetical, and/or conserved. In Clostridium tetani (C. tetani), these proteins constitute up to 50% of the expressed proteins. In this regard, understanding the functions and the structures of these proteins is crucially important, particularly in C. tetani, which is a medically important pathogen. Here, we used a variety of bioinformatics tools and databases to analyze 10 hypothetical and conserved proteins in C. tetani. We were able to provide a detailed overview of the functional contributions of some of these proteins in several cellular functions, including (1) evolving antibiotic resistance, (2) interaction with enzymes pathways, and (3) involvement in drug transportation. Among these candidates, we postulated the involvement of one of these hypothetical proteins in the pathogenic activity of tetanus. The structural and functional prediction of these proteins should serve in uncovering and better understanding the function of C. tetani cells to ultimately discover new possible drug targets.

  3. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  4. A Comparative View of Terrorist Acts and Legislative Measures Countering this Phenomenon in Albania and the United States of America

    Directory of Open Access Journals (Sweden)

    Lirime Çukaj

    2013-07-01

    Full Text Available Terrorist acts have been a worrisome phenomenon for all nations. Paradoxically, although states have been conscious about the danger of this phenomenon, there is no definition of terrorist acts so far. States have been skeptical and they have not agreed that the judgment of these criminal offences be performed by international jurisdictions, thus opting for the domestic jurisdiction. Nevertheless, states have lacked the willingness to establish joint criminal policies and find efficacious means to combat these terrorist acts. One of these efficacious means has been the seizure and confiscation of licit and illicit assets possessed by terrorist groups. This is the focus of this short study, which will be inclusive by viewing this topic under the general framework of international acts, our domestic legislation, as well as the American one. This paper aims at presenting the legislative measures taken by the Albanian state to meet international requirements. It endeavors to provide arguments why all licit and illicit assets associated with terrorist acts are seized and confiscated. Special attention is paid to the way these assets are administered. Moreover, this study tries to analyze the achievements and problems in Albania, as well as provide conclusions and recommendations.

  5. Action semantics modulate action prediction.

    Science.gov (United States)

    Springer, Anne; Prinz, Wolfgang

    2010-11-01

    Previous studies have demonstrated that action prediction involves an internal action simulation that runs time-locked to the real action. The present study replicates and extends these findings by indicating a real-time simulation process (Graf et al., 2007), which can be differentiated from a similarity-based evaluation of internal action representations. Moreover, results showed that action semantics modulate action prediction accuracy. The semantic effect was specified by the processing of action verbs and concrete nouns (Experiment 1) and, more specifically, by the dynamics described by action verbs (Experiment 2) and the speed described by the verbs (e.g., "to catch" vs. "to grasp" vs. "to stretch"; Experiment 3). These results propose a linkage between action simulation and action semantics as two yet unrelated domains, a view that coincides with a recent notion of a close link between motor processes and the understanding of action language.

  6. [And if it happened to children? Adapting medical care during terrorist attacks with multiple pediatric victims].

    Science.gov (United States)

    Alix-Séguin, L; Lodé, N; Orliaguet, G; Chamorro, E; Kerroué, F; Lorge, C; Moreira, A

    2017-03-01

    In light of the recent terrorist attacks in Europe, we need to reconsider the organization of rescue and medical management and plan for an attack involving multiple pediatric victims. To ensure quick surgical management, but also to minimize risk for on-site teams (direct threats from secondary terrorist attacks targeting deployed emergency services), it is crucial to evacuate patients in a swift but orderly fashion. Children are vulnerable targets in terrorist attacks. Their anatomical and physiological characteristics make it likely that pediatric victims will suffer more brain injuries and require more, often advanced, airway management. Care of multiple pediatric victims would also prove to be a difficult emotional challenge. Civilian medical teams have adapted the military-medicine principles of damage control in their medical practice using the MARCHE algorithm (Massive hemorrhage, Airway, Respiration [breathing], Circulation, Head/Hypothermia, Evacuation). They have also learned to adapt the level of care to the level of safety at the scene. Prehospital damage control principles should now be tailored to the treatment of pediatric patients in extraordinary circumstances. Priorities are given to hemorrhage control and preventing the lethal triad (coagulopathy, hypothermia, and acidosis). Managing hemorrhagic shock involves quickly controlling external bleeding (tourniquets, hemostatic dressing), using small volumes for fluid resuscitation (10-20ml/kg of normal saline), quickly introducing a vasopressor (noradrenaline 0.1μg/kg/min then titrate) after one or two fluid boluses, and using tranexamic acid (15mg/kg over 10min for loading dose, maximum 1g over 10min). Prehospital resources specifically dedicated to children are limited, and it is therefore important that everyone be trained and prepared for a scene with multiple pediatric patients.

  7. Derivation of models for nuclear weapon terrorist arming and detonation risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Parziale, A A

    1998-03-01

    This report investigates "use control" for the on-site arming and detonation, by terrorists, of stored weapon systems. We investigate both components of weapon "use control", which we define as: (1) weapon "use denial" * that we model as a probability, Pj (denial), that represents the chances that terrorists attempting to arm a type j weapon will commit a non-recoverable error, and (2) weapon "use delay" that we model as a random variable, Tj , that represents the arming delay imposed by the use control features of a type j weapon, before detonation can occur. Using information pertaining to the physical security system at a storage site, the postulated terrorist attack force size, and simulated combat engagement outcomes, we formulate the frequency, fj , and probability, P(dj ), of on-site detonation, for generic weapon types j. We derive a model that disjoins the performance of site physical security, from that for weapon use control, if the use control random variable Tj has a Uniform or histogram distribution. This is an especially significant result where most complex distributions can be adequately approximated with a histogram. Hence, we can conduct combat simulations to obtain the physical security performance of a specific storage site independent of the use control features associated with specific weapon types that are stored, or might be stored, at the site. In turn, we can obtain the use control performance for various weapon types, independent of where they are stored and the physical security systems surrounding them. Our models can then mathematically combine physical security performance and weapon use control performance for any combination of storage facility and weapon type.

  8. Sensitivity Analysis of Evacuation Speed in Hypothetical NPP Accident by Earthquake

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sung-yeop; Lim, Ho-Gon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Effective emergency response in emergency situation of nuclear power plant (NPP) can make consequences be different therefore it is regarded important when establishing an emergency response plan and assessing the risk of hypothetical NPP accident. Situation of emergency response can be totally changed when NPP accident caused by earthquake or tsunami is considered due to the failure of roads and buildings by the disaster. In this study evacuation speed has been focused among above various factors and reasonable evacuation speed in earthquake scenario has been investigated. Finally, sensitivity analysis of evacuation speed in hypothetical NPP accident by earthquake has been performed in this study. Evacuation scenario can be entirely different in the situation of seismic hazard and the sensitivity analysis of evacuation speed in hypothetical NPP accident by earthquake has been performed in this study. Various references were investigated and earthquake evacuation model has been developed considering that evacuees may convert their evacuation method from using a vehicle to walking when they face the difficulty of using a vehicle due to intense traffic jam, failure of buildings and roads, and etc. The population dose within 5 km / 30 km have been found to be increased in earthquake situation due to decreased evacuation speed and become 1.5 - 2 times in the severest earthquake evacuation scenario set up in this study. It is not agreed that using same emergency response model which is used for normal evacuation situations when performing level 3 probabilistic safety assessment for earthquake and tsunami event. Investigation of data and sensitivity analysis for constructing differentiated emergency response model in the event of seismic hazard has been carried out in this study.

  9. Comparison of the hypothetical 57Co brachytherapy source with the 192Ir source

    Science.gov (United States)

    Toossi, Mohammad Taghi Bahreyni; Rostami, Atefeh; Khosroabadi, Mohsen; Khademi, Sara; Knaup, Courtney

    2016-01-01

    Aim of the study The 57Co radioisotope has recently been proposed as a hypothetical brachytherapy source due to its high specific activity, appropriate half-life (272 days) and medium energy photons (114.17 keV on average). In this study, Task Group No. 43 dosimetric parameters were calculated and reported for a hypothetical 57Co source. Material and methods A hypothetical 57Co source was simulated in MCNPX, consisting of an active cylinder with 3.5 mm length and 0.6 mm radius encapsulated in a stainless steel capsule. Three photon energies were utilized (136 keV [10.68%], 122 keV [85.60%], 14 keV [9.16%]) for the 57Co source. Air kerma strength, dose rate constant, radial dose function, anisotropy function, and isodose curves for the source were calculated and compared to the corresponding data for a 192Ir source. Results The results are presented as tables and figures. Air kerma strength per 1 mCi activity for the 57Co source was 0.46 cGyh–1 cm 2 mCi–1. The dose rate constant for the 57Co source was determined to be 1.215 cGyh–1U–1. The radial dose function for the 57Co source has an increasing trend due to multiple scattering of low energy photons. The anisotropy function for the 57Co source at various distances from the source is more isotropic than the 192Ir source. Conclusions The 57Co source has advantages over 192Ir due to its lower energy photons, longer half-life, higher dose rate constant and more isotropic anisotropic function. However, the 192Ir source has a higher initial air kerma strength and more uniform radial dose function. These properties make 57Co a suitable source for use in brachytherapy applications. PMID:27688731

  10. Baseline for Monitoring Water Resources Along Kabul and Indus Rivers of Pakistan for Potential Terrorist Contamination

    Science.gov (United States)

    Hamidullah, S.; Tariq, S.; Shah, M. T.; Bishop, M. P.; Kamp, U.; Olsenholler, J.

    2002-05-01

    Baseline for Monitoring Water Resources Along Kabul and Indus Rivers of Pakistan for Potential Terrorist Contamination Terrorism has temporarily constrained the dynamism of the world it was enjoying before September 11, 2001, but also has opened avenues for people of all ethnicities, creeds, and professions to join hands in combating it. Scientific efforts to combat terrorism are likely to lead to better use of existing scientific knowledge as well as to discoveries that will increase world organization, interconnectivity, and peace promotion. Afghanistan and surrounding regions are major focal points for current anti-terrorist activities of the USA and its allies, including Pakistan. The United States, Pakistan, and Afghanistan have shared many similar political objectives, as well as differences, in cold war and post-cold-war eras, reflected by variable provisions of material aid. It is well recognized that understanding Afghanistan requires comprehension of the Pakistan situation as well, especially for common resources. Water is paramount because it is absolutely vital, but can be contaminated by internal or cross-border terrorism. The Kabul and Indus rivers originate in the Hindu Kush - Himalaya ranges. The Kabul River flows from Afghanistan into Pakistan, and after irrigating Peshawar basin, joins the Indus. The Indus, after its origin in Tibet and flow through the Indian Himalaya, enters Pakistan and flows south as the irrigation lifeblood of the country. Any terroristic addition of radioactive nuclides or contaminants to either river could dramatically impact the dependent riverine ecologies. Monitoring cells thus need to be established at locations in Afghanistan and Pakistan to assess base-line river variances for possible future contamination by terrorists. This paper presents a general view and the physical and chemical parameters of parts of the two rivers, and of the surrounding underground water in Peshawar Basin, including pH, conductivity, total

  11. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  12. Emergency Mental Health Services for Children After the Terrorist Attacks of September 11, 2001.

    Science.gov (United States)

    Bruckner, Tim A; Kim, Yonsu; Lubens, Pauline; Singh, Amrita; Snowden, Lonnie; Chakravarthy, Bharath

    2016-01-01

    Much literature documents elevated psychiatric symptoms among adults after the terrorist attacks of September 11, 2001 (9/11). We, however, know of no research in children that examines emergency mental health services following 9/11. We test whether children's emergency services for crisis mental health care rose above expected values in September 2001. We applied time-series methods to California Medicaid claims (1999-2003; N = 127,200 visits). Findings in California indicate an 8.7% increase of children's emergency mental health visits statistically attributable to 9/11. Non-Hispanic white more than African American children account for this acute rise in emergency services.

  13. Terrorists, Geopolitics and Kenya’s Proposed Border Wall with Somalia

    Directory of Open Access Journals (Sweden)

    Brendon John Cannon

    2016-05-01

    Full Text Available Addressing border security appears to be a plausible approach for states that suffer from terrorism. Kenya’s border wall is to keep terrorists out of Kenya. Utilizing a comparative approach, this paper explores the efficacy of border walls, particularly Kenya’s wall with Somalia. Findings show that walls rarely accomplish stated goals and have unintended consequences. In Kenya’s case, it may reignite border disputes and separate communities. The success of Kenya’s border wall is low given the high levels of corruption and the fact that walls have been demonstrated to only be as good as the people who guard them.

  14. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  15. ABOUT MODELLING OF COMPLEX NETWORKS WITH APPLICATIONS TO TERRORIST GROUP MODELLING

    Directory of Open Access Journals (Sweden)

    Drazen Penzar

    2005-10-01

    Full Text Available Based on available data on various organisations and networks, the article explores some key properties of the structure of a terrorist organisation. Analytical focus is on lower levels of organisational hierarchy, where network structure with exponential distribution of the number of links among network nodes is clearly visible. Such networks tend to grow organically, are very efficient in information diffusion, and are robust regarding stochastic failures and targeted attacks. These network features are illustrated by recent example based on network data about September 11, 2001 attacks on New York and Washington.

  16. Stochastic nanopore sensors for the detection of terrorist agents: Current status and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Liu Aihua; Zhao Qitao [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States); Guan Xiyun, E-mail: xguan@uta.edu [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States)

    2010-08-24

    Nanopore stochastic sensor works by monitoring the ionic current modulations induced by the passage of analytes of interest through a single pore, which can be obtained from a biological ion channel by self-assembly or artificially fabricated in a solid-state membrane. In this minireview, we overview the use of biological nanopores and artificial nanopores for the detection of terrorist agents including explosives, organophosphorus nerve agents, nitrogen mustards, organoarsenic compounds, toxins, and viruses. We also discuss the current challenge in the development of deployable nanopore sensors for real-world applications.

  17. Influences and vulnerabilities in radicalised lone-actor terrorists UK practitioner perspectives.

    OpenAIRE

    Peddell, Daniel; Eyre, Marie; McManus, MA; Bonworth, James

    2016-01-01

    The threat to national security from terrorists acting on their own initiative is a challenge for law enforcement and intelligence agencies in the UK and elsewhere. The UK Parliament’s 2014 threat assessment noted ‘a trend towards ‘low signature’ terrorism by small, self-directed groups and lone actors’ [House of Commons Home Affairs Committee (2014) Counter-Terrorism – Seventeenth Report of Session 2013–14]. Lone actors have become a higher priority for counter-terrorism professionals (UK po...

  18. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  19. [Study on willingness to participate and willingness to pay for hypothetical industrial injury insurance scheme].

    Science.gov (United States)

    Wu, Yuan; Dong, Hengjin; Duan, Shengnan; Liu, Xiaofang; Ye, Chiyu; You, Hua; Hu, Huimei; Wang, Linhao; Zhang, Xing; Wang, Jing

    2014-10-01

    To investigate workers' willingness to participate and wiliness to pay for a hypothetical industrial injury insurance scheme, to analyze the influential factors, and to provide information for policy making of the government. Multistage cluster sampling was used to select subjects: In the first stage, 9 small, medium, orlarge enterprises were selected fromthree cities (counties) in Zhejiang province, China, according to the level of economic development, transportation convenience, and cooperation of government agencies; in the second stage, several workshops were randomly selected from each of the 9 enterprises. Face-to-face interviews among all workers in the workshops were conducted by trained interviewers using a pre-designed questionnaire. It was found that 73.87% (2095) of all workers were willing to participate in the hypothetical work injury insurance scheme and to pay 2.21% of monthly wage (51.77 yuan) on average, and more than half of the workers were willing to pay less than 1%of monthly wage (35 yuan). Of the 741 workers who were not willing to participate, 327 thought that the premium should be borne by the state or enterprises, instead of individuals, and others were not willing to participate because of low income, unstable job, or poor understanding of the hypothetical industrial injury insurance scheme. Logistic regression analysis showed that workers with higher education levels, longer length of services, longer weekly working time, or more knowledge of occupational diseases showed higher willingness to participate in the scheme; workers who were exposed to physical hazards, had health records, or had participated in the existing medical insurance or industrial injury insurance were more willing to participate. Multiple linear regression analysis showed that with increasing average monthly wage, weekly working time, and self?health evaluation, the proportion of workers with willingness to pay increased; however, with increasing work intensity and

  20. The Use of the Lexical Exponents of Hypothetical Modality in Polish and Lithuanian

    Directory of Open Access Journals (Sweden)

    Danuta Roszko

    2016-12-01

    Full Text Available The Use of the Lexical Exponents of Hypothetical Modality in Polish and Lithuanian In this article the author focuses on the issue of hypothetical modality[1] in Polish and Lithuanian. A list of the basic exponents of hypothetical modality in both languages is presented. However, the focus is mainly placed on the lexical exponents. On the basis of one of the six groups, which describes a high degree of probability (H5, the differences between the use of the lexical exponents in both languages are examined. In the study, multilingual corpora resources, including The Polish-Lithuanian parallel corpus Clarin-PL., are utilized. [1] [In the academic literature, for the notion described herein, the term of epistemic modality is also used.  Nevertheless, in this paper I will continue to use the term of hypotheticality, which I borrowed from the studies on modality, conducted in Polish-Bulgarian cooperation (Slavic Institute of Polish Academy of Sciences and Institute for Bulgarian Language of the Bulgarian Academy of Sciences.]   O użyciu wykładników leksykalnych modalności hipotetycznej w językach polskim i litewskim W artykule autorka porusza zagadnienie modalności hipotetycznej[1]  w językach polskim i litewskim. Przedstawia wykaz podstawowych wykładników modalności hipotetycznej w obu językach. Główną uwagę skupia jednak na wykładnikach leksykalnych. Na przykładzie jednej z sześciu grup, opisującej wysoki stopień prawdopodobieństwa (H5, omawia różnice użycia wykładników leksykalnych w obu językach. W badaniach wykorzystuje wielojęzyczne zasoby korpusowe, w tym Polsko-litewski korpus równoległy Clarin-PL. [1] [W literaturze przedmiotu na oznaczenie opisywanych tu treści stosowany jest również termin epistemiczności. Niemniej jednak w tej pracy autorka pozostaje przy terminie hipotetyczności, który zapożycza z badań nad modalnością, prowadzonych we współpracy polsko-bułgarskiej (Instytut Slawistyki PAN i

  1. A study on the recriticality possibilities of fast reactor cores after a hypothetical core meltdown accident

    Energy Technology Data Exchange (ETDEWEB)

    Na, Byung Chan; Han, Do Hee; Kim, Young Cheol

    1997-04-01

    The preliminary and parametric sensitivity study on recriticality risk of fast reactor cores after a hypothetical total core meltdown accident was performed. Only the neutronic aspects of the accident was considered for this study, independent of the accident scenario. Estimation was made for the quantities of molten fuel which must be ejected out of the core in order to assure a sub-critical state. Diverse parameters were examined: molten pool type (homogenized or stratified), fuel temperature, conditions of the reactor core, core size (small or large), and fuel type (oxide, nitride, metal) (author). 7 refs.

  2. Ab-initio Study of Known and Hypothetical Metal-Organic Frameworks

    Science.gov (United States)

    Fuentes-Cabrera, Miguel; Nicholson, Don M.

    2004-03-01

    Rosi et al. [1] have found that microporous Metal-Organic Frameworks (MOF) materials are candidates for hydrogen storage applications. In particular, MOF-5 was found to adsorb hydrogen up to 4.5 weight percent at 78 kelvin and 1.0 weight percent at room temperature and pressure of 20 bar. We use ab-initio techniques to investigate hydrogen adsorption, stability, and the electronic properties of known and hypothetical Metal-Organic Frameworks. [1] N.L. Rosi, J. Eckert, M. Eddaoudi, D.T. Vodak, J. Kim, M. O'Keeffe, and O.M. Yaghi

  3. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researchers...... to use their intelligence data (Ressler S., 2006).  Very few researchers (Krebs, V., 2002, Sageman, M., 2004 and Rodriguez, J. A., 2004) collected data from open sources, and to the best of our knowledge, no knowledge base is available in academia for the analysis of the terrorist events.   To counter...... the information scarcity, we at Software Intelligence Security Research Center, Aalborg University Esbjerg Denmark designed and developed terrorism knowledge base by harvesting information from authenticated websites.   In this paper we discuss data collection and analysis results on our on-going research...

  4. The relationship between terrorist activities and cases of malaria in the eastern and south-eastern regions of Turkey, 1984-1998.

    Science.gov (United States)

    Cetin, Ilhan; Egri, Mucahit; Celbis, Osman; Toprak, Sadik; Ozag, Kadir

    2008-03-01

    The objective of this study was to determine whether cases of malaria are related to terrorist activities that have occurred in the eastern and south-eastern regions of Turkey. Some of the determinants related to malaria have been investigated using a national dataset for 11 provinces located in these regions of Turkey. In these regions, both terrorist activity and cases of malaria were common from 1984 to 1998. A multiple regression technique was used to identify the variables that are significantly associated with cases of malaria. Annual incidence of malaria was chosen as the dependent variable along with three independent (explanatory) variables: annual number of terrorist incidences, people per healthcare technician and number of thick blood films per 100,000 people. Based on this analysis, it is determined that the annual number of terrorist incidences has been associated with the annual number of malaria cases in these regions of Turkey since the beginning of terrorist activity in 1984.

  5. A study on the trend of international radioactive material regulation since the terrorist attacks of September 11, 2001

    Energy Technology Data Exchange (ETDEWEB)

    Ryu, J. S. [KAERI, Taejon (Korea, Republic of)

    2003-07-01

    AI-Qaeda and other terrorist groups have tried to obtain the radioactive material which could be used to make a dirty bomb, and their documents relating to dirty bombs were found in the January 2003. International communities especially, the United States has made efforts to improve infrastructure of radiation regulation and security of radioactive material for protecting its people from radiological attacks. This study examines the likelihood of radiological terrorism and the radiological dispersal devices which could be used by determined terrorists, and the trend of international communities to respond it through improvement on radiation regulation and security.

  6. Evaluating the impacts of farmers' behaviors on a hypothetical agricultural water market based on double auction

    Science.gov (United States)

    Du, Erhu; Cai, Ximing; Brozović, Nicholas; Minsker, Barbara

    2017-05-01

    Agricultural water markets are considered effective instruments to mitigate the impacts of water scarcity and to increase crop production. However, previous studies have limited understanding of how farmers' behaviors affect the performance of water markets. This study develops an agent-based model to explicitly incorporate farmers' behaviors, namely irrigation behavior (represented by farmers' sensitivity to soil water deficit λ) and bidding behavior (represented by farmers' rent seeking μ and learning rate β), in a hypothetical water market based on a double auction. The model is applied to the Guadalupe River Basin in Texas to simulate a hypothetical agricultural water market under various hydrological conditions. It is found that the joint impacts of the behavioral parameters on the water market are strong and complex. In particular, among the three behavioral parameters, λ affects the water market potential and its impacts on the performance of the water market are significant under most scenarios. The impacts of μ or β on the performance of the water market depend on the other two parameters. The water market could significantly increase crop production only when the following conditions are satisfied: (1) λ is small and (2) μ is small and/or β is large. The first condition requires efficient irrigation scheduling, and the second requires well-developed water market institutions that provide incentives to bid true valuation of water permits.

  7. Women's Behavioral Responses to the Threat of a Hypothetical Date Rape Stimulus: A Qualitative Analysis.

    Science.gov (United States)

    Anderson, RaeAnn E; Brouwer, Amanda M; Wendorf, Angela R; Cahill, Shawn P

    2016-05-01

    One in four college women experience sexual assault on campus; yet, campuses rarely provide the in-depth self-defense programs needed to reduce sexual assault risk. Further, little is known about the range of possible behaviors elicited by sexual assault threat stimuli besides assertion. To fill this gap, the aim of the current study was to explore qualitative themes in women's intended behavioral responses to a hypothetical sexual assault threat, date rape, by using a laboratory-controlled threat. College women (N = 139) were randomly assigned to one of four different levels of sexual assault threat presented via an audio-recorded vignette. Participants articulated how they would hypothetically respond to the experimentally assigned threat. Responses were blinded and analyzed using Consensual Qualitative Research methodology. Six major themes emerged: assertion, compliance/acceptance, conditional decision making, avoidance, expressions of discomfort, and allusion to future contact. Although almost all participants described assertion, a number of non-assertive responses were described that are not currently recognized in the literature. These non-assertive responses, including compliance/acceptance, conditional decision making, and avoidance, may represent unique behavioral response styles and likely reflect the complex psychological process of behavioral response to threat. The variety of themes found illustrates the great range of behavioral responses to threat. This broad range is not currently well represented or measured in the literature and better understanding of these responses can inform future interventions, advocacy efforts, and policies focused on sexual assault.

  8. Evaluation of the Thermal Response of the 5-DHLWaste Package-Hypothetical Fire Accident

    Energy Technology Data Exchange (ETDEWEB)

    R.W. Moore

    2001-11-03

    The purpose of this calculation is to determine the thermal response of the 5-defense high level waste (DHLW)/Department of Energy (DOE) codisposal waste package (WP) to the hypothetical fire accident. The objective is to calculate the temperature response of the DHLW glass to the hypothetical short-term fire defined in 10 CFR 71, Section 73(c)(4), Reference 1. The scope of the calculation includes evaluation of the accident with the waste package above ground, at the Yucca Mountain surface facility. The scope is intended to cover a DHLW WP. This WP is loaded with DHLW canisters containing glass from the Savannah River Site (SRS) and a DOE canister containing Training, Research, and Isotope General Atomics (TRIGA) spent nuclear fuel (SNF). The information provided by the sketches attached to this calculation is that for the potential design of the type of WP considered in this calculation. In addition to the nominal design configuration thermal load case, the effects of varying the central DOE canister and DHLW thermal loads are determined. Also, the effects of varying values of the flame and WP outer surface emissivities are evaluated.

  9. OPPORTUNITY COSTS OF REWARD DELAYS AND THE DISCOUNTING OF HYPOTHETICAL MONEY AND CIGARETTES

    Science.gov (United States)

    Johnson, Patrick S.; Herrmann, Evan S.; Johnson, Matthew W.

    2015-01-01

    Humans are reported to discount delayed rewards at lower rates than nonhumans. However, nonhumans are studied in tasks that restrict reinforcement during delays, whereas humans are typically studied in tasks that do not restrict reinforcement during delays. In nonhuman tasks, the opportunity cost of restricted reinforcement during delays may increase delay discounting rates. The present within-subjects study used online crowdsourcing (Amazon Mechanical Turk, or MTurk) to assess the discounting of hypothetical delayed money (and cigarettes in smokers) under four hypothetical framing conditions differing in the availability of reinforcement during delays. At one extreme, participants were free to leave their computer without returning, and engage in any behavior during reward delays (modeling typical human tasks). At the opposite extreme, participants were required to stay at their computer and engage in little other behavior during reward delays (modeling typical nonhuman tasks). Discounting rates increased as an orderly function of opportunity cost. Results also indicated predominantly hyperbolic discounting, the “magnitude effect,” steeper discounting of cigarettes than money, and positive correlations between discounting rates of these commodities. This is the first study to test the effects of opportunity costs on discounting, and suggests that procedural differences may partially account for observed species differences in discounting. PMID:25388973

  10. Potential radiological exposure rates resulting from hypothetical dome failure at Tank W-10

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The main plant area at Oak Ridge National Laboratory (ORNL) contains 12 buried Gunite tanks that were used for the storage and transfer of liquid radioactive waste. Although the tanks are no longer in use, they are known to contain some residual contaminated sludges and liquids. In the event of an accidental tank dome failure, however unlikely, the liquids, sludges, and radioactive contaminants within the tank walls themselves could create radiation fields and result in above-background exposures to workers nearby. This Technical Memorandum documents a series of calculations to estimate potential radiological exposure rates and total exposures to workers in the event of a hypothetical collapse of a Gunite tank dome. Calculations were performed specifically for tank W-10 because it contains the largest radioactivity inventory (approximately half of the total activity) of all the Gunite tanks. These calculations focus only on external, direct gamma exposures for prescribed, hypothetical exposure scenarios and do not address other possible tank failure modes or routes of exposure. The calculations were performed with established, point-kernel gamma ray modeling codes.

  11. Fluid-structure interaction analysis of a hypothetical core disruptive accident in LMFBRs

    Energy Technology Data Exchange (ETDEWEB)

    Liu Chuang [Department of Engineering Mechanics, Tsinghua University, Beijing 100084 (China)]. E-mail: lch98@mails.tsinghua.edu.cn; Zhang Xiong [Department of Engineering Mechanics, Tsinghua University, Beijing 100084 (China); Lu Mingwan [Department of Engineering Mechanics, Tsinghua University, Beijing 100084 (China)

    2005-03-01

    To ensure safety, it is necessary to assess the integrity of a reactor vessel of liquid-metal fast breeder reactor (LMFBR) under HCDA. Several important problems for a fluid-structural interaction analysis of HCDA are discussed in the present paper. Various loading models of hypothetical core disruptive accident (HCDA) are compared and the polytropic processes of idea gas (PPIG) law is recommended. In order to define a limited total energy release, a '5% truncation criterion' is suggested. The relationship of initial pressure of gas bubble and the total energy release is given. To track the moving interfaces and to avoid the severe mesh distortion an arbitrary Lagrangrian-Eulerian (ALE) approach is adopted in the finite element modeling (FEM) analysis. Liquid separation and splash from a free surface are discussed. By using an elasticity solution under locally uniform pressure, two simplified analytical solutions for 3D and axi-symmetric case of the liquid impact pressure on roof slab are derived. An axi-symmetric finite elements code FRHCDA for fluid-structure interaction analysis of hypothetical core disruptive accident in LMFBR is developed. The CONT benchmark problem is calculated. The numerical results agree well with those from published papers.

  12. Physicians' willingness to grant requests for assistance in dying for children: a study of hypothetical cases.

    Science.gov (United States)

    Vrakking, Astrid M; van der Heide, Agnes; Looman, Caspar W N; van Delden, Johannes J M; Onwuteaka-Philipsen, Bregje D; van der Maas, Paul J; van der Wal, Gerrit

    2005-05-01

    To study the willingness of Dutch physicians to use potentially life-shortening or lethal drugs for severely ill children. We asked 63 pediatricians about their approach to 10 hypothetical cases of children with cancer. The age of the child (15, 11, or 6 years), the child's (explicit) request, and the opinion of the parents varied. Two hypothetical cases were also presented to 125 general practitioners and 208 clinical specialists. Most pediatricians were willing to increase morphine in all cases. A total of 48% to 60% of pediatricians were willing to use lethal drugs in children at the child's request, when the parents agreed; when parents requested ending of life of their unconscious child, 37% to 42% of pediatricians were willing; 13% to 28% of pediatricians were willing when parents did not agree with their child's request. General practitioners and clinical specialists were as willing as pediatricians to use lethal drugs at the child's request, but less willing to grant a request of parents for their unconscious child. Many Dutch pediatricians are willing to use potentially life-shortening or lethal drugs for children. The legal limit of 12 years, as the age under which voluntary euthanasia is forbidden, is not fully supported by Dutch physicians.

  13. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    Science.gov (United States)

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  14. La Mauritanie à l’épreuve de l’islamisme et des menaces terroristes

    Directory of Open Access Journals (Sweden)

    Armelle Choplin

    2008-04-01

    Full Text Available En quelques semaines, la Mauritanie a été confrontée à plusieurs attaques terroristes revendiquées par Al-Qaïda au Maghreb. L’islamisme radical n’est pas nouveau dans ce pays mais le terrorisme et la violence des actes perpétrés sont quant à eux inédits. Si les courants radicaux gagnent en audience, ils ne doivent pour autant être confondus avec le terrorisme qui n’a pas d’ancrage en Mauritanie. La menace vient pour l’instant de l’extérieur.Since a few weeks, Mauritania is in front of several terrorist attacks claimed by Al-Qaïda in Maghreb. Radical Islamism is not new in this country but terrorism and violence of these acts are totally unheard. If radical tendencies grow their audience, they do not must be confused with terrorism which have not any rooting in Mauritania. For this moment, threats are coming from outside.

  15. The need to counter extremist terrorist manifestations in society and in the penal system

    Directory of Open Access Journals (Sweden)

    Kazberov P.N.

    2013-09-01

    Full Text Available The article discusses the need for inter-agency work to minimize the extremist-terrorist activities in the community. The problem of the psychology of extremism and terrorism are increasingly in the spotlight representatives of various scientific disciplines. First of all, there is no single legal science in all respects understanding of phenomena such as extremism and terrorism, their classification and evaluation, although a number of positive examples in this respect international cooperation is present. According to current data provided by the Investigative Committee of the Russian Federation, the General Prosecutor of the Russian Federation, the Russian Ministry of Internal Affairs, as well as the Moscow Bureau for Human Rights, extremism is a real threat to the national security of the Russian Federation. From the data of law enforcement should be the fact that most of the crimes of extremist and terrorist nature committed by persons of young age, the consciousness of which are susceptible to nationalist propaganda. A significant increase in informal youth movements extremist-nationalist orientation. The problem of expansion of extremism is also relevant for the penitentiary system of modern society. The very fact that a significant number of prisoners serving sentences for extremism and terrorism, illustrates the need for them special psychological and educational work

  16. Psychological consequences of terrorist attacks: prevalence and predictors of mental health problems in Pakistani emergency responders.

    Science.gov (United States)

    Razik, Saiqa; Ehring, Thomas; Emmelkamp, Paul M G

    2013-05-15

    Earlier research showing moderate to high prevalence rates of post-traumatic stress disorder (PTSD) and other mental health problems in emergency personnel has mostly been carried out in Western countries. Data from non-Western countries are largely lacking. The current study aimed to gather evidence on the prevalence of PTSD, anxiety, and depression in N=125 Pakistani emergency workers, most of whom (n=100; 80%) had been exposed to terrorist attacks. Fifteen percent of participants showed clinically relevant levels of PTSD, and 11-16% of participants reported heightened levels of anxiety or depression. Neither the experience of terrorist attacks per se nor the severity of the attack experienced was related to symptom severities. However, symptom levels of PTSD were related to a number of predictor variables, including subjective threat, peritraumatic dissociation, past traumas, rumination, and avoidant coping. Only a few variables were predictive of levels of anxiety and depression. In sum, a substantial subgroup of emergency workers experienced mental health problems, and prevalences were in the high range of those reported in earlier studies focusing on emergency personnel in Western countries.

  17. Posttraumatic stress disorder and exposure to trauma reminders after a terrorist attack.

    Science.gov (United States)

    Glad, Kristin A; Jensen, Tine K; Hafstad, Gertrud S; Dyb, Grete

    2016-01-01

    The aims of this study were twofold: (a) to systematically describe the type and frequency of trauma reminders reported after a terrorist attack and (b) to examine whether posttraumatic stress disorder (PTSD) is associated with frequency of exposure to trauma reminders. A total of 285 survivors (M age = 22.2, SD = 4.3, 53% males) of the 2011 massacre on Utøya Island, Norway, were interviewed face to face 14-15 months after the terror. Participants were asked how often they had experienced a range of different trauma reminders in the past month and which was most distressing. Current posttraumatic stress reactions were measured using the University of California at Los Angeles PTSD Reaction Index. In all, 33.3% of the survivors reported having experienced 1 or more trauma reminders often/very often in the past month. Auditory reminders were most frequently encountered and were reported to be the most distressing, especially sudden and sharp noises. Meeting the diagnostic criteria for PTSD was significantly associated with frequency of exposure to trauma reminders. The findings suggest that trauma reminders are common among survivors of a terrorist attack almost 1.5 years after the trauma and that PTSD is strongly related to the frequency of exposure to reminders. It is important that clinicians are aware of the significant role trauma reminders may play in maintaining PTSD and help trauma survivors recognize and manage reminders.

  18. Reflection in phraseological neology of traumatic historical events connected with the terrorist threat

    Directory of Open Access Journals (Sweden)

    Skorobogatova Taisiya Ivanovna

    2016-03-01

    Full Text Available The article is devoted to the analysis of phraseological units - neologisms which are associated with such traumatic historical events, as the implementation of terrorist acts. Particular emphasis is placed on the description of English, Russian and French phraseological units that have introduced the memory of the terrorist threat in the XX-XXI centuries.: Eng. That’s so 10th September (lit. today September 10, fig: Do not worry ahead of time about nothing; Rus. мочить в сортире (descriptor: беспощадно расправиться; фр. le prince s’est mari, le m chant est mort, c’est une semaine Walt Disney (lit. prince married the villain died, week Walt Disney; descriptor: Idyll, g n ration Bataclan (lit. Bataklan generation; descriptor: young people age of the victims who died in the “Bataklane”, i.e. young people aged 25-35. Phraseology description of new, emerging units is one of the most important problems in theoretical linguistics, namely: to illustrate and confirm the fact that the phrasebook body of a single national language is the result of the two memories - historical and linguistic. At the same time important to consider such a significant factor that determines the specificity of the national phraseological fund as memory selectivity in general and historical memory in particular.

  19. FACTORS IN STRENGHTNING OF TERRORIST ACTIVITY OF “ISLAMIC STATE” GROUPING ACROSS EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Nikita Aleksandrovich Lobanov

    2017-03-01

    Full Text Available XXI century was marked by the strengthening of globalization and integration processes in whole world. This led to the fact that the international community, especially European countries, faced the number of new threats to the spread of Islamic terrorism, the most urgent of which is the activity of “Islamic State” grouping. In this context it’s important to determine the reasons of intense activity growth of IS and its influence in Europe. The article analyzes the factors, contributing to the spread of terrorism. Also it gives some recommendations, implementation of which, according to the author, could decrease the level of terrorist threat. The purpose of the research is to determine factors of growing influence of “Islamic State” and increasing number of terrorist attacks in European countries. The author concludes that IS problem is a comprehensive threat, to prevent which a number of efforts – both within the European continent and in Middle East – is required. It also requires a systematic approach and a high level of consolidation and coordination within the international community.

  20. Medical aspects of terrorist bombings - a focus on DCS and DCR.

    Science.gov (United States)

    Mutafchiyski, Ventsislav M; Popivanov, Georgi I; Kjossev, Kirien C

    2014-01-01

    Although terrorist bombings have tormented the world for a long time, currently they have reached unprecedented levels and become a continuous threat without borders, race or age. Almost all of them are caused by improvised explosive devices. The unpredictability of the terrorist bombings, leading to simultaneous generation of a large number of casualties and severe "multidimensional" blast trauma require a constant vigilance and preparedness of every hospital worldwide. Approximately 1-2.6% of all trauma patients and 7% of the combat casualties require a massive blood transfusion. Coagulopathy is presented in 65% of them with mortality exceeding 50%. Damage control resuscitation is a novel approach, developed in the military practice for treatment of this subgroup of trauma patients. The comparison with the conventional approach revealed mortality reduction with 40-74%, lower frequency of abdominal compartment syndrome (8% vs. 16%), sepsis (9% vs. 20%), multiorgan failure (16% vs. 37%) and a significant reduction of resuscitation volumes, both crystalloids and blood products. DCS and DCR are promising new approaches, contributing for the mortality reduction among the most severely wounded patients. Despite the lack of consensus about the optimal ratio of the blood products and the possible influence of the survival bias, we think that DCR carries survival benefit and recommend it in trauma patients with exsanguinating bleeding.

  1. A project to develop restoration methods for buildings and facilities after a terrorist attack

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.F. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre; Volchek, K.; Hornof, M.; Boudreau, L.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Best, M. [Health Canada, Ottawa, ON (Canada); Garbutt, M.; Krishnan, J.; Wagener, S.; Bernard, K. [Health Canada, Winnipeg, MB (Canada); Cousins, T.; Haslip, D. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2004-07-01

    A multi-agent project was initiated to review site restoration after a terrorist attack. The objective was to acquire and compile information on all known restoration procedures for buildings, exteriors of buildings, their interior contents, and adjacent areas such as parking lots, lawns and vehicles. All procedures were then tested and validated. Restoration procedures included pickup, neutralization, decontamination, removal and final destruction/deposition of the contaminant, cleaning material and contaminated debris resulting from the terrorist act. This research and development project considered chemical, biological and nuclear contamination with the intent to develop methods to decontaminate and restore buildings after a chemical, biological and radiological (CBR) attack. Ideas were collected from work conducted around the world. The efficacy of best candidates was tested along with all selected chemical target items. The project also involved the preparation of procedures for decontamination and restoration. Ultimately, a tradeoff decision basis will be developed to provide information on abandonment and quarantine versus cleanup. The study revealed that there are several technologies that can be used for the decontamination of structures and equipment after acts of terrorism, however, no one technique will work for all contaminants on all surfaces. The selection of a decontamination method depends on the contaminant, the surface being decontaminated and economic, social and health factors. The amount of waste generated by decontamination is a major feasibility factor. 25 refs., 6 tabs.

  2. Male fetal loss in the U.S. following the terrorist attacks of September 11, 2001

    Science.gov (United States)

    2010-01-01

    Background The secondary sex ratio (i.e., the odds of a male birth) reportedly declines following natural disasters, pollution events, and economic collapse. It remains unclear whether this decline results from an excess of male fetal loss or reduced male conceptions. The literature also does not converge as to whether the terrorist attacks of September 11, 2001 induced "communal bereavement", or the widespread feeling of distress among persons who never met those directly involved in the attacks. We test the communal bereavement hypothesis among gravid women by examining whether male fetal deaths rose above expected levels in the US following September 11, 2001. Methods We apply interrupted time-series methods to all fetal deaths at or greater than the 20th week of gestation in the US from 1996 to 2002. Time-series methods control for trends, seasonality, and other forms of autocorrelation that could induce spurious associations. Results Results support the hypothesis in that the fetal death sex ratio (i.e., the odds of a male fetal death) increased above its expected value in September 2001. Additional analysis of the secondary sex ratio indirectly supports that the terrorist attacks may have threatened the gestation of male more than female fetuses. Conclusions Societal responses to events such as September 11, 2001 do not appear confined only to persons who have ever met the deceased. The fetal death sex ratio in the US population may serve as a sentinel indicator of the degree to which pregnant women react to population stressors. PMID:20500812

  3. iWEDS-An Intelligent Explosive Detection and Terrorist Tracking System Using Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Balaji Hariharan

    2011-07-01

    Full Text Available Terrorism is one of the greatest threats to national security nowadays. Military or police forces are not sufficient to prevent these activities. In the year 2009 India faced one of the biggest terrorist attacks in Mumbai. According to the report published by Times of India, more than 600 people have been killed and several hundreds of people ravaged in various terrorist attacks in India in the last 6 years. The main problem behind this massacre is the group which is acting behind this who already know the ineffectiveness of our security systems. Even now we are following traditional metal detection doors and hand held metal detectors. No autonomous system is being used by any security forces in India till now. The main problem with the traditional systems is their bulkiness so that the intruder can easily bypass the security mechanism by following an alternate path. Here we are proposing a highly effective wireless sensor network solution; intelligent Wireless Explosive Detection System (iWEDS to tackle this problem. The sensors are organized in such a manner that it has been embedded with the road reflectors, so that nobody even knows about the security system and no one can bypass it. Other key advantages are: these systems are low powered, fully automated and can support real-time tracking. Though iWEDS can perform automated operation we are proposing it only for assisting the police and military forces.

  4. Action physics

    Science.gov (United States)

    McGinness, Lachlan P.; Savage, C. M.

    2016-09-01

    More than a decade ago, Edwin Taylor issued a "call to action" that presented the case for basing introductory university mechanics teaching around the principle of stationary action [E. F. Taylor, Am. J. Phys. 71, 423-425 (2003)]. We report on our response to that call in the form of an investigation of the teaching and learning of the stationary action formulation of physics in a first-year university course. Our action physics instruction proceeded from the many-paths approach to quantum physics to ray optics, classical mechanics, and relativity. Despite the challenges presented by action physics, students reported it to be accessible, interesting, motivational, and valuable.

  5. Complementary Actions

    Directory of Open Access Journals (Sweden)

    Luisa eSartori

    2015-05-01

    Full Text Available Complementary colors are color pairs which, when combined in the right proportions, produce white or black. Complementary actions refer here to forms of social interaction wherein individuals adapt their joint actions according to a common aim. Notably, complementary actions are incongruent actions. But being incongruent is not sufficient to be complementary (i.e., to complete the action of another person. Successful complementary interactions are founded on the abilities: (i to simulate another person’s movements, (ii to predict another person’s future action/s, (iii to produce an appropriate incongruent response which differ, while interacting, with observed ones, and (iv to complete the social interaction by integrating the predicted effects of one’s own action with those of another person. This definition clearly alludes to the functional importance of complementary actions in the perception–action cycle and prompts us to scrutinize what is taking place behind the scenes. Preliminary data on this topic have been provided by recent cutting-edge studies utilizing different research methods. This mini-review aims to provide an up-to-date overview of the processes and the specific activations underlying complementary actions.

  6. Terrorist bombing

    Science.gov (United States)

    Mayo, Ami; Kluger, Yoram

    2006-01-01

    Bombings and explosion incidents directed against innocent civilians are the primary instrument of global terror. In the present review we highlight the major observations and lessons learned from these events. Five mechanisms of blast injury are outlined and the different type of injury that they cause is described. Indeed, the consequences of terror bombings differ from those of non-terrorism trauma in severity and complexity of injury, and constitute a new class of casualties that differ from those of conventional trauma. The clinical implications of terror bombing, in treatment dilemmas in the multidimensional injury, ancillary evaluation and handling of terror bombing mass casualty event are highlighted. All this leads to the conclusion that thorough medical preparedness to cope with this new epidemic is required, and that understanding of detonation and blast dynamics and how they correlate with the injury patterns is pivotal for revision of current mass casualty protocols. PMID:17101058

  7. Terrorist bombing

    OpenAIRE

    Kluger Yoram; Mayo Ami

    2006-01-01

    Abstract Bombings and explosion incidents directed against innocent civilians are the primary instrument of global terror. In the present review we highlight the major observations and lessons learned from these events. Five mechanisms of blast injury are outlined and the different type of injury that they cause is described. Indeed, the consequences of terror bombings differ from those of non-terrorism trauma in severity and complexity of injury, and constitute a new class of casualties that...

  8. Terrorisme, terroriste

    OpenAIRE

    Jacquemain, Marc

    2007-01-01

    The word "terrorism" was inventend to describe the policy of the French republic after the French revolution and was claimed by the Republican Themselves. Today "terrorism" is used in the rhetoric of power to present an adversary as "absolute evil". The word is reserved to non official groups unable to battle professional armies and so it is discarded when the question is tu judge the acts of those armies. The result is that in today's violent conflict, only the weakest can bel labeled "terro...

  9. What Are We Really Afraid Of? The Practitioner View of the Terrorist Threat in the United States

    Science.gov (United States)

    2005-03-01

    mental disorders listed in the DSM-III that are most frequently associated with terrorists: sociopathy or psychopathy, narcissism, Freudian “thanatos...death wish), and organic or physiological disorders (Corrado 1982:295). Sociopathy and psychopathy are used interchangeably, although sociopathy

  10. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  11. 78 FR 45011 - Designation of Bulut Yayla, AKA: Samet Ince as a Specially Designated Global Terrorist Pursuant...

    Science.gov (United States)

    2013-07-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Designation of Bulut Yayla, AKA: Samet Ince as a Specially Designated Global Terrorist Pursuant to Section 1(b) of Executive Order 13224, as Amended Acting under the authority of and in accordance with section...

  12. "We Are Not Terrorists," but More Likely Transnationals: Reframing Understandings about Immigrants in Light of the Boston Marathon Bombings

    Science.gov (United States)

    Kasun, G. Sue

    2013-01-01

    The Boston Marathon bombings in April 2013 created a new kind of discomfort in the United States about "self-radicalized" terrorists, particularly related to Muslim immigrants. The two suspected bombers, brothers with Chechen backgrounds, had attended U.S. public schools. News media portrayed the brothers as "immigrants" and…

  13. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    .../FBI-019 Terrorist Screening Records System of Records (August 22, 2007, 72 FR 47073) Exemptions... System of Records (August 22, 2007, 72 FR 47073) in order to automate and simplify the current method for... (May 19, 2010, 75 FR 28046); (2) TSA, Secure Flight Program: DHS/TSA-019 Secure Flight Records...

  14. Classroom Communication and National Crises: Student Information Needs in the Aftermath of the 2001 Terrorist Attacks on the United States

    Science.gov (United States)

    Ulmer, Robert R.; Hemphill, Michael R.

    2007-01-01

    Little is known about students' reactions to their university's attempt to manage their informational and emotional needs during a time of national crisis. A survey of students immediately following the 2001 terrorist attacks on the United States found that students wanted the university to stay open and function as a place for sense making…

  15. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  16. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-01-01

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted. PMID:27879941

  17. 31 CFR 597.201 - Prohibited transactions involving blocked assets or funds of foreign terrorist organizations or...

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Prohibited transactions involving blocked assets or funds of foreign terrorist organizations or their agents. 597.201 Section 597.201 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY...

  18. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  19. 48 CFR 252.209-7001 - Disclosure of ownership or control by the government of a terrorist country.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Disclosure of ownership or control by the government of a terrorist country. 252.209-7001 Section 252.209-7001 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT...

  20. Parents' Emotion-Related Beliefs and Behaviours in Relation to Children's Coping with the 11 September 2001 Terrorist Attacks

    Science.gov (United States)

    Halberstadt, Amy G.; Thompson, Julie A.; Parker, Alison E.; Dunsmore, Julie C.

    2008-01-01

    To assess relationships between parental socialization of emotion and children's coping following an intensely emotional event, parents' beliefs and behaviours regarding emotion and children's coping strategies were investigated after a set of terrorist attacks. Parents (n = 51) filled out the Parents' Beliefs about Negative Emotions questionnaire…

  1. 78 FR 59751 - Designation of Badruddin Haqqani as a Specially Designated Global Terrorist Pursuant to Section 1...

    Science.gov (United States)

    2013-09-27

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Designation of Badruddin Haqqani as a Specially Designated Global Terrorist Pursuant to Section 1(b) of Executive Order 13224, as Amended In accordance with section 1(b) of Executive Order 13224 of September 23, 2001, as amended (``the Order''), I...

  2. Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists (by Jeffrey Kahn, University of Michigan Press, 2013

    Directory of Open Access Journals (Sweden)

    Susan Ginsburg

    2014-04-01

    Full Text Available Since 9/11, migration-related security measures, including a growing reliance on watch-lists, have limited the right to travel. Jeffrey Kahn’s book, Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists, examines the legal and policy questions raised by prohibitions on travel by US citizens. 

  3. 75 FR 2920 - Designations of Foreign Terrorist Organizations; In the Matter of the Designation of: al-Qa'ida...

    Science.gov (United States)

    2010-01-19

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Designations of Foreign Terrorist Organizations; In the Matter of the Designation of: al-Qa'ida in the Arabian Peninsula (AQAP), Also Known as al-Qa'ida of Jihad Organization in the Arabian Peninsula, Also Known as Tanzim Qa'idat al-Jihad fi Jazirat...

  4. 77 FR 54944 - Designation of the Communist Party of Nepal (Maoist) as a Specially Designated Global Terrorist...

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Designation of the Communist Party of Nepal (Maoist) as a Specially Designated Global Terrorist; In the Matter of the Designation of The Communist Party of Nepal (Maoist) Also Known as United Revolutionary People's Council Also Known as People's...

  5. Americans Respond Politically to 9/11: Understanding the Impact of the Terrorist Attacks and Their Aftermath

    Science.gov (United States)

    Huddy, Leonie; Feldman, Stanley

    2011-01-01

    The 9/11 terrorist attacks have had profound effect on U.S. domestic and foreign security policy, leading to several expensive wars and the erosion of civil liberties (under the USA PATRIOT Act). We review evidence on political reactions to the 9/11 attacks and conclude that subjective reactions to terrorism played an important role in shaping…

  6. Prolonged exposure and virtual reality-enhanced imaginal exposure for PTSD following a terrorist bulldozer attack: a case study.

    Science.gov (United States)

    Freedman, Sara A; Hoffman, Hunter G; Garcia-Palacios, Azucena; Tamar Weiss, Patrice L; Avitzour, Sara; Josman, Naomi

    2010-02-01

    In this case study, virtual reality was used to augment imaginal exposure in a protocol based on prolonged exposure. A 29-year-old male patient developed posttraumatic stress disorder after surviving a deadly terrorist bulldozer attack on two civilian buses and several cars in Jerusalem; the traumas witnessed by the survivor included a decapitation. The crowded bus in which the patient was riding was pushed over onto its side by the terrorist, injuring, trapping, and terrifying the passengers and causing gasoline to leak. Guided by his therapist, the patient entered an immersive computer-generated virtual world to go "back" to the scene of the traumatic event to help him gain access to his memories of the event, process and reduce the intensity of the emotions (fear/anger) associated with his pathological memories, and change unhealthy thought patterns. Traumatic memories of childhood abuse and traumatic memories of the bulldozer terrorist attack were treated using imaginal exposure while the patient was in the virtual environment BusWorld. The patient showed large posttreatment reductions in PTSD symptoms, and his Clinician-Administered PTSD Scale (CAPS) scores dropped from 79 pretreatment to zero immediately posttreatment, and CAPS was still at zero 6 months later. Although case studies are inconclusive by nature, these encouraging preliminary results suggest that further exploration of the use of virtual reality during modified prolonged exposure for PTSD is warranted. As terrorist attacks increase in frequency and severity worldwide, research is needed on how to minimize the psychological consequences of terrorism.

  7. Relationship between cooperation in an iterated prisoner's dilemma game and the discounting of hypothetical outcomes.

    Science.gov (United States)

    Yi, Richard; Johnson, Matthew W; Bickel, Warren K

    2005-08-01

    A number of authors have proposed that preference for a larger, delayed reward in delay discounting is similar to cooperation in a repeated prisoner's dilemma game versus tit-for-tat. This proposal was examined by correlating delay-discounting (Experiment 1) and probability-discounting (Experiment 2) rates for hypothetical monetary gains and losses with performance in a repeated prisoner's dilemma game. Correlations between rate of delay discounting (discounting parameters and area under the curve) and proportion of cooperation in the repeated prisoner's dilemma game versus tit-for-tat were significant across three magnitudes, and correlations were generally higher with discounting for losses than with that for gains. As was expected, correlations between rate of delay discounting and performance versus a random strategy in the prisoner's dilemma game were not significant. Correlations between rate of probability-discounting and cooperation rate in a repeated prisoner's dilemma game versus neither a tit-for-tat nor a random strategy were significant.

  8. Hypothetical Outcome Plots Outperform Error Bars and Violin Plots for Inferences about Reliability of Variable Ordering.

    Directory of Open Access Journals (Sweden)

    Jessica Hullman

    Full Text Available Many visual depictions of probability distributions, such as error bars, are difficult for users to accurately interpret. We present and study an alternative representation, Hypothetical Outcome Plots (HOPs, that animates a finite set of individual draws. In contrast to the statistical background required to interpret many static representations of distributions, HOPs require relatively little background knowledge to interpret. Instead, HOPs enables viewers to infer properties of the distribution using mental processes like counting and integration. We conducted an experiment comparing HOPs to error bars and violin plots. With HOPs, people made much more accurate judgments about plots of two and three quantities. Accuracy was similar with all three representations for most questions about distributions of a single quantity.

  9. Positive versus negative framing of a hypothetical infant immunization: the influence of involvement.

    Science.gov (United States)

    Donovan, R J; Jalleh, G

    2000-02-01

    Framing studies dealing with health messages show mixed results, although a tendency in favor of negative framing. Involvement has been hypothesized to account for these conflicting results. The authors selected a realistic issue (immunization of infants) deemed high or low involving depending on the respondent's circumstances: women with an infant or who were pregnant or intending to get pregnant in the next 12 months were deemed to be high involved; women in none of these categories were deemed to be low involved. A convenience sample of adult women was presented with a hypothetical "new" immunization that protected infants against respiratory complaints such as bronchitis and pneumonia Side effects (the common flu) were framed positively (90% chance of no side effects) or negatively (10% chance of side effects). The authors found positive framing to be superior for low-involved respondents, but there was no framing effect for high-involved respondents.

  10. NMR Structure of the hypothetical protein encoded by the YjbJ gene from Escherichia coli

    Energy Technology Data Exchange (ETDEWEB)

    Pineda-Lucena, Antonio; Liao, Jack; Wu, Bin; Yee, Adelinda; Cort, John R.; Kennedy, Michael A.; Edwards, Aled M.; Arrowsmith, Cheryl H.

    2002-06-01

    Here we describe the solution structure of YjbJ (gil418541) as part of a structural proteomics project on the feasibility of the high-throughput generation of samples from Escherichia coli for structural studies. YjbJ is a hypothetical protein from Escherichia coli protein of unknown function. It is conserved, showing significant sequence identity to four predicted prokaryotic proteins, also of unknown function (Figure 1A). These include gil16762921 from Salmonella enterica (S. typhi), gil17938413 from Agrobacterium tumefaciens, gil16265654 from Sinorizhobium meliloti, and gil15599932 from Pseudomona aeruginosa. The structure of YjbJ reveals a new variation of a common motif (four-helix bundle) that could not be predicted from the protein sequence. Although the biochemical function is unknown, the existence of patterns of conserved residues on the protein surface suggest that the fold and function of all these proteins could be similar.

  11. Performance assessment for a hypothetical low-level waste disposal facility

    Energy Technology Data Exchange (ETDEWEB)

    Smith, C.S.; Rohe, M.J.; Ritter, P.D. [and others

    1997-01-01

    Disposing of low-level waste (LLW) is a concern for many states throughout the United States. A common disposal method is below-grade concrete vaults. Performance assessment analyses make predictions of contaminant release, transport, ingestion, inhalation, or other routes of exposure, and the resulting doses for various disposal methods such as the below-grade concrete vaults. Numerous assumptions are required to simplify the processes associated with the disposal facility to make predictions feasible. In general, these assumptions are made conservatively so as to underestimate the performance of the facility. The objective of this report is to describe the methodology used in conducting a performance assessment for a hypothetical waste facility located in the northeastern United States using real data as much as possible. This report consists of the following: (a) a description of the disposal facility and site, (b) methods used to analyze performance of the facility, (c) the results of the analysis, and (d) the conclusions of this study.

  12. Casimir Effect as a Test for Thermal Corrections and Hypothetical Long-Range Interactions

    CERN Document Server

    Klimchitskaya, G L; Fischbach, E; Krause, D E; López, D; Mostepanenko, V M

    2005-01-01

    We have performed a precise experimental determination of the Casimir pressure between two gold-coated parallel plates by means of a micromachined oscillator. In contrast to all previous experiments on the Casimir effect, where a small relative error (varying from 1% to 15%) was achieved only at the shortest separation, our smallest experimental error ($\\sim 0.5$%) is achieved over a wide separation range from 170 nm to 300 nm at 95% confidence. We have formulated a rigorous metrological procedure for the comparison of experiment and theory without resorting to the previously used root-mean-square deviation, which has been criticized in the literature. This enables us to discriminate among different competing theories of the thermal Casimir force, and to resolve a thermodynamic puzzle arising from the application of Lifshitz theory to real metals. Our results lead to a more rigorous approach for obtaining constraints on hypothetical long-range interactions predicted by extra-dimensional physics and other exte...

  13. Comparison of hypothetical and experienced EQ-5D valuations: relative weights of the five dimensions

    DEFF Research Database (Denmark)

    Rand-Hendriksen, K.; Augestad, L. A.; Sønbø Kristiansen, Ivar;

    2012-01-01

    Survey and on HH ratings from the US EQ-5D valuation study conducted in 2001. We then compared patterns in the relative magnitudes of coefficients that corresponded to the five dimensions. Results In the HH model, self-care and pain/discomfort were the most important dimensions, while usual activities......Purpose EQ-5D tariffs are typically based on general population valuations studies, but whether valuations of experienced health (EH) or hypothetical health (HH) are more appropriate is disputed. Previous comparisons of valuations of EH and HH have focused on absolute differences in dimension......-specific regression coefficients. We examined differences in the relative importance attributed to the EQ-5D dimensions between EH and HH valuations of EQ-5D states in the United States. Methods We used the regression model from the US EQ-5D valuation study on EH ratings from the 2000-2003 Medical Expenditure Panel...

  14. Assessment of Loads and Performance of a Containment in a Hypothetical Accident (ALPHA). Facility design report

    Energy Technology Data Exchange (ETDEWEB)

    Yamano, Norihiro; Maruyama, Yu; Kudo, Tamotsu; Moriyama, Kiyofumi; Ito, Hideo; Komori, Keiichi; Sonobe, Hisao; Sugimoto, Jun [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1998-06-01

    In the ALPHA (Assessment of Loads and Performance of Containment in Hypothetical Accident) program, several tests have been performed to quantitatively evaluate loads to and performance of a containment vessel during a severe accident of a light water reactor. The ALPHA program focuses on investigating leak behavior through the containment vessel, fuel-coolant interaction, molten core-concrete interaction and FP aerosol behavior, which are generally recognized as significant phenomena considered to occur in the containment. In designing the experimental facility, it was considered to simulate appropriately the phenomena mentioned above, and to cover experimental conditions not covered by previous works involving high pressure and temperature. Experiments from the viewpoint of accident management were also included in the scope. The present report describes design specifications, dimensions, instrumentation of the ALPHA facility based on the specific test objectives and procedures. (author)

  15. Hypothetical superparamagnetic magnetometer in a pigeon's upper beak probably does not work.

    Science.gov (United States)

    Jandačka, Petr; Alexa, Petr; Pištora, Jaromír; Trojková, Jana

    2013-04-01

    We reanalysed the role of superparamagnetic magnetite clusters observed in a pigeon's upper beak to decide if this matter can be a component of some sort of pigeon magnetometer for Earth orientation. We investigated the mutual interaction of the magnetite clusters induced by the geomagnetic field. The force sensitivity of the hypothetical magnetometer in a pigeon's upper beak was estimated considering the previously presented threshold magnetic sensitivity of pigeons, measured in electrophysiological and behavioural investigations. The typical intercluster magnetic force seems to be 10(-19)N well above the threshold magnetic sensitivity. To strengthen our results, we measured the magnetic susceptibility of superparamagnetic magnetite using a vibrating sample magnetometer. Finally we performed theoretical kinematic analysis of the motion of magnetite clusters in cell plasma. The results indicate that magnetite clusters, constituted by superparamagnetic nanoparticles and observed in a pigeon's upper beak, may not be a component of a measuring system providing the magnetic map.

  16. Signal coverage approach to the detection probability of hypothetical extraterrestrial emitters in the Milky Way

    Science.gov (United States)

    Grimaldi, Claudio

    2017-04-01

    The lack of evidence for the existence of extraterrestrial life, even the simplest forms of animal life, makes it is difficult to decide whether the search for extraterrestrial intelligence (SETI) is more a high-risk, high-payoff endeavor than a futile attempt. Here we insist that even if extraterrestrial civilizations do exist and communicate, the likelihood of detecting their signals crucially depends on whether the Earth lies within a region of the galaxy covered by such signals. By considering possible populations of independent emitters in the galaxy, we build a statistical model of the domain covered by hypothetical extraterrestrial signals to derive the detection probability that the Earth is within such a domain. We show that for general distributions of the signal longevity and directionality, the mean number of detectable emitters is less than one even for detection probabilities as large as 50%, regardless of the number of emitters in the galaxy.

  17. Hypothetical Outcome Plots Outperform Error Bars and Violin Plots for Inferences about Reliability of Variable Ordering

    Science.gov (United States)

    Hullman, Jessica; Resnick, Paul; Adar, Eytan

    2015-01-01

    Many visual depictions of probability distributions, such as error bars, are difficult for users to accurately interpret. We present and study an alternative representation, Hypothetical Outcome Plots (HOPs), that animates a finite set of individual draws. In contrast to the statistical background required to interpret many static representations of distributions, HOPs require relatively little background knowledge to interpret. Instead, HOPs enables viewers to infer properties of the distribution using mental processes like counting and integration. We conducted an experiment comparing HOPs to error bars and violin plots. With HOPs, people made much more accurate judgments about plots of two and three quantities. Accuracy was similar with all three representations for most questions about distributions of a single quantity. PMID:26571487

  18. Numerical interpretation of the MARA 8 experiment simulating a hypothetical core disruptive accident

    Energy Technology Data Exchange (ETDEWEB)

    Robbe, M.F. E-mail: mfrobbe@cea.fr; Lepareux, M.; Cariou, Y

    2003-03-01

    In the case of a hypothetical core disruptive accident (HCDA) in a liquid metal fast breeder reactor (LMFBR), it is assumed that the core of the nuclear reactor has melted partially and that the chemical interaction between the molten fuel and the liquid sodium has created a high-pressure gas bubble in the core. The violent expansion of this bubble loads and deforms the reactor vessel, thus endangering the safety of the nuclear plant. The experimental test MARA 8 simulates the explosive phenomenon in a mock-up included in a flexible vessel with a flexible roof. This paper presents a numerical simulation of the test and a comparison of the computed results with the experimental results and previous numerical ones.

  19. Performance assessment for a hypothetical low-level waste disposal facility

    Energy Technology Data Exchange (ETDEWEB)

    Smith, C.S.; Rohe, M.J.; Ritter, P.D. [and others

    1997-01-01

    Disposing of low-level waste (LLW) is a concern for many states throughout the United States. A common disposal method is below-grade concrete vaults. Performance assessment analyses make predictions of contaminant release, transport, ingestion, inhalation, or other routes of exposure, and the resulting doses for various disposal methods such as the below-grade concrete vaults. Numerous assumptions are required to simplify the processes associated with the disposal facility to make predictions feasible. In general, these assumptions are made conservatively so as to underestimate the performance of the facility. The objective of this report is to describe the methodology used in conducting a performance assessment for a hypothetical waste facility located in the northeastern United States using real data as much as possible. This report consists of the following: (a) a description of the disposal facility and site, (b) methods used to analyze performance of the facility, (c) the results of the analysis, and (d) the conclusions of this study.

  20. Structure of the hypothetical Mycoplasma protein, MPN555, suggestsa chaperone function

    Energy Technology Data Exchange (ETDEWEB)

    Schulze-Gahmen, Ursula; Aono, Shelly; Chen, Shengfeng; Yokota,Hisao; Kim, Rosalind; Kim, Sung-Hou

    2005-06-15

    The crystal structure of the hypothetical protein MPN555from Mycoplasma pneumoniae (gi pbar 1673958) has been determined to a resolution of 2.8 Angstrom using anomalous diffraction data at the Sepeak wavelength. Structure determination revealed a mostly alpha-helical protein with a three-lobed shape. The three lobes or fingers delineate a central binding groove and additional grooves between lobes 1 and 3, and between lobes 2 and 3. For one of the molecules in the asymmetric unit,the central binding pocket was filled with a peptide from the uncleaved N-terminal affinity tag. The MPN555 structure has structural homology to two bacterial chaperone proteins, SurA and trigger factor from Escherichia coli. The structural data and the homology to other chaperone for MPN555.

  1. A new drug design strategy: Killing drug resistant bacteria by deactivating their hypothetical genes.

    Science.gov (United States)

    Wong, Tit-Yee; Kuo, Jimmy

    2016-10-01

    Despite that a bacterial genome is complicated by large numbers of horizontally transferred (HT) genes and function unknown hypothetical (FUN) genes, the Genic-Transcriptional-Stop-Signals-Ratio (TSSR) of a genome shows that HT and FUN genes are complementary to all other genes in the genome. When HT or certain FUN genes are omitted from the Escherichia coli K-12 genome, its Genomic-TSSR value becomes totally incomparable to other E. coli strains. The Genic-TSSR correlation tree of a pathogen shows that some FUN genes would form a unique cluster. Removing these genes by site-specific mutation or gene-knockout should lead to the demise of this pathogen.

  2. On a hypothetical generational relationship between HCN and constituents of the reductive citric acid cycle.

    Science.gov (United States)

    Eschenmoser, Albert

    2007-04-01

    Encouraged by observations made on the course of reactions the HCN-tetramer can undergo with acetaldehyde, I delineate a constitutional and potentially generational relationship between HCN and those constituents of the reductive citric acid cycle that are direct precursors of amino acids in contemporary metabolism. In this context, the robustness postulate of classical prebiotic chemistry is questioned, and, by an analysis of the (hypothetical) reaction-tree of a stepwise hydrolysis of the HCN-tetramer, it is shown how such a non-robust chemical reaction platform could harbor the potential for the emergence of autocatalytic cycles. It is concluded that the chemistry of HCN should be revisited by focussing on its non-robust parts in order to demonstrate its full potential as one of the possible roots of prebiotic self-organizing chemical processes.

  3. Geologic simulation model for a hypothetical site in the Columbia Plateau. [AEGIS

    Energy Technology Data Exchange (ETDEWEB)

    Petrie, G.M.; Zellmer, J.T.; Lindberg, J.W.; Foley, M.G.

    1981-04-01

    This report describes the structure and operation of the Assessment of Effectiveness of Geologic Isolation Systems (AEGIS) Geologic Simulation Model, a computer simulation model of the geology and hydrology of an area of the Columbia Plateau, Washington. The model is used to study the long-term suitability of the Columbia Plateau Basalts for the storage of nuclear waste in a mined repository. It is also a starting point for analyses of such repositories in other geologic settings. The Geologic Simulation Model will aid in formulating design disruptive sequences (i.e. those to be used for more detailed hydrologic, transport, and dose analyses) from the spectrum of hypothetical geological and hydrological developments that could result in transport of radionuclides out of a repository. Quantitative and auditable execution of this task, however, is impossible without computer simulation. The computer simulation model aids the geoscientist by generating the wide spectrum of possible future evolutionary paths of the areal geology and hydrology, identifying those that may affect the repository integrity. This allows the geoscientist to focus on potentially disruptive processes, or series of events. Eleven separate submodels are used in the simulation portion of the model: Climate, Continental Glaciation, Deformation, Geomorphic Events, Hydrology, Magmatic Events, Meteorite Impact, Sea-Level Fluctuations, Shaft-Seal Failure, Sub-Basalt Basement Faulting, and Undetected Features. Because of the modular construction of the model, each submodel can easily be replaced with an updated or modified version as new information or developments in the state of the art become available. The model simulates the geologic and hydrologic systems of a hypothetical repository site and region for a million years following repository decommissioning. The Geologic Simulation Model operates in both single-run and Monte Carlo modes.

  4. The multiple roles of hypothetical gene BPSS1356 in Burkholderia pseudomallei.

    Directory of Open Access Journals (Sweden)

    Hokchai Yam

    Full Text Available Burkholderia pseudomallei is an opportunistic pathogen and the causative agent of melioidosis. It is able to adapt to harsh environments and can live intracellularly in its infected hosts. In this study, identification of transcriptional factors that associate with the β' subunit (RpoC of RNA polymerase was performed. The N-terminal region of this subunit is known to trigger promoter melting when associated with a sigma factor. A pull-down assay using histidine-tagged B. pseudomallei RpoC N-terminal region as bait showed that a hypothetical protein BPSS1356 was one of the proteins bound. This hypothetical protein is conserved in all B. pseudomallei strains and present only in the Burkholderia genus. A BPSS1356 deletion mutant was generated to investigate its biological function. The mutant strain exhibited reduced biofilm formation and a lower cell density during the stationary phase of growth in LB medium. Electron microscopic analysis revealed that the ΔBPSS1356 mutant cells had a shrunken cytoplasm indicative of cell plasmolysis and a rougher surface when compared to the wild type. An RNA microarray result showed that a total of 63 genes were transcriptionally affected by the BPSS1356 deletion with fold change values of higher than 4. The expression of a group of genes encoding membrane located transporters was concurrently down-regulated in ΔBPSS1356 mutant. Amongst the affected genes, the putative ion transportation genes were the most severely suppressed. Deprivation of BPSS1356 also down-regulated the transcriptions of genes for the arginine deiminase system, glycerol metabolism, type III secretion system cluster 2, cytochrome bd oxidase and arsenic resistance. It is therefore obvious that BPSS1356 plays a multiple regulatory roles on many genes.

  5. Molecular Characterization and Immune Protection of a New Conserved Hypothetical Protein of Eimeria tenella.

    Directory of Open Access Journals (Sweden)

    Qi Zhai

    Full Text Available The genome sequences of Eimeria tenella have been sequenced, but >70% of these genes are currently categorized as having an unknown function or annotated as conserved hypothetical proteins, and few of them have been studied. In the present study, a conserved hypothetical protein gene of E. tenella, designated EtCHP559, was cloned using rapid amplification of cDNA 5'-ends (5'RACE based on the expressed sequence tag (EST. The 1746-bp full-length cDNA of EtCHP559 contained a 1224-bp open reading frame (ORF that encoded a 407-amino acid polypeptide with the predicted molecular weight of 46.04 kDa. Real-time quantitative PCR analysis revealed that EtCHP559 was expressed at higher levels in sporozoites than in the other developmental stages (unsporulated oocysts, sporulated oocysts and second generation merozoites. The ORF was inserted into pCold-TF to produce recombinant EtCHP559. Using western blotting, the recombinant protein was successfully recognized by rabbit serum against E. tenella sporozoites. Immunolocalization by using EtCHP559 antibody showed that EtCHP559 was mainly distributed on the parasite surface in free sporozoites and became concentrated in the anterior region after sporozoites were incubated in complete medium. The EtCHP559 became uniformly dispersed in immature and mature schizonts. Inhibition of EtCHP559 function using anti-rEtCHP559 polyclonal antibody reduced the ability of E. tenella sporozoites to invade host cells by >70%. Animal challenge experiments demonstrated that the recombinant EtCHP559 significantly increased the average body weight gain, reduced the oocyst outputs, alleviated cecal lesions of the infected chickens, and resulted in anticoccidial index >160 against E. tenella. These results suggest that EtCHP559 plays an important role in sporozoite invasion and could be an effective candidate for the development of a new vaccine against E. tenella.

  6. Introduction: 9/11. The Socio-Political consequences of terrorist attacks

    Directory of Open Access Journals (Sweden)

    Carlos Yordan

    2010-11-01

    Full Text Available Este dossier especial explora las consecuencias socio-políticas de los ataques terroristas. Los primeros dos artículos examinan el impacto que los eventos del 11 de septiembre de 2001 han tenido sobre los discursos culturales en el mundo occidental. ¿Cúal es la reacción de las democracias al ataque terrorista? Tras los ataques del 11 de septiembre la mayoría de la población hubiera esperado que el gobierno pasara a desarrollar leyes que restringieran las libertades individuales y dieran a las autoridades amplios poderes para rastrear los terroristas y sus acólitos. Los siguientes dos artículos examinan las diferentes formas en que el 11 de septiembre han influenciado la política exterior americana contemporánea. En el último artículo William Messner y Carlos Yordan observan las reacciones estadounidenses a los ataques del 11 de septiembre y la implantación del Consejo de Seguridad para lograr un nuevo sistema global anti-terrorista.Palabras clave: 11/S, Estados Unidos, consecuencias socio-políticas, discursos políticos, Política de Seguridad americana contemporánea.___________________________ABSTRACT:This special issue explores the sociopolitical consequences of terrorist attacks. The first two articles examine the impact the events of 11 September 2009(9/11 had on cultural discourses in the West. What are democracies’ reactions to a terrorists attack? Following the 9/11 attacks, most people would expect the government to pass legislation that would restrict individual liberties and give the authorities wide powers to track terrorists and its supporters. Then, the next two articles examine the different ways the 9/11 attacks influenced contemporary American foreign policy. In the last article, William Messmer and Carlos Yordan look at the United Nations’ reactions to the 9/11 attacks and the Security Council’s establishment of new global counter-terrorism system.Keywords: 9/11; USA; United Nations; sociopolitical

  7. 网络暴恐音视频管控研究%Study of Management Control to Violent Terrorist Network Audio and Video

    Institute of Scientific and Technical Information of China (English)

    丁红军

    2015-01-01

    Terrorists use network wantonIy spread vioIent terrorist audio and video, has become the root of muItipIe vioIent terrorist activities, with serious sociaI harm. Crack down on propagation of vioIent terrorist network audio and video, is an important and ef ective means to curb vioIent terrorist crime. The articIe introduces the characteristics of vioIent terrorist network audio and video, anaIysis the probIems of the management and controI, propose the coping strategy of vioIent terrorist network audio and video.%恐怖分子利用网络大肆传播暴恐音视频,已成为暴恐活动多发频发的根源性问题,具有严重的社会危害性。严厉打击暴恐音视频的传播行为,是遏制暴恐犯罪的重要有效手段。文章介绍网络传播暴恐音视频的特点,分析了网络暴恐音视频管控面临的问题,提出了打击网络暴恐音视频的应对策略。

  8. Terrorist Financing: Fund Raising and Fund Transfer%论恐怖融资的资金筹集与资金转移

    Institute of Scientific and Technical Information of China (English)

    童文俊

    2012-01-01

    打击恐怖融资对于国际反恐斗争意义重大。本文从资金筹集与资金转移角度系统分析了恐怖融资活动。恐怖融资的资金筹集包括从合法来源筹集资金、从犯罪收益获取资金以及政权支持处获得资金;恐怖融资的资金转移主要有通过正规金融体系、利用贸易部门和现金运送三种方式。%Counter terrorist financing plays a significant role in international counter-terrorist activity. The article systematically analyzes the fund raising and fund transfer of terrorist financing. Terrorist organizations raise fund from legitimate sources, including the abuse of charitable entities or legitimate businesses or self-financing by the terrorists themselves. Terrorists also derive fund from a variety of criminal activities, or from state support. Terrorists use a wide variety of methods to move money, including the financial sector, the physical movement of cash by couriers, and the movement of goods through the trade system

  9. How do we combine science and regulations for decision making following a terrorist incident involving radioactive materials?

    Science.gov (United States)

    Poston, John W; Ford, John R

    2009-11-01

    Approaches to safety regulations-particularly radiation safety regulations-must be founded on the very best science possible. However, radiation safety regulations always lag behind the science for a number of reasons. First, the normal scientific process of peer-review, debate, and confirmation must ensure that the conclusions are indeed correct, the implications of the research are fully understood, and a consensus has been established. Second, in the U.S., there is a well-established, all-inclusive political process that leads to changes in radiation safety regulations. This process can take a very long time, as was demonstrated when the process was initiated to change the Code of Federal Regulations more than 20 y ago in response to International Commission on Radiation Protection Publication 26 and other recommendations. Currently, we find ourselves in a situation where the possibility of a terrorist radiological attack may occur and where the existing body of regulations provides very little guidance. Many international and national bodies, including several federal agencies, have provided recommendations on the appropriate levels of exposure for first-responders and first-receivers, as well as for the general public. However, some agencies provide guidelines based on very conservative dose limits which are not appropriate in situations where there is a substantial chance for the loss of lives and critical infrastructure. It is important that an emergency response is not hampered by overly cautious guidelines or regulations. In a number of exercises the impact of disparate guidelines and training in radiological situations has highlighted the need for clear reasonable limits that maximize the benefit from an emergency response and for any cleanup after the incident. This presentation will focus first on the federal infrastructure established to respond to radiological accidents and incidents. It will review briefly the major recommendations, both

  10. The effects of collective anger and fear on policy support in response to terrorist attacks.

    Science.gov (United States)

    Kim, Jaeshin

    2016-01-01

    Both correlational and experimental studies examined how perceived emotional responses of the majority of Americans to 9/11 affect individuals' support for government counter-terrorism policies (i.e., military intervention, anti-immigration, restricting civil liberties). Study 1 found associations between perceived collective emotions (i.e., anger, fear) and individuals' own corresponding emotions and those between perceived collective anger and counter-terrorism policy support. Individuals' own anger mediated the associations of collective anger with policy support. Using experimental manipulations, Study 2 showed that collective anger had a significant effect on individuals' own anger and one significant and two marginal effects on counter-terrorism policy support. Individuals' own anger mediated one of the marginal effects of collective anger on policy support. Implications of these findings are discussed in the context of terrorist threat.

  11. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  12. Non-terrorist suicidal death by oral explosion: A rare case from India.

    Science.gov (United States)

    Farooqui, Jamebaseer Masiuddin; Farooqui, Anjum Ara Jamebaseer; Mukherjee, Bimbisar Bikas; Manjhi, Shiv Narayan

    2016-07-01

    Suicidal deaths involving explosives are rare. Their occurrence depends on both the availability of materials and the victim's expertise in handling explosive material. We report here a rare case from India of non-terrorist suicidal death involving explosives. The victim was around 25 years old, a blaster by occupation. He committed suicide by detonating dynamite in his mouth. The materials he used to operate this explosion were found near his body at the crime scene. There was characteristic bilateral symmetrical laceration around the oral cavity. Considering all the facts of the case in relation to history, location, nature, distribution and extent of injuries and recovered material at crime scene enables the cause and manner of death to be ascertained.

  13. PTSD and Depression Among Museum Workers After the March 18 Bardo Museum Terrorist Attack.

    Science.gov (United States)

    Fekih-Romdhane, Feten; Chennoufi, Leila; Cheour, Mejda

    2017-02-07

    On March 18, 2015, two gunmen attacked the Bardo museum in Tunis, Tunisia, killing 23 foreign tourists. We assessed PTSD and depression symptoms 4-6 weeks after the event among museum workers, in relation to sociodemographic factors and social support, and we analysed the determinants and predictor factors of PTSD and depression symptoms among the participants. Our findings indicated that 68.6% of the respondents had posttraumatic stress symptoms above the cutoff point (IER-S scores >33), and 40.6% reported severe levels of depressive symptoms (DASS-depression scores >20). Male and female participants did not significantly differ in terms of their symptom severities. Low social support was the best predictor of PTSD and depression symptoms. Our results suggest that interventions designed to reinforce ties within social networks may be particularly helpful for victims in the aftermath of a terrorist attack.

  14. Suicide Bombers in Israel: Their Motivations, Characteristics, and Prior Activity in Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Revital Sela-Shayovitz

    2007-12-01

    Full Text Available This paper examines the characteristics of suicide bombers as reflected in the Israeli press during the Second Intifada in Israel. The analysis aims to determine whether there were significant differences in the characteristics of suicide bombers with religious motives versus those with nationalist motives. The findings reveal that gender, education level, and organizational affiliation correlated significantly with motives for carrying out suicide attacks. Most of the suicide bombers with religious motives were men with elementary education. In addition, the results show that most of the suicide bombers who were affiliated with the Hamas organization acted out of religious motives. No significant differences were found between suicide bombers with religious and those with nationalist motives with regard to age, marital status, and prior activity in terrorist organizations.

  15. Construction of War Discourse on International News Agencies: Case Study Terrorist attacks November 13th 2015

    Directory of Open Access Journals (Sweden)

    Ángel TORRES-TOUKOUMIDIS

    2017-01-01

    Full Text Available This study analyzes warmongering rhetoric presented by international agencies Reuters, Al Arabiya, Al Jazeera and Associated Press (AP of the information related to the terrorist attacks in Paris on November 13th, 2015 for 15 days after the event. We have started from a quantitative and qualitative analysis of 550 information units using the software MAXQDA (v. 11.0.11. Subsequently, the semantic criteria of media discourse: functionality, significance and direction of the goal was applied on the selected sample. The results demonstrate the prevailing demonization of Islam, the exaltation of fear and panic in the discursive construction and it highlighted the spectacle of the information as a communicative strategy on the rhetorical guidance.

  16. Energy markets, US energy policy, and the terrorist attacks of 11 September 2001

    Energy Technology Data Exchange (ETDEWEB)

    Luis A. Sosa; Daniel J. Desnyder [Colorado School of Mines (USA). Division of Economics and Business, Department of Petroleum Engineering

    2003-09-01

    The terrorist attacks of 11 September 2001 reinvigorated the debate over US energy policy initiated by the publication of the National Energy Policy Report (NEPR) of May 2001. US policymakers were aware of the importance of diversification and market risk management, but judged an expansion of domestic production could insulate the US from price shocks. The attacks called attention to the high petroleum intensity of the American economy, led to increases in costs associated with doing business in the oil patch, highlighted the fundamental security problem inherent in oil markets, and probably stymied a nascent recovery. Global energy markets were rattled but not rocked - a result of the preexisting economic downturn and determined market intervention. A review of the changes in US energy strategy since 11 September 2001 suggests cool heads blocked an emotional, short-run policy response and are instead working to diversify America's energy supply portfolio.

  17. A case study of conspiracy theories about Charlie Hebdo terrorist attack

    CERN Document Server

    Golo, Natasa

    2015-01-01

    The results of the public opinion poll performed in January 2015, just after the terrorist attack on the French satirical weekly magazine Charlie Hebdo and the kosher supermarket in Paris, when 17 people were killed, showed that a significant number of French citizens held conspiratorial beliefs about it (17 %). This gave reason to an alternative analysis of public opinion, presented in this paper. We collected 990 on-line articles mentioning Charlie Hebdo from Le Monde web site (one of the leading French news agencies), and looked at the ones that contained words related with conspiracy (in French: `complot', `conspiration' or `conjuration'). Then we analyzed the readers response, performing a semantic analysis of the 16490 comments posted on-line as reaction to the above articles. We identified 2 attempts to launch a conspiratorial rumour. A more recent Le Monde article, which reflects on those early conspiratorial attempts from a rational perspective, and the commentary thereon, showed that the readers hav...

  18. Signs of hypothetical flora on the planet venus: Revision of the TV experiment data (1975-1982)

    Science.gov (United States)

    Ksanfomality, L. V.; Selivanov, A. S.; Gektin, Yu. M.; Avanesov, G. A.

    2016-05-01

    Unique archive data from investigations of the surface of Venus performed with television cameras on the VENERA missions in 1975 and 1982 were reprocessed with up-to-date techniques, which substantially improved their level of detail. Numerous objects exhibiting a complex regular structure and presumably very slow motions (in the case of hypothetical fauna) have been found. The objects are noticeable in size and may testify to the existence of life. This paper reviews the results of searching for and identifying hypothetical objects of Venusian flora. The detected and identified hypothetical objects considerably exhaust the corresponding potential of the television images. It is concluded that, to investigate the surface of Venus, a new special mission, much more sophisticated than the VENERA missions (1975-1982), should be urgently carried out.

  19. Behavioral Economics of Cigarette Purchase Tasks: Within-Subject Comparison of Real, Potentially Real, and Hypothetical Cigarettes.

    Science.gov (United States)

    Wilson, A George; Franck, Christopher T; Koffarnus, Mikhail N; Bickel, Warren K

    2016-05-01

    Hypothetical rewards are commonly used in studies of laboratory-based tobacco demand. However, behavioral economic demand procedures require confirmation that the behavior elicited from real and hypothetical reward types are equivalent, and that results attained from these procedures are comparable to other accepted tasks, such as the hypothetical purchase task. Nineteen smokers were asked to purchase 1 week's worth of cigarettes that they would consume over the following week either at one price that incrementally increased across four weekly sessions ("real" sessions) or four prices in a single session ("potentially real" session), one of which was randomly chosen to be actualized. At each session, participants also completed a hypothetical cigarette purchase task. After each week, participants reported the number of cigarettes they actually smoked. Demand was found to be equivalent under both the real and potentially real reward conditions but statistically different from the demand captured in the hypothetical purchase task. However, the amounts purchased at specific prices in the hypothetical purchase task were significantly correlated with the amount purchased at comparable prices in the other two tasks (except for the highest price examined in both tasks of $1.00 per cigarette). Number of cigarettes consumed that were obtained outside of the study was correlated with study cigarette price. Combined, these results suggest that purchasing behavior during potentially real sessions (1) was not functionally different from real sessions, (2) imposes fewer costs to the experimenter, and (3) has high levels of both internal and external validity. © The Author 2015. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. Long term contaminant migration and impacts from uranium mill tailings. Comparison of computer models using a hypothetical dataset

    Energy Technology Data Exchange (ETDEWEB)

    Camus, H. [CEA Centre d' Etudes Nucleaires de Fontenay-aux-Roses (France). Inst. de Protection et de Surete Nucleaire] [and others

    1995-11-01

    and not to represent realistic releases. As such, the results presented do not reflect the actual impact of any real facility. While absolute conclusions about critical pathways etc should not be drawn, a number of useful indicative observations can be made arising from the results comparisons. The V1.07 exercise is essentially a simplified but comprehensive performance assessment of a hypothetical waste disposal facility. The range of results provided using a variety of modelling approaches and models in differing stages of development suggests that it is difficult to exclude from consideration particular contaminants or migration and exposure pathways in advance of detailed assumptions for source terms and other site and assessment specific features. This is consistent with results from an earlier, more generic, BIOMOVS multiple pathway study. Peak impacts on individuals from uranium mill tailings, may not arise for many hundreds of years. Since during this period many possible site and environmental changes might occur, not least because of human actions, a Reference Biosphere approach may be appropriate in developing the scenarios to be modelled for a real site. Reference Biospheres for solid waste disposal assessments are under discussion elsewhere within the BIOMOVS II programme. Methods are available for assessing radiological and non-radiological health risks to individuals from releases from tailings facilities, though their relative significance will be locally dependent. Simplifications to modelling of contaminant accumulation in soil (eg using a 100 year residence time for all contaminants) are probably inappropriate. The long term accumulation potential of the different contaminants may be substantially different. It follows that assumptions have to be made about soil structure and use over the long term. Simplification of the U-238 decay chain, i e assuming Pb-210 and Po-210 are in secular equilibrium with the long-lived parent, Ra-226, is probably not

  1. An Efficient Method to Design Premature End-of-Life Trajectories: A Hypothetical Alternate Fate for Cassini

    Science.gov (United States)

    Vaquero, Mar; Senent, Juan

    2015-01-01

    What would happen if, hypothetically, the highly successful Cassini mission were to end prematurely due to lack of propellant or sudden subsystem failure? A solid plan to quickly produce a solution for any given scenario, regardless of where the spacecraft is along its reference path, must be in place to safely dispose of the spacecraft and meet all planetary protection requirements. As a contingency plan for this hypothetical situation, a method to design viable high-fidelity terminating trajectories based on a hybrid approach that exploits two-body and three-body flyby transfers combined with a numerical optimization scheme is detailed in this paper.

  2. Simulations of a hypothetical temperature control structure at Detroit Dam on the North Santiam River, northwestern Oregon

    Science.gov (United States)

    Buccola, Norman L.; Stonewall, Adam J.; Rounds, Stewart A.

    2015-01-01

    Water temperature models of Detroit Lake, Big Cliff Lake, and the North Santiam River in northwestern Oregon were used to assess the potential for a hypothetical structure with variable intake elevations and an internal connection to power turbines at Detroit Dam (scenario SlidingWeir) to release more natural, pre-dam temperatures year round. This hypothetical structure improved outflow temperature control from Detroit Dam while meeting minimum dry-season release rates and lake levels specified by the rule curve specified for Detroit Lake.

  3. Investigating a Hypothetical Semiconductor Laser Bar Using a Laser Diode Simulation/Emulation Tool Using Random Levels of Defects

    Directory of Open Access Journals (Sweden)

    C.K. Amuzuvi

    2014-02-01

    Full Text Available In this study, Barlase, a semiconductor laser diode emulation tool, is used to emulate the by-emitter degradation of high power semiconductor laser diodes. Barlase is a software that uses a LabView control interface. We have demonstrated how Barlase works using a hypothetical laser diode bar (multiple emitters to validate the usefulness of the tool. A scenario using the hypothetical bar was investigated to demonstrate Barlase as follows: random low-level of defects distributed across the bar. The results of the simulation show the successful implementation of Barlase in the by-emitter analysis of laser diodes.

  4. Ground-Water Capture Zone Delineation of Hypothetical Systems: Methodology Comparison and Real-World Applications

    Science.gov (United States)

    Ahern, J. A.; Lilly, M. R.; Hinzman, L. D.

    2003-12-01

    A capture zone is the aquifer volume through which ground-water flows to a pumping well over a given time of travel. Determining a well's capture zone aids in water-supply management by creating an awareness of the water source. This helps ensure sustainable pumping operations and outlines areas where protection from contamination is critical. We are delineating the capture zones of hypothetical conceptual models that resemble the Fairbanks, Alaska floodplain both in aquifer parameters and boundary conditions. We begin with a very simple hydrogeologic system and gradually add complexity such as heterogeneity, anisotropy, multiple wells, and zones of permafrost. Commonly-used delineation methods are applied to each case. These include calculated fixed-radius, analytical and numerical models. The calculated fixed-radius method uses a mathematical equation with several simplifying assumptions. Analytical techniques employ a series of equations that likewise assume simple conditions, although to a lesser degree than the fixed-radius method. Our chosen numerical model is MODFLOW-2000, which offers a particle-tracking package (MODPATH) for delineating recharge areas. The delineations are overlayed for each conceptual model in order to compare the capture zones produced by the different methods. Contrasts between capture zones increase with the complexity of the hydrogeology. Simpler methods are restricted by their underlying assumptions. When methods can no longer account for complexities in the conceptual model, the resulting delineations remain similar to those of simpler models. Meanwhile, the zones generated by more sophisticated methods are able to change with changes to the conceptual model. Hence, the simpler methods now lack accuracy and credibility. We have found that these simpler techniques tend to overestimate the capture zone. Water-supply managers must consider such inaccuracies when evaluating the costs of each method. In addition to comparing delineation

  5. Conserved hypothetical BB0462 protein enhances the transcription activity of oppAV promoter

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Borrelia burgdorferi BB0462 ORF encodes an unknown functional protein with 110 amino acids.A BLAST search in protein databases and the secondary structure being predicted by the program JUFO showed that the conserved hypothetical BB0462 protein was similar to the members of the YbaB protein family in both amino acid composition and protein structure.The co-transformation of BB0462 ORF and oppA upstream regulation DNA into E.coli host cells and β-galactosidase activity assay demonstrated that the BB0462 protein enhanced the transcriptional activity of the oppAV promoter,but does not affect those of oppAⅠ,Ⅱ,Ⅲ and Ⅳ promoters.Analysis of DNA retardation and competitive repression also confirmed that the BB0462 protein bound to the 409 bp upstream regulation DNA fragment close to the initiation codon of the oppAV gene.All data in our study suggested that the BB0462 protein was involved in the transcriptional regulation of the oppAV gene

  6. "Hypothetical machines": the science fiction dreams of Cold War social science.

    Science.gov (United States)

    Lemov, Rebecca

    2010-06-01

    The introspectometer was a "hypothetical machine" Robert K. Merton introduced in the course of a 1956 how-to manual describing an actual research technique, the focused interview. This technique, in turn, formed the basis of wartime morale research and consumer behavior studies as well as perhaps the most ubiquitous social science tool, the focus group. This essay explores a new perspective on Cold War social science made possible by comparing two kinds of apparatuses: one real, the other imaginary. Even as Merton explored the nightmare potential of such machines, he suggested that the clear aim of social science was to build them or their functional equivalent: recording machines to access a person's experiential stream of reality, with the ability to turn this stream into real-time data. In this way, the introspectometer marks and symbolizes a broader entry during the Cold War of science-fiction-style aspirations into methodological prescriptions and procedural manuals. This essay considers the growth of the genre of methodological visions and revisions, painstakingly argued and absorbed, but punctuated by sci-fi aims to transform "the human" and build newly penetrating machines. It also considers the place of the nearly real-, and the artificial "near-substitute" as part of an experimental urge that animated these sciences.

  7. Hypothetical biotechnology companies: A role-playing student centered activity for undergraduate science students.

    Science.gov (United States)

    Chuck, Jo-Anne

    2011-01-01

    Science students leaving undergraduate programs are entering the biotechnology industry where they are presented with issues which require integration of science content. Students find this difficult as through-out their studies, most content is limited to a single subdiscipline (e.g., biochemistry, immunology). In addition, students need knowledge of the ethical, economic, and legal frame work in which the industry operates. This article presents an approach to deliver these outcomes in a collaborative and active learning modality which promotes deep learning. In the model, groups of final year undergraduate students form hypothetical biotechnology companies and identify real issues of interest to industry, make integrative team decisions, use professional level technology, and develop appropriate communication skills. The final successful teaching paradigm was based on self reflection, observation, and student feedback to ensure appropriate attainment of content, group work skills and increased confidence in professional decision-making. It is these outcomes which will facilitate life long learning skills, a major outcome applicable for all tertiary education.

  8. Testing the feasibility of a hypothetical whaling-conservation permit market in Norway.

    Science.gov (United States)

    Huang, Biao; Abbott, Joshua K; Fenichel, Eli P; Muneepeerakul, Rachata; Perrings, Charles; Gerber, Leah

    2017-02-24

    A "cap and trade" style system for managing whale harvests represents a potentially useful approach to resolve the current gridlock in international whale management. The establishment of whale permit markets, open to both whalers and conservationists, could reveal the strength of conservation demand. However, while much is known about demand for whale-based products there is uncertainty about demand for conservation and the willingness of conservation interests to engage in the market. This makes it difficult to predict the outcome of a hypothetical whale permit market. As a thought experiment, we develop a bioeconomic model to evaluate the influence of economic uncertainty about demand for whale conservation or harvest. We use simulations over a wide range of parameterizations of whaling and conservation demands to examine the potential ecological consequences of the establishment of a whale permit market in Norwegian waters under bounded (but substantial) economic uncertainty. We find that while a whale conservation market has the potential to yield a wide range of conservation and harvest outcomes, the most likely outcomes are those in which conservationists buy all whale permits. This article is protected by copyright. All rights reserved.

  9. Features of Hypothetical Plasma Phase Transition in Interiors of Saturn and Jupiter

    CERN Document Server

    Ukrainets, Artem

    2013-01-01

    Anomalous features for hypothetical Plasma Phase Transitions (PPT), which is expected to occur in mixed hydrogen-helium plasma in interior of Jupiter and Saturn, are under discussion. The characteristics of the Coulomb and density corrections (the so-called non-ideality corrections) are reconstructed for hydrogen-helium plasma in the vicinity of phase coexistence boundary of this PPT in version of Saumon and Chabrier, using tabular data for hydrogen-helium EOS of Saumon, Chabrier and VanHorn and some general thermodynamic relations. Two previously unknown characteristics of the studied PPT have been estimated based on these results: (i) -- the jump of the electrostatic potential across the phase boundary of PPT (Galvani potential), and (ii) -- the scale of non-congruency for this PPT (the differences in chemical composition of the coexisting hydrogen-helium phases), which could be expected in H2/He mixture at typical parameters of plasma in interior of Jupiter and Saturn. While the first effect -- the potenti...

  10. Identification of functional candidates amongst hypothetical proteins of Treponema pallidum ssp. pallidum.

    Science.gov (United States)

    Naqvi, Ahmad Abu Turab; Shahbaaz, Mohd; Ahmad, Faizan; Hassan, Md Imtaiyaz

    2015-01-01

    Syphilis is a globally occurring venereal disease, and its infection is propagated through sexual contact. The causative agent of syphilis, Treponema pallidum ssp. pallidum, a Gram-negative sphirochaete, is an obligate human parasite. Genome of T. pallidum ssp. pallidum SS14 strain (RefSeq NC_010741.1) encodes 1,027 proteins, of which 444 proteins are known as hypothetical proteins (HPs), i.e., proteins of unknown functions. Here, we performed functional annotation of HPs of T. pallidum ssp. pallidum using various database, domain architecture predictors, protein function annotators and clustering tools. We have analyzed the sequences of 444 HPs of T. pallidum ssp. pallidum and subsequently predicted the function of 207 HPs with a high level of confidence. However, functions of 237 HPs are predicted with less accuracy. We found various enzymes, transporters, binding proteins in the annotated group of HPs that may be possible molecular targets, facilitating for the survival of pathogen. Our comprehensive analysis helps to understand the mechanism of pathogenesis to provide many novel potential therapeutic interventions.

  11. Economic impacts of a hypothetical H1N1 pandemic : a cross-sectional analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Braeton J.; Shaneyfelt, Calvin R.

    2010-06-01

    A NISAC study on the economic effects of a hypothetical H1N1 pandemic was done in order to assess the differential impacts at the state and industry levels given changes in absenteeism, mortality, and consumer spending rates. Part of the analysis was to determine if there were any direct relationships between pandemic impacts and gross domestic product (GDP) losses. Multiple regression analysis was used because it shows very clearly which predictors are significant in their impact on GDP. GDP impact data taken from the REMI PI+ (Regional Economic Models, Inc., Policy Insight +) model was used to serve as the response variable. NISAC economists selected the average absenteeism rate, mortality rate, and consumer spending categories as the predictor variables. Two outliers were found in the data: Nevada and Washington, DC. The analysis was done twice, with the outliers removed for the second analysis. The second set of regressions yielded a cleaner model, but for the purposes of this study, the analysts deemed it not as useful because particular interest was placed on determining the differential impacts to states. Hospitals and accommodation were found to be the most important predictors of percentage change in GDP among the consumer spending variables.

  12. Hydrologic effects of hypothetical earthquake-caused floods below Jackson Lake, northwestern Wyoming

    Science.gov (United States)

    Glass, W.R.; Keefer, T.N.; Rankl, J.G.

    1976-01-01

    Jackson Lake, located in Grand Teton National Park, Wyoming, is in an area of seismic instability. There is a possibility of flooding in the Snake River downstream from Jackson Lake Dam in the event of a severe earthquake. Hypothetical floods were routed 38 miles (61 kilometers) downstream from the dam for three cases: (1) Instantaneous destruction of the dam outlet structure, (2) instantaneous destruction of the entire dam, and (3) for waves overtopping the dam without failure of the dam. In each case, a full reservoir was assumed. Hydrographs for outflow from the reservoir for the two cases of dam failure were developed utilizing an accelerated discharge due to the travel of a negative wave through the reservoir, and Muskingum storage routing. For the case of waves overtopping the dam, a 10-foot (3-meter) wave was assumed to be propagated from the upstream end of the reservori. A multiple-linearization technique was used to route the flow through the reach. The model was calibrated from U.S. Geological Survey streamflow records. Most extensive flooding and largest water velocities would occur if the entire dam were destroyed; floods for the other two cases were smaller. An inundation map was prepared from channel conveyance curves and profiles of the water surface. (Woodard-USGS)

  13. Radioactive particulate release associated with the DOT specification 6M container under hypothetical accident conditions

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, J.M.; Raney, P.J.

    1986-02-01

    A testing program was conducted to determine the leakage of depleted uranium dioxide powder (DUO) from the inner containment components of the US Department of Transportation's (DOT) specification 6M container under hypothetical accident conditions. Depleted uranium dioxide was selected as a surrogate for plutonium oxide because of the similarities in the powder characteristics, density and particle size, and because of the special handling and special facilities required for plutonium oxide. The DUO was packaged inside food pack cans in three different configurations inside the 2R vessel of the 6M container. The amount of DUO powder leakage ranged from none detectable (<2 x 10/sup -7/ g) to a high of 1 x 10/sup -3/ g. The combination of gravity, vibration and pressure produced the highest leakage of DUO. Containers that had hermetic seals (leak rates <6 x 10/sup -4/ atm cc/min) did not leak any detectable amount (<2 x 10/sup -7/ g) of DUO under the test conditions. Impact forces had no effect on the leakage of particles with the packaging configurations used. 23 refs., 24 figs., 3 tabs.

  14. Summary of four release consequence analyses for hypothetical nuclear waste repositories in salt and granite

    Energy Technology Data Exchange (ETDEWEB)

    Cole, C.R.; Bond, F.W.

    1980-12-01

    Release consequence methology developed under the Assessment of Effectiveness of Geologic Isolation Systems (AEGIS) program has now been applied to four hypothetical repository sites. This paper summarizes the results of these four studies in order to demonstrate that the far-field methodology developed under the AEGIS program offers a practical approach to the post-closure safety assessment of nuclear waste repositories sited in deep continental geologic formations. The four studies are briefly described and compared according to the following general categories: physical description of the repository (size, inventory, emplacement depth); geologic and hydrologic description of the site and the conceptual hydrologic model for the site; description of release scenario; hydrologic model implementation and results; engineered barriers and leach rate modeling; transport model implementation and results; and dose model implementation and results. These studies indicate the following: numerical modeling is a practical approach to post-closure safety assessment analysis for nuclear waste repositories; near-field modeling capability needs improvement to permit assessment of the consequences of human intrusion and pumping well scenarios; engineered barrier systems can be useful in mitigating consequences for postulated release scenarios that short-circuit the geohydrologic system; geohydrologic systems separating a repository from the natural biosphere discharge sites act to mitigate the consequences of postulated breaches in containment; and engineered barriers of types other than the containment or absorptive type may be useful.

  15. Modelling wet deposition in simulations of volcanic ash dispersion from hypothetical eruptions of Merapi, Indonesia

    Science.gov (United States)

    Dare, Richard A.; Potts, Rodney J.; Wain, Alan G.

    2016-10-01

    The statistical impact of including the process of wet deposition in dispersion model predictions of the movement of volcanic ash is assessed. Based on hypothetical eruptions of Merapi, Indonesia, sets of dispersion model simulations were generated, each containing four simulations per day over a period of three years, to provide results based on a wide range of atmospheric conditions. While on average dry sedimentation removes approximately 10% of the volcanic ash from the atmosphere during the first 24 h, wet deposition removes an additional 30% during seasons with highest rainfall (December and January) but only an additional 1% during August and September. The majority of the wet removal is due to in-cloud rather than below-cloud collection of volcanic ash particles. The largest uncertainties in the amount of volcanic ash removed by the process of wet deposition result from the choice of user-defined parameters used to compute the scavenging coefficient, and from the definition of the cloud top height. Errors in the precipitation field provided by the numerical weather prediction model utilised here have relatively less impact.

  16. Sequence Analysis of Hypothetical Proteins from 26695 to Identify Potential Virulence Factors

    Directory of Open Access Journals (Sweden)

    Ahmad Abu Turab Naqvi

    2016-09-01

    Full Text Available Helicobacter pylori is a Gram-negative bacteria that is responsible for gastritis in human. Its spiral flagellated body helps in locomotion and colonization in the host environment. It is capable of living in the highly acidic environment of the stomach with the help of acid adaptive genes. The genome of H. pylori 26695 strain contains 1,555 coding genes that encode 1,445 proteins. Out of these, 340 proteins are characterized as hypothetical proteins (HP. This study involves extensive analysis of the HPs using an established pipeline which comprises various bioinformatics tools and databases to find out probable functions of the HPs and identification of virulence factors. After extensive analysis of all the 340 HPs, we found that 104 HPs are showing characteristic similarities with the proteins with known functions. Thus, on the basis of such similarities, we assigned probable functions to 104 HPs with high confidence and precision. All the predicted HPs contain representative members of diverse functional classes of proteins such as enzymes, transporters, binding proteins, regulatory proteins, proteins involved in cellular processes and other proteins with miscellaneous functions. Therefore, we classified 104 HPs into aforementioned functional groups. During the virulence factors analysis of the HPs, we found 11 HPs are showing significant virulence. The identification of virulence proteins with the help their predicted functions may pave the way for drug target estimation and development of effective drug to counter the activity of that protein.

  17. Process design and economic analysis of a hypothetical bioethanol production plant using carob pod as feedstock.

    Science.gov (United States)

    Sánchez-Segado, S; Lozano, L J; de Los Ríos, A P; Hernández-Fernández, F J; Godínez, C; Juan, D

    2012-01-01

    A process for the production of ethanol from carob (Ceratonia siliqua) pods was designed and an economic analysis was carried out for a hypothetical plant. The plant was assumed to perform an aqueous extraction of sugars from the pods followed by fermentation and distillation to produce ethanol. The total fixed capital investment for a base case process with a capacity to transform 68,000 t/year carob pod was calculated as 39.61 millon euros (€) with a minimum bioethanol production cost of 0.51 €/L and an internal rate of return of 7%. The plant was found to be profitable at carob pod prices lower than 0.188 €/kg. An increase in the transformation capacity of the plant from 33,880 to 135,450 t/year was calculated to result in an increase in the internal rate of return from 5.50% to 13.61%. The obtained results show that carob pod is a promising alternative source for bioethanol production.

  18. Spacecraft Mission Design for the Mitigation of the 2017 PDC Hypothetical Asteroid Threat

    Science.gov (United States)

    Barbee, Brent W.; Sarli, Bruno V.; Lyzhoft, Josh; Chodas, Paul W.; Englander, Jacob A.

    2017-01-01

    This paper presents a detailed mission design analysis results for the 2017 Planetary Defense Conference (PDC) Hypothetical Asteroid Impact Scenario, documented at https:cneos.jpl.nasa.govpdcspdc17. The mission design includes campaigns for both reconnaissance (flyby or rendezvous) of the asteroid (to characterize it and the nature of the threat it poses to Earth) and mitigation of the asteroid, via kinetic impactor deflection, nuclear explosive device (NED) deflection, or NED disruption. Relevant scenario parameters are varied to assess the sensitivity of the design outcome, such as asteroid bulk density, asteroid diameter, momentum enhancement factor, spacecraft launch vehicle, and mitigation system type. Different trajectory types are evaluated in the mission design process from purely ballistic to those involving optimal midcourse maneuvers, planetary gravity assists, and/or low-thrust solar electric propulsion. The trajectory optimization is targeted around peak deflection points that were found through a novel linear numerical technique method. The optimization process includes constrain parameters, such as Earth departure date, launch declination, spacecraft, asteroid relative velocity and solar phase angle, spacecraft dry mass, minimum/maximum spacecraft distances from Sun and Earth, and Earth-spacecraft communications line of sight. Results show that one of the best options for the 2017 PDC deflection is solar electric propelled rendezvous mission with a single spacecraft using NED for the deflection.

  19. The hypothetical ancestral animal. the Urmetazoa: telomerase activity in sponges (Porifera

    Directory of Open Access Journals (Sweden)

    ISABEL M. MÜLLER

    2003-05-01

    Full Text Available Sponges (Porifera represent the lowest metazoan phylum, characterized by a pronounced plasticity in the determination of cell lineages, and they are the closest related taxon to the hypothetical ancestral animal, the Urmetazoa, from which the metazoan lineages diverged. In a first approach to elucidate the molecular mechanisms controlling the switch from the cell lineage with a putative indefinite growth capacity to senescent, somatic cells, the activity of the telomerase as an indicator for immortality has been determined. The studies were performed with the marine demosponges Suberites domuncula and Geodia cydonium, in vivo with tissue but also in vitro using the primmorph system. Primmorphs are formed from dissociated cells which have retained their proliferation potency. It was found that the activity of telomerase in tissue of both sponges is high. Based on this and additional findings it is assumed that the separation of the senescent sponge cell lineage from the immortal germ-/somatic cell lineage is triggered by the loss of contact to cell adhesion factors. First evidence is included which suggests that the final progress of the senescent, telomerase-negative cells to cell death is caused by apoptosis.

  20. The labelling and reporting of euthanasia by Belgian physicians: a study of hypothetical cases.

    Science.gov (United States)

    Smets, Tinne; Cohen, Joachim; Bilsen, Johan; Van Wesemael, Yanna; Rurup, Mette L; Deliens, Luc

    2012-02-01

    Belgium legalized euthanasia in 2002. Physicians must report each euthanasia case to the Federal Control and Evaluation Committee. This study examines which end-of-life decisions (ELDs) Belgian physicians label 'euthanasia', which ELDs they think should be reported and the physician characteristics associated with correct labelling of euthanasia cases, the awareness that they should be reported and the reporting of them. Five hypothetical cases of ELDs: intensified pain alleviation, palliative/terminal sedation, euthanasia with neuromuscular relaxants, euthanasia with morphine and life-ending without patient request were presented in a cross-sectional survey of 914 physicians in Belgium in 2009. About 19% of physicians did not label a euthanasia case with neuromuscular relaxants 'euthanasia', 27% did not know that it should be reported. Most physicians labelled a euthanasia case with morphine 'intensification of pain and symptom treatment' (39%) or 'palliative/terminal sedation' (37%); 21% of physicians labelled this case 'euthanasia'. Cases describing other ELDs were sometimes also labelled 'euthanasia'. Factors associated with a higher likelihood of labelling a euthanasia case correctly were: living in Flanders, being informed about the euthanasia law and having a positive attitude towards societal control over euthanasia. Whether a physician correctly labelled the euthanasia cases strongly determined their reporting knowledge and intentions. There is no consensus among physicians about the labelling of euthanasia and other ELDs, and about which cases must be reported. Mislabelling of ELDs could impede societal control over euthanasia. The provision of better information to physicians appears to be necessary.