WorldWideScience

Sample records for modeling homeland security

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  3. Creation of a Homeland Security Jail Information Model

    Science.gov (United States)

    2012-03-01

    In contrast, law enforcement officers at a jail have a better gestalt understanding of homeland security threats and trends in the same...and my personal familiarity with each model. In his book Beyond the Two Disciplines of Scientific Psychology , Lee Cronbach claims that...muhajir.background/index.html Cronbach, L. J. (1975). Beyond the two disciplines of scientific psychology . Washington, D.C.: American Psychologist

  4. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  5. Homeland Security is More than Homeland Defense

    National Research Council Canada - National Science Library

    Shaw, Brian K

    2005-01-01

    ...) and operational concepts are designed to support its primary wartime mission. Future modifications must include consideration as to how it will support the full-spectrum of its Homeland Security (HS...

  6. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant c...... to gain by coordinating more closely, and that the exchange of experience is crucial as we attempt to stay ahead of a learning enemy....

  7. Homeland Security Master's Degrees Awarded

    OpenAIRE

    Center for Homeland Defense and Security

    2011-01-01

    Center for Homeland Defense and Security, PRESS RELEASES MONTEREY, Calif. – Twenty-nine professionals who work in the homeland security field were awarded master’s degrees March 25 at the Naval Postgraduate School Center for Homeland Defense and Security. The...

  8. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...... challenge. Europe and the United States have reacted differently to the emergence of mass casualty terrorism, but must work together to cope with the diverse issue areas, sectors, professions, and relevant actors involved in such a broad-based concept. The authors suggest that Europe and the US have a lot...

  9. Validation of Computer Models for Homeland Security Purposes

    International Nuclear Information System (INIS)

    Schweppe, John E.; Ely, James; Kouzes, Richard T.; McConn, Ronald J.; Pagh, Richard T.; Robinson, Sean M.; Siciliano, Edward R.; Borgardt, James D.; Bender, Sarah E.; Earnhart, Alison H.

    2005-01-01

    At Pacific Northwest National Laboratory, we are developing computer models of radiation portal monitors for screening vehicles and cargo. Detailed models of the radiation detection equipment, vehicles, cargo containers, cargos, and radioactive sources have been created. These are used to determine the optimal configuration of detectors and the best alarm algorithms for the detection of items of interest while minimizing nuisance alarms due to the presence of legitimate radioactive material in the commerce stream. Most of the modeling is done with the Monte Carlo code MCNP to describe the transport of gammas and neutrons from extended sources through large, irregularly shaped absorbers to large detectors. A fundamental prerequisite is the validation of the computational models against field measurements. We describe the first step of this validation process, the comparison of the models to measurements with bare static sources

  10. Computer Modeling of Radiation Portal Monitors for Homeland Security Applications

    International Nuclear Information System (INIS)

    Pagh, Richard T.; Kouzes, Richard T.; McConn, Ronald J.; Robinson, Sean M.; Schweppe, John E.; Siciliano, Edward R.

    2005-01-01

    Radiation Portal Monitors (RPMs) are currently being used at our nation's borders to detect potential nuclear threats. At the Pacific Northwest National Laboratory (PNNL), realistic computer models of RPMs are being developed to simulate the screening of vehicles and cargo. Detailed models of the detection equipment, vehicles, cargo containers, cargos, and radioactive sources are being used to determine the optimal configuration of detectors. These models can also be used to support work to optimize alarming algorithms so that they maximize sensitivity for items of interest while minimizing nuisance alarms triggered by legitimate radioactive material in the commerce stream. Proposed next-generation equipment is also being modeled to quantify performance and capability improvements to detect potential nuclear threats. A discussion of the methodology used to perform computer modeling for RPMs will be provided. In addition, the efforts to validate models used to perform these scenario analyses will be described. Finally, areas where improved modeling capability is needed will be discussed as a guide to future development efforts

  11. Employing the intelligence cycle process model within the Homeland Security Enterprise

    OpenAIRE

    Stokes, Roger L.

    2013-01-01

    CHDS State/Local The purpose of this thesis was to examine the employment and adherence of the intelligence cycle process model within the National Network of Fusion Centers and the greater Homeland Security Enterprise by exploring the customary intelligence cycle process model established by the United States Intelligence Community (USIC). This thesis revealed there are various intelligence cycle process models used by the USIC and taught to the National Network. Given the numerous differ...

  12. Department of Homeland Security

    Science.gov (United States)

    ... HP - Hurricane Maria V2 HP - Hurricane Maria V2 Hurricane Maria Information HP - 2017 CISR Month HP - 2017 CISR Month ... to the U.S. homeland. How Do I...? Find Hurricane Maria Response and Recovery Information Encuentre información sobre respuesta y rescate por el ...

  13. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... environment; evolving threats in cyber security; Transportation Security Administration operations; DHS... associated with airport security. Specifically, there will be material presented regarding the latest viable... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0055] Homeland Security Advisory Council...

  14. Resilience in Homeland Security [video

    OpenAIRE

    O'Connor, Dan; Center for Homeland Defense and Security Naval Postgraduate School

    2016-01-01

    In this interview, Dan O'Connor, Director Field Operations for the Chief Security Officer at FEMA, talks about the importance of resilience in Homeland Security. The term "resilience" refers to the ability to adapt to changing conditions and withstand and rapidly recover from disruption due to emergencies. Whether it is resilience towards acts of terrorism, cyber attacks, pandemics, and catastrophic natural disasters, our national preparedness is the shared responsibility of all levels of gov...

  15. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  16. 77 FR 59627 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-28

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of open teleconference federal advisory committee meeting. SUMMARY: The Homeland Security Advisory Council (HSAC) will... line of the message. Fax: (202) 282-9207. Mail: Homeland Security Advisory Council, Department of...

  17. The National Homeland Security Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — The National Homeland Security Research Center advances our nation's security by providing scientific products and expertise to improve the ability to respond to and...

  18. A Homeland Security Net Assessment Needed Now!

    Science.gov (United States)

    2015-12-01

    intellectual giant comparable to such nuclear strategists as Bernard Brodie, Herman Kahn, Henry Kissinger, James Schlesinger, and Albert Wohlstetter.”18 He...take such a broad approach and might serve as models for a homeland-security net assessment include Bruce Hoffman , “A First Draft of the History of

  19. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    .... The closed portions of the meeting will address threats to our homeland security, results of a cyber... regarding domestic and international threats to our homeland security; a presentation on the timely sharing... who wish to attack our cyber security, and hence, would certainly frustrate the successful...

  20. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  1. Premier Homeland Security Educator Awards 32 Master's Degrees

    OpenAIRE

    Center for Homeland Defense and Security

    2012-01-01

    Center for Homeland Defense and Security, PRESS RELEASES MONTEREY, Calif. – Thirty-two homeland security professionals earned a Master of Arts in Security Studies March 30 from the Naval Postgraduate School Center for Homeland Defense and Security (CHDS). The...

  2. Curriculum Evaluation and Revision in a Nascent Field: The Utility of the Retrospective Pretest-Posttest Model in a Homeland Security Program of Study

    Science.gov (United States)

    Pelfrey, William V., Sr.; Pelfrey, William V., Jr.

    2009-01-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent…

  3. Changing Homeland Security: An Opportunity for Competence

    National Research Council Canada - National Science Library

    Bellavita, Christopher

    2005-01-01

    ... -- not the partner in finding solutions. The result is a demoralized and dysfunctional public workforce. The American homeland can never be secure until the public workforce recreates the spirit of competent service so glaringly absent in the wake of Katrina.

  4. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2006-01-01

    .... In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists...

  5. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2007-01-01

    .... In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists...

  6. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  7. Homeland Security: A Selected Bibliography

    Science.gov (United States)

    2011-04-01

    handle.dtic.mil/100.2/ADA520027 16 Nuismer, Barbara A. Regional Civil Support Forces for Homeland Defense and Civil Support Missions. Strategy...OmniFile Kiefer , John J., and Robert S. Montjoy. "Incrementalism before the Storm: Network Performance for the Evacuation of New Orleans." Public

  8. Homeland Security: Scope of the Secretary's Reorganization Authority

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2005-01-01

    ...). Section 872 of the Homeland Security Act gives the Secretary of Homeland Security the authority to reorganize "functions" and "organizational units" within the Department either independently, 60...

  9. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  10. Homeland Security Department: FY2010 Appropriations

    Science.gov (United States)

    2009-12-14

    fund 90 90 150 100 120 100 Emergency food and shelter 200 100 300 100 200 175 200 Disaster assistance direct loan account — Homeland...National Preparedness Directorate’s ( NPD ) training, exercise, technological hazards and community preparedness programs to implement the National... NPD ). GPD programs include: • State Homeland Security Grant Program (SHSGP), • Firefighter Assistance Grants Program (FIRE), • Driver’s License

  11. U.S. Homeland Security R&D Budgets

    Energy Technology Data Exchange (ETDEWEB)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  12. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  13. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  14. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  15. 77 FR 26774 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-05-07

    ... could frustrate the successful implementation of measures designed to counter terrorist acts. Public.... SUMMARY: The Homeland Security Advisory Council (HSAC) will meet in person and members of the public may participate by conference call on May 24, 2012. The meeting will be partially closed to the public. DATES: The...

  16. Homeland Security Lessons for the United States

    National Research Council Canada - National Science Library

    Farr, Matthew

    2004-01-01

    ... world. The People's Republic of China and Singapore are the focus of this thesis in order to determine what if any homeland security policies developed by their governments could be used to better protect citizens of the United States. Several policies such as legislation, education and internal security measures were evaluated for the United States to institute. Each chosen policy is followed by a brief description of how these laws might come into being within the U.S. governmental system.

  17. Homeland Security. Management Challenges Facing Federal Leadership

    Science.gov (United States)

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  18. 78 FR 39301 - Committee name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-07-01

    ... leadership on matters relating to student and recent graduate recruitment; international students; academic... Academic Advisory Council AGENCY: Department of Homeland Security. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Academic Advisory Council (HSAAC) will...

  19. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  20. Homeland Security Affairs Journal, Volume III - 2007: Issue 3, September

    OpenAIRE

    2007-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. September 2007. Six years after the attacks of 9/11, the pra...

  1. Homeland Security Affairs Journal, Volume I - 2005: Issue 1, Summer

    OpenAIRE

    2005-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. June 2005. We are pleased to present the inaugural issue of ...

  2. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  3. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  4. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  5. 76 FR 56208 - Homeland Security Advisory Council, Correction

    Science.gov (United States)

    2011-09-12

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0063] Homeland Security Advisory Council... Committee Meeting; correction. SUMMARY: The Office of Policy published a notice of meeting for the Homeland Security Advisory Council in the Federal Register on September 6, 2011. The document contained an incorrect...

  6. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  7. Improving the all-hazards homeland security enterprise through the use of an emergency management intelligence model

    OpenAIRE

    Schulz, William N.

    2013-01-01

    CHDS State/Local As the all-hazards approach takes hold in our national Emergency Management and Homeland Security efforts and continues to seek greater collaboration between these two fields, an area that has yet to be explored to its fullest extent is the utilization of an intelligence process to enhance EM operations. Despite the existence of multiple Federal-level policies that outline the importance of intelligence and information sharing across the all-hazards community, EM is still ...

  8. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0079] Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--DHS/TSA-001 Transportation Security Enforcement...

  9. Setting Performance Objectives for Radiation Detection Systems in Homeland Security Applications - Economic Models

    International Nuclear Information System (INIS)

    Wood, Thomas W.; Bredt, Ofelia P.; Heasler, Patrick G.; Reichmuth, Barbara A.; Milazzo, Matthew D.

    2005-01-01

    This paper develops simple frameworks for cost minimization of detector systems by trading off the costs of failed detection against the social costs of false alarms. A workable system must have a high degree of certainty in detecting real threats and yet impose low social costs. The models developed here use standard measures of detector performance and derive target detection probabilities and false-alarm tolerance specifications as functions of detector performance, threat traffic densities, and estimated costs

  10. Economics definitions, methods, models, and analysis procedures for Homeland Security applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

    2010-01-01

    This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation & Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

  11. Setting Performance Objectives for Radiation Detection Systems in Homeland Security Applications - Economic Models

    Energy Technology Data Exchange (ETDEWEB)

    Wood, Thomas W.; Bredt, Ofelia P.; Heasler, Patrick G.; Reichmuth, Barbara A.; Milazzo, Matthew D.

    2005-04-28

    This paper develops simple frameworks for cost minimization of detector systems by trading off the costs of failed detection against the social costs of false alarms. A workable system must have a high degree of certainty in detecting real threats and yet impose low social costs. The models developed here use standard measures of detector performance and derive target detection probabilities and false-alarm tolerance specifications as functions of detector performance, threat traffic densities, and estimated costs.

  12. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    Science.gov (United States)

    2012-03-01

    reminders to stop procrastinating and newfound cooking skills, I not only would never have finished, I also may have starved. xvi THIS PAGE INTENTIONALLY...doctrine in developing a homeland security doctrine. There are limitations, however, in that the military model is a narrow view. To overcome this

  13. Radiation Detection for Homeland Security Applications

    Science.gov (United States)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will

  14. Proceedings and Presentations from the 2015 Homeland Security Education Summit

    OpenAIRE

    2015-01-01

    Proceedings: 9th Annual Homeland Defense and Security Education Summit The 9th Annual Homeland Defense and Security Education Summit was held on September 25-26, 2015 at the Hyatt Regency Hotel in Orlando Florida. The theme of the event was Evolving Homeland Security…

  15. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    Science.gov (United States)

    2015-06-01

    relating to prostitution, bookmaking, gambling, child pornography, or obscenity  White collar incidents elating to computer crimes  Controlled substance...Department CBRN chemical, biological, radiological, and nuclear CCS Cyber Crime Squad CEM Certified Emergency Manager CHDS Center for...both homeland security and emergency management funding for equipment, communications, and training; however, these benefits also caused challenges

  16. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  17. Environment and homeland security in France

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2011-01-01

    The author comments the impact of extreme events related to global warming and climate change on the French homeland security. He comments the evolution of temperature during the last century, the various transformations notably predicted by IPCC reports, and the various climate evolutions. Then, he discusses impacts of climate change on different economic sectors. He notably addresses the impact on coast lines (risks of submersion and erosion, more particularly for overseas territories), the impact extreme events may have on soft water (a temperature rise would impact the operation of nuclear plants; sewage and water networks will be threatened by more intense rainfalls), the positive and negative impacts on forests (high productivity but loss of diversity, development of parasites, risks of forest fires), and the impacts on various economic activities (agriculture, food supply, tourism, insurance) and on health

  18. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Homeland Security Compensation Committee. 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  19. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    National Preparedness: A Case Study in the Development of Public Policy,” Sam Clovis agrees that homeland security is a national issue but...recommends that state and local governments have maximum flexibility in implementing homeland security programs ( Clovis , 2006). He sees the federal...national preparedness ( Clovis , 2006). The author goes on to recommend a framework of “Collaborative Federalism” for homeland security. A review of

  20. Detecting objects in radiographs for homeland security

    Science.gov (United States)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  1. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 1974; Department of Homeland Security Office of Operations Coordination and Planning--002 National... notice titled, ``Department of Homeland Security Office of Operations Coordination and Planning--002... Security/Information Analysis and Infrastructure Protection--001 Homeland Security Operations Center...

  2. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ...; Department of Homeland Security Office of Operations Coordination and Planning--002 National Operations... Homeland Security Office of Operations Coordination and Planning--002 National Operations Center Tracker... Security/Information Analysis and Infrastructure Protection-- 001 Homeland Security Operations Center...

  3. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology... for appointment to Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The... serving on the Homeland Security Science and Technology Advisory Committee (HSSTAC). The HSSTAC gives...

  4. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... the Department of Homeland Security (DHS), Science and Technology Directorate, 1120 Vermont Avenue NW... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of Homeland Security...

  5. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting of...

  6. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  7. Public Health Specializations and Education Needs to Support Homeland Security

    National Research Council Canada - National Science Library

    Landguth, David C

    2006-01-01

    ... requirements for homeland security. Since public health professional needs as viewed by the Federal Government may be different from those viewed from a state or local/rural perspective, three distinct groups/areas were sampled and analyzed...

  8. Integrating Local Public Health Agencies into the Homeland Security Community

    National Research Council Canada - National Science Library

    Reed, Patricia D

    2007-01-01

    After more than seven years of funding through The Centers for Disease Control and Prevention, local public health agencies have made inconsistent progress in fulfilling their Homeland Security objectives...

  9. Top Ten Challenges Facing the Next Secretary of Homeland Security

    National Research Council Canada - National Science Library

    2008-01-01

    ... confront the next Secretary of Homeland Security. A core test for political leadership will be to make the hard choices on priorities and trade-offs between equally important programs and policies...

  10. Homeland Security: Scope of the Secretary's Reorganization Authority

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2005-01-01

    .... While many of the proposed changes may be effectuated administratively, some might require legislative action due to limits on reorganization authority under the Homeland Security Act of 2002 (P.L. 107-296...

  11. Public Health Specializations and Education Needs to Support Homeland Security

    Science.gov (United States)

    2006-03-01

    and Chemical Terrorism ?” the authors believe that a serious flaw associated with our public health strategy for homeland security is a lack of...Davis and Janice C. Blanchard, Are Local Health Responders Ready for Biological and Chemical Terrorism ? (Arlington, VA: RAND), 1-7, RAND, IP-221-OSD...Ready for Biological and Chemical Terrorism ?” have recognized that a serious flaw associated with our public health strategy for homeland security is a

  12. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    recreation, national defense, and tourism . To understand the maritime homeland security efforts put into place after 9/11 better, a study of the practices...targets (hotels, restaurants, movie theaters, train terminals, and hospitals ), heavily populated/trafficked areas, and unsecured facilities, were all...national defense, and tourism , so too must be the approach to maritime homeland security. This research examined only the role of state and local law

  13. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the threat of an electromagnetic pulse attack and its associated... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal...

  14. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Science.gov (United States)

    2010-07-29

    ... DEPARTMENT OF HOMELAND SECURITY Notice of Meeting of the Homeland Security Information Network... Security. ACTION: Notice of open meeting. SUMMARY: The Homeland Security Information Network Advisory... (Pub. L. 92-463). The mission of the Homeland Security Information Network Advisory Committee is to...

  15. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  16. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  17. Homeland Security: Air Passenger Prescreening and Counterterrorism

    National Research Council Canada - National Science Library

    Elias, Bart; Krouse, William; Rappaport, Ed

    2005-01-01

    ... of their persons or baggage, or to prevent them from boarding an aircraft in the event of a terrorist watch list hit, is likely to be a difficult proposition for the federal agencies tasked with aviation security...

  18. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Homeland Security Information Network Advisory... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet... posted beforehand at this link: http://www.dhs.gov/homeland-security-information-network-advisory...

  19. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  20. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    several practical institutions that guide our actions, including religion , etiquette, and law. The central purpose of moral philosophy is “to secure...to apply common sense and fairness in all I do and courage to stand against racism, sexism, anti-Semitism, homophobia and bigotry in all its forms

  1. 2009 Homeland Security Symposium and Exhibition

    Science.gov (United States)

    2009-09-10

    if the initial download is detected, the local service will not be seen via the network. Page 47 Bank Information For Sale Wachovia accounts for sale ...orders) State and Local Gov’t Purchase from IT and Security Recovery Act Purchasing 5 Contracts Account for 71% of Sales $0 $2,000,000,000...NETHERLANDS • Rotterdam • Venlo • Alexandria • El Dekheila EGYPT KOREA • Gwangyang • Busan • Cristobal • Balboa PANAMA MEXICO • Veracruz • Ensenada

  2. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  3. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal.... Postal Service Mail to Jeffery Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security...

  4. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal..., Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445...

  5. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting... Analysis Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  6. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications...

  7. Homeland Security Strategic Research Action Plan 2012 - 2016

    Science.gov (United States)

    EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.

  8. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-03-04

    ... early if the committee has completed its business. ADDRESSES: The meeting will be held at Ronald Reagan... advantage of DHS internship and job opportunities; how to define the core elements of a homeland security... Management Agency's (FEMA) Emergency Management Institute and the higher education community to support...

  9. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data

  10. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    Science.gov (United States)

    2012-12-01

    Intelligence Analysis (Washington DC: CQ Press, 2011), 123. 184 Ropert Bood and Theo Postma, “Scenario Analysis as a Strategic Management Tool” (Groningen...chain. Much of the analysis in this design uses the agency’s strengths, weaknesses, opportunities, and threats ( SWOT ) or SWOT model, to underpin plans...Safari: A Guided Tour through the Wilds of Strategic Management , 1st ed. (New York: Free Press, 1998), 5. 19 Ibid., 24. 20 Ibid., 32. 21 Ibid., 38

  11. A Department of Homeland Security Reserves (DHS-R): Simultaneously Protecting the Homeland While Alleviating the Increased DoD Role in Homeland Defense and Security

    National Research Council Canada - National Science Library

    Schulz, David V

    2007-01-01

    .... The Department of Homeland Security does not directly address a conceited volunteer effort; instead it provides limited support for volunteer initiatives like Citizen Corps, which can be improved by a more concerted nation-wide effort like a DHS-Reserve...

  12. The Development and Recognition of Homeland Security Law

    Science.gov (United States)

    2007-03-01

    Reserve University, Professor Michael Greenberger from the University of Maryland, Mr. Thomas Balint , Deputy Attorney General for the state of New...natural disasters. Thomas Balint has been with the New Jersey Attorney General’s Office and working specifically with Emergency Management personnel...Emergency Management and Homeland Security Law. Mr. Balint notes that Emergency Management has traditionally focused on the response and recovery to

  13. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    management framework under the NIPP, examines how implementation has been managed as strategic change through the lens of change management theory ...implementation has been managed as strategic change through the lens of change management theory , and offers recommendations for improvement. It is...framework been handled as strategic change in homeland security policy? How might change management theory and practice be applied to assess the

  14. The National Guard: A Future Homeland Security Paradigm?

    Science.gov (United States)

    2002-05-14

    deeply etched in our minds on September 11, 2001. What has changed is our understanding of how terrorists will export or embrace the use of...allow ourselves to become overconfident about the security of our homeland.”93 Our new understanding of how terrorists will export and embrace weapons of...Central and South America extending in the Pacific to the Galapagos Island. The U. S. Atlantic Fleet provides fully trained, combat ready forces to

  15. 75 FR 18857 - Privacy Act of 1974; Department of Homeland Security Citizenship and Immigration Services...

    Science.gov (United States)

    2010-04-13

    ... 1974; Department of Homeland Security Citizenship and Immigration Services Ombudsman-001 Virtual..., ``Department of Homeland Security Citizenship and Immigration Services Ombudsman-001 Virtual Ombudsman System... to aid the Citizenship and Immigration Services Ombudsman in providing assistance to individuals...

  16. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY... Fullano, Associate Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission...

  17. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  18. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... increased cyber threats across the Nation, the National Initiative for Cybersecurity Education (NICE... DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and...

  19. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-09-19

    ... Cybersecurity Initiative (CNCI). In response to increased cyber threats across the Nation, the National... DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and...

  20. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    .... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the Homeland Security Information Network (HSIN) Program Office...

  1. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... after Sept. 12: http://www.dhs.gov/homeland-security-science-and-technology-advisory-committee-hsstac... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  2. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  3. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Science.gov (United States)

    2011-02-16

    ... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) United States Citizenship and...

  4. 2010 Homeland Security Conference Brings Key National Security Experts to NPS

    OpenAIRE

    Naval Postgraduate School Public Affairs Office

    2010-01-01

    With the recent anniversary of September 11 providing a somber reminder to the importance of their mission, experts from around the country gathered for the 4th Annual Homeland Security Conference held at the Naval Postgraduate School (NPS).

  5. Communicating Health Risks under Pressure: Homeland Security Applications

    International Nuclear Information System (INIS)

    Garrahan, K.G.; Collie, S.L.

    2006-01-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  6. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... facilities or information technology systems; and other activities relating to personnel security management... 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY... Homeland Security/ALL--023 Personnel Security Management System of Records to include record systems within...

  7. Wireless sensors and sensor networks for homeland security applications.

    Science.gov (United States)

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  8. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its third meeting on October...

  9. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Security, Reliability, and Interoperability Council (CSRIC III) scheduled for December 5, 2012, at Federal...

  10. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fourth meeting on...

  11. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... renewal of the charter of the Homeland Security Science and Technology Advisory Committee (HSSTAC) is... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410..., cyber-security, knowledge management and how best to leverage related technologies funded by other...

  12. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... Security Science and Technology Advisory Committee (HSSTAC) is necessary and in the public interest in connection with the Department of Homeland Security, Science and Technology Directorate's performance of its... Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington, DC 20528...

  13. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) would meet on September 27-28, 2012 in... of Homeland Security (DHS), Science and Technology Directorate, 1120 Vermont Avenue NW., (Room 5-212... Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of Homeland Security...

  14. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Executive Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how...

  15. 75 FR 76465 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council Meeting AGENCY: Federal..., Public Safety and Homeland Security Bureau. [FR Doc. 2010-30858 Filed 12-7-10; 8:45 am] BILLING CODE 6712...

  16. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  17. U.S. Army Corps of Engineers: The Nation's Homeland Security Engineers

    National Research Council Canada - National Science Library

    McDaniel, Everett

    2003-01-01

    .... Federal, state, and local governments as well as the private sector share responsibility for critical physical infrastructure security and for preparedness and response to attacks against the homeland...

  18. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    small combustion turbines, solid oxide and other fuel cells, photovoltaics, superconducting magnetic energy storage (SMES), transportable battery...Production Food Processing Pharmaceuticals FoodFood Industrial Production Chemical Production Textiles Plastics Food Food Processing Cosmetics ...Objective 3 Relevance To Homeland Security 4 Care Givers During SARS Healthcare providers acquired SARS despite despite masks and respirators Toronto

  19. An Interagency Command for Homeland Protection: Taking the Next Steps to Integrate Defense and Security at the Operational Level

    National Research Council Canada - National Science Library

    Sene, Darren E

    2005-01-01

    .... After four years, these new organizations are still wrestling with fundamental questions that require definitive answers in order to shape an effective homeland security and homeland defense solution...

  20. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... activities from frustrating these processes; to protect the identities and physical safety of confidential...; Department of Homeland Security Transportation Security Administration-023 Workplace Violence Prevention... Administration-023 Workplace Violence Prevention Program System of Records and this proposed rulemaking. In this...

  1. 78 FR 25282 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-008...

    Science.gov (United States)

    2013-04-30

    ... Homeland Security (DHS)/Federal Emergency Management Agency (FEMA)-008 System name: DHS/FEMA-008 Disaster... Management Information System- Individual Assistance (NEMIS-IA), and Enterprise Data Warehouse/ Operational... 1974; Department of Homeland Security Federal Emergency Management Agency--008 Disaster Recovery...

  2. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    this will have long-term policy implications for homeland security. Two masters students at the Naval Postgraduate School, Tappan Sen and Manuel...Transportation Committee 1 Senate Homeland Security & Governmental Affairs Committee 15 Senate Small Business & Entrepreneurship 1 Senate Special... Entrepreneurship (b) Study and survey by means of research and investigation all problems of American small business enterprises 51 The Select

  3. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Science.gov (United States)

    2010-03-09

    ... of 1974: Implementation of Exemptions; Department of Homeland Security United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records System of Records AGENCY... rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Immigration...

  4. A multisignal detection of hazardous materials for homeland security

    Directory of Open Access Journals (Sweden)

    Alamaniotis Miltiadis

    2009-01-01

    Full Text Available The detection of hazardous materials has been identified as one of the most urgent needs of homeland security, especially in scanning cargo containers at United States ports. To date, special nuclear materials have been detected using neutron or gamma interrogation, and recently the nuclear resonance fluorescence has been suggested. We show a new paradigm in detecting the materials of interest by a method that combines four signals (radiography/computer tomography, acoustic, muon scattering, and nuclear resonance fluorescence in cargos. The intelligent decision making software system is developed to support the following scenario: initially, radiography or the computer tomography scan is constructed to possibly mark the region(s of interest. The acoustic interrogation is utilized in synergy to obtain information regarding the ultrasonic velocity of the cargo interior. The superposition of the computer tomography and acoustic images narrows down the region(s of interest, and the intelligent system guides the detection to the next stage: no threat and finish, or proceed to the next interrogation. If the choice is the latter, knowing that high Z materials yield large scattering angle for muons, the muon scattering spectrum is used to detect the existence of such materials in the cargo. Additionally, the nuclear resonance fluorescence scan yields a spectrum that can be likened to the fingerprint of a material. The proposed algorithm is tested for detection of special nuclear materials in a comprehensive scenario.

  5. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    by the nation’s big cities. 98 Richard Clarke and Rand Beers , The Forgotten Homeland (New York...99 Clarke and Beers , Forgotten Homeland, 60. 100 “Mayor Testifies for Homeland Security Funds in Washington,” NY1 News...insight into the dangers associated with regionalization, there may be no reason to suspect there is a problem brewing . The potential failure of

  6. 78 FR 19442 - Public Safety and Homeland Security Bureau Seeks To Refresh the Record Regarding Options for...

    Science.gov (United States)

    2013-04-01

    ... (Commission) Public Safety and Homeland Security Bureau (PSHSB) seeks to refresh the record regarding the... CONTACT: Eric Ehrenreich, Policy and Licensing Division, Public Safety and Homeland Security Bureau, at..., Public Safety and Homeland Security Bureau. [FR Doc. 2013-06814 Filed 3-29-13; 8:45 am] BILLING CODE 6712...

  7. 77 FR 52633 - Public Safety and Homeland Security Bureau Seeks Comment on Post-Reconfiguration 800 MHz Band...

    Science.gov (United States)

    2012-08-30

    ... border. The Public Safety and Homeland Security Bureau (Bureau), by this action, affords interested... INFORMATION CONTACT: Brian Marenco, Policy and Licensing Division, Public Safety and Homeland Security Bureau... 2007, the Commission delegated authority to Public Safety and Homeland Security Bureau to propose and...

  8. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    .... Treatment provided and/or procedures. Transfer of care, refusal of care, and/or transportation mode and... 1974; Department of Homeland Security ALL--034 Emergency Care Medical Records System of Records Notice... Homeland Security system of records titled, ``Department of Homeland Security/ ALL--034 Emergency Care...

  9. Defining the Role and Responsibility of the Fire Service Within Homeland Security

    Science.gov (United States)

    2010-03-01

    safety of New York City and homeland security efforts. (Office of Public Information 2008, p. 32) The organization chart found on page 22 of the...within and outside of the greater London response area. The organization chart , Figure 2 demonstrates the commitment and acceptance of the homeland

  10. 78 FR 10623 - Privacy Act of 1974; Department of Homeland Security Immigration and Customs Enforcement-007...

    Science.gov (United States)

    2013-02-14

    ... the context of a criminal justice matter; prioritization of requests; research conducted by ICE during... 1974; Department of Homeland Security Immigration and Customs Enforcement-007--Alien Criminal Response... Customs Enforcement-007--Law Enforcement Support Center Alien [[Page 10624

  11. United States and Israeli Homeland Security: A Comparative Analysis of Emergency Preparedness Efforts

    National Research Council Canada - National Science Library

    Pockett, Consuella B

    2005-01-01

    This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland Security's Emergency Preparedness and Response directorate and the Israel Defense Forces Home Front Command...

  12. The State and Local Mission for Homeland Security - where we started, where we are headed [video

    OpenAIRE

    Mitchell, Andy; Center for Homeland Defense and Security Naval Postgraduate School

    2014-01-01

    Andy Mitchell, Director of Operations for the National Preparedness Directorate (FEMA), talks about the evolution of homeland security and how state and local agencies have been moving to develop a more strategic regional approach focused on all aspects of preparedness.

  13. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  14. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  15. HOMELAND SECURITY: Intergovernmental Coordination and Partnership Will Be Critical to Success

    National Research Council Canada - National Science Library

    2002-01-01

    .... Moreover, formation of a department should not be considered a replacement for the timely issuance of a national homeland security strategy, which is needed to guide implementation of the complex...

  16. Homeland Security-Related Education and the Private Liberal Arts College

    OpenAIRE

    Moore, Gregory; Hatzadony, John G.; Cronin, Kelley; Breckenridge, Mary B.

    2010-01-01

    This article appeared in Homeland Security Affairs (May 2010), v.6 no.2 Small private liberal arts colleges enjoy certain advantages when developing new academic programs, such as in homeland security-related education. These institutions offer students the opportunity to acquire a broad-based education in order to gain a holistic view of the world, a critical need in this age of global challenges. Smaller colleges can also adapt more quickly to changes in the marketplace and are able to d...

  17. How to Prepare the National Guard’s Leadership for Successful Venture in Homeland Security

    Science.gov (United States)

    2009-09-01

    Homeland Defense and Security. This course was designed to provide the “knowledge required of the homeland security professional” (Supinski, Syllabus -NS...character of, esp . by formal schooling; teach;” or in simpler terms used by Admiral Art Cebrowski “you train for the known and educate for the... designed for the NG. The thought prompting this recommendation is that the military could then develop training programs to ready the NG units for these

  18. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... biometric information to TSA. TSA will use the information to conduct a security threat assessment of law... biometric identifier, including photograph; (f) Control number, Social Security Number (SSN), or other... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0040] Privacy Act of...

  19. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    homeland defense efforts and to coordinate defense support of civil authorities.”52 This double bind affects all aspects of a domestic response. For...Guard and the modern SDF. A. THE EARLY COLONIAL MILITIA 1607–1754 Based on the fear of despotism, early colonial leaders avoided the idea of a...defense, the British government began to impose a series of taxes without offering the colonials a voice in parliament to protest, hence, taxation

  20. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011.... Individuals who are granted parole into the United States under section 212(d)(5) of the Immigration and... national security by arresting, detaining, and removing persons from the United States in accordance with...

  1. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  2. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ... facility and perimeter access control and visitor management systems often overlap with other security... Homeland Security/ALL 026--Personal Identity Verification Management System of Records, June 25, 2009... controlled facilities and information systems while enhancing security, increasing efficiency, reducing...

  3. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... 1974; Department of Homeland Security/ALL-004 General Information Technology Access Account Records..., Department of Homeland Security/ALL-004 General Information Technology Access Account Records System of... name: DHS/ALL-004 General Information Technology Access Account Records System of Records. Security...

  4. 76 FR 39245 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-07-06

    ...; correction. SUMMARY: The Department of Homeland Security published in the Federal Register of May 13, 2011 a... Security, Washington, DC 20528. SUPPLEMENTARY INFORMATION: The Department of Homeland Security published a...;to and codified in the Code of Federal Regulations, which is published #0;under 50 titles pursuant to...

  5. Will Climate Change the Future of Homeland Security

    Science.gov (United States)

    2016-09-01

    rail terminals, roads, bridges, locks, canals, light rail , subways, freight and commuter railways; and pipelines.201 The Committee on Climate Change...IBSGP Intercity Bus Security Grant Program IPR Intercity Passenger Rail -AMTRAK Program NIMS National Incident Management System NIPP National... runoff from adjacent facilities in heavily populated coastal areas or carried long distances by rivers flowing into estuaries and coastal waters.24

  6. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0003] Privacy Act of... Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act... name and location of a person calling for help buried under rubble, or hiding in a hotel room when the...

  7. 75 FR 8377 - Privacy Act of 1974; Department of Homeland Security Immigration and Customs Enforcement-007...

    Science.gov (United States)

    2010-02-24

    ... the context of a criminal justice matter; prioritization of requests; research conducted by ICE during... 1974; Department of Homeland Security Immigration and Customs Enforcement-007 Alien Criminal Response... Enforcement Support Center Alien Criminal Response Information Management System of Records (73 FR 74739...

  8. 77 FR 33605 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2012-06-07

    ... operations center for the Department of Homeland Security.'' Through the NOC, OPS provides real-time..., although the National Operations Center (NOC) may receive information from a fusion center. Such... Department notes that the NOC is authorized by law to be ``the principal operations center for the Department...

  9. 76 FR 42005 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-07-18

    ... of Homeland Security Office of Operations Coordination and Planning-002 National Operations Center... of Operations Coordination and Planning -002 National Operations Center Tracker and Senior Watch... requirements. The system of records is the DHS/OPS-002 National Operations Center Tracker and Senior Watch...

  10. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Science.gov (United States)

    2012-11-02

    ... address homeland security priorities, from responding to natural disasters to preventing terrorism, by...) The nomination process and selection criteria for members of the Council shall be established by the... their agendas, and coordinate their work. The Council may establish subgroups consisting exclusively of...

  11. 78 FR 24669 - Reorganization of Regulations on the Adjudication of Department of Homeland Security Practitioner...

    Science.gov (United States)

    2013-04-26

    ... Docket No. 174; A.G. Order No. 3384-2013] RIN 1125-AA66 Reorganization of Regulations on the Adjudication.... Reorganization of Regulations on the Adjudication of Department of Homeland Security Practitioner Disciplinary... intermingled the responsibilities of the former INS and EOIR, this transfer required a reorganization of title...

  12. Texas should require homeland security standards for high-speed rail

    OpenAIRE

    Polunsky, Steven M.

    2015-01-01

    Approved for public release; distribution is unlimited A private corporation is proposing a high-speed intercity passenger train system to operate between Dallas and Houston usingJapanese technology and methods. This project brings with it an array of unique and unprecedented homeland security issues. Train bombings in Madrid and London and attacks on high-speed trains elsewhere raise questions about the security of such transportation. A modern high-speed rail system is a network of poten...

  13. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... systems. CBP uses routers, firewall and intrusion detection systems to prevent unauthorized access to its... of Homeland Security/U.S. Customs and Border Protection--007 Border Crossing Information System of.... Customs and Border Protection system of records entitled the, ``Department of Homeland Security/U.S...

  14. 78 FR 70313 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-11-25

    .... By DHS policy, the confidentiality provisions for asylum seekers and asylees have been extended to... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services--008 Refugee Access... of records titled, ``Department of Homeland Security/United States Citizenship and Immigration...

  15. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  16. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false All other CBP regulations issued under the authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY...

  17. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    International Nuclear Information System (INIS)

    Burns, Kimberly A.

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination. Monte Carlo calculations were performed to simulate healthcare workers in the operating room or trauma room at a hospital. The Monte Carlo Neutral Particle transport code MCNP5 was used for the modeling. The human body was modeled using Medical Internal Radiation Dose (MIRD-V) anthropomorphic phantoms originally developed at Oak Ridge National Laboratory (ORNL) under the specifications of International Commission on Radiation Protection (ICRP) Publication 23 and later altered at Georgia Tech (17). This study considered two possible contamination scenarios: uniform external contamination with no internal contamination and inhaled radioactive material without any external contamination. For both scenarios, the patients isotopes considered were 60 Co, 137 Cs, 131 I, 192 Ir, and 241 Am. For the externally contaminated patient, a uniform volume source two millimeters thick was placed around the skin of each anthropomorphic phantom to simulate a uniform source on the surface of the body. For the internally contaminated patients, the Dose and Risk Calculation software, DCAL, was used to determine the distribution of the isotopes in the internal organs. For both of the scenarios, the healthcare provider was placed 20-cm from the middle of the torso of the contaminated patient. The amount of energy deposited to the tissues and organs of the healthcare provider due to the internally and externally contaminated patients and in the patient in the case of external contamination was determined. The effective dose rate was calculated using the masses of the tissues and organ and tissue weighting factors from ICRP Publication 60. The effective dose rate for the

  18. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  19. The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

    Science.gov (United States)

    2010-03-19

    threat information and other intelligence that supports their risk management decision making. Former Under Secretary Charles Allen noted that “ virtually ...unclassified intelligence products. The Homeland Security State and Local Intelligence Community of Interest (HS-SLIC) is a nationwide, virtual community of...and the U.S. Attorney’s offices, and state and local law enforcement. The Mexican law enforcement agency Secretaria de Seguridad Publica is a partner

  20. Groupthink: A Significant Threat to the Homeland Security of the United States

    Science.gov (United States)

    2014-12-01

    had a devil’s advocate present. The study discovers that regardless of the gender composition of the groups, significantly lower quality decisions...effective attack against Pearl Harbor because Japan was too heavily engaged in other conflicts in Asia . Even after this catastrophic failure and...www.cbsnews.com/news/toxic-morale-crippling-air-marshals/. 151 Department of Homeland Security, Allegations of Misconduct and Illegal Discrimination and

  1. Intelligence-led risk management for homeland security: a collaborative approach for a common goal

    OpenAIRE

    Jackson, David P.

    2011-01-01

    CHDS State/Local The concept of risk management provides the foundation of the homeland security enterprise. The United States of America faces numerous complex risks ranging from a series of natural hazards, pandemic disease, technological hazards, transnational criminal enterprises and acts of terrorism perpetrated by intelligent adversaries. The management of these risks requires a strategic collaborative effort from the intelligence and risk analysis communities and many stakeholders a...

  2. How Should Municipal Police Agencies Participate in America’s Homeland Security Strategy?

    Science.gov (United States)

    2008-12-01

    es s C o m p o n en t Pr ev en ti o n C o m p o n en t In ve st ig at io n C o m p o n en t Municipal Homeland Security Programs are constructed...related to Terrorism. Washington D.C.: Government Printing Office, 2004. Gill, Peter, and Mark Prythian. Intelligence in an Insane World

  3. The U.S. Navy's Role in Executing the Maritime CONOPS for U.S. Homeland Security/Defense

    National Research Council Canada - National Science Library

    Young, Eric

    2002-01-01

    .... Homeland Security and Defense (HLS/D). The Navy's role in Maritime HLS/D is to support the Coast Guard, however, the Coast Guard does not have the resources available to combat this problem alone...

  4. Enabling private and public sector organizations as agents of homeland security

    Science.gov (United States)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  5. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    Science.gov (United States)

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  6. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    Science.gov (United States)

    2008-12-01

    it. Kurt Lewin David Nadler and Michael Tushman suggest different types of organizational change in “Organizational Frame Bending: Principles for...Security102 This model can serve as an effective mechanism to not only assist USCIS but also other DHS components in future organizational change ...IMMIGRATION SYSTEM AFTER 9/11: THE IMPACT OF ORGANIZATIONAL CHANGE AND COLLABORATION IN THE CONTEXT OF HOMELAND SECURITY by David Wolfe

  7. Integrating public health and medical intelligence gathering into homeland security fusion centres.

    Science.gov (United States)

    Lenart, Brienne; Albanese, Joseph; Halstead, William; Schlegelmilch, Jeffrey; Paturas, James

    Homeland security fusion centres serve to gather, analyse and share threat-related information among all levels of governments and law enforcement agencies. In order to function effectively, fusion centres must employ people with the necessary competencies to understand the nature of the threat facing a community, discriminate between important information and irrelevant or merely interesting facts and apply domain knowledge to interpret the results to obviate or reduce the existing danger. Public health and medical sector personnel routinely gather, analyse and relay health-related inform-ation, including health security risks, associated with the detection of suspicious biological or chemical agents within a community to law enforcement agencies. This paper provides a rationale for the integration of public health and medical personnel in fusion centres and describes their role in assisting law enforcement agencies, public health organisations and the medical sector to respond to natural or intentional threats against local communities, states or the nation as a whole.

  8. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Madhavi Z [ORNL; Wullschleger, Stan D [ORNL; Vass, Arpad Alexander [ORNL; Martin, Rodger Carl [ORNL; Grissino-Mayer, Henri [ORNL

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  9. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... SYSTEM: Records include biographic and biometric information; intelligence requirements, analysis, and... intelligence analysis and reporting. M. To a Federal, State, local, Tribal, territorial, foreign, or... Security Intelligence Service Operations Files Systems of Records AGENCY: Privacy Office, DHS. ACTION...

  10. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... routine uses involving sharing with the Department of State and other Intelligence Community agencies... need to know the information to carry out national security, law enforcement, immigration, intelligence... administrative body, when it is necessary to the litigation and one of the following is a party to the litigation...

  11. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... identifier, and photograph. (h) Date, place, and type of flight training or other instruction. (i) Control... the enforcement of civil or criminal laws. Additionally, DHS/TSA is revising a routine use by adding... credentials or grant clearances to secured areas in transportation facilities when relevant to such employment...

  12. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Science.gov (United States)

    2010-04-13

    ... embodies fair information principles in a statutory framework governing the means by which the United... information pertinent to the individual's fitness and qualifications for the FFDO program. O. To airport... retrieved by name, address, social security, and account number or other assigned tracking identifier of the...

  13. Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense

    Science.gov (United States)

    2012-05-17

    four hijacked airplanes in the sky that day, crashed into the North Tower of the World Trade Center ( WTC ). Exactly 15 minutes later, United...Airlines Flight 175 hit the South Tower of the WTC . At 9:37 am, American Airlines Flight 77 struck the Pentagon. By 10:02 am, United Airlines Flight 93, the...security geared to their specific agencies’ requirements and not to a joint operating mindset.53 Because of the attacks on the Pentagon and WTC

  14. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    Protection’s office responsible for securing the United States’ land border in the Detroit area. PoD provides a wide rage of cargo processing functions...unloaded a truck, CBP agents search through the cargo. They open boxes, use hand-held radiation detectors, canines , and x-ray machines to inspect the... canines are used in conjunction with each of these search procedures. The complete unloading and search of cargo is conducted at a state of the art

  15. Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications

    International Nuclear Information System (INIS)

    Reijonen, Jani

    2006-01-01

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented

  16. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Homeland Security System of Records and will consist of information that is created and used by the Department's Historian, and component historians. As a result of the biennial review of this system, updates... classified, sensitive, and unclassified information; system location to reflect the move of the History...

  17. Rules And A Rubric Could Be Used To Assess The Openness Of A Homeland Security Enterprise Social Network

    Science.gov (United States)

    2016-12-01

    University, 2008 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND...in Proceedings of the 6th International Symposium on Wikis and Open Collaboration, art . 11. Gdansk, Poland—July 07–09, 2010 (New York: ACM, 2010...footnotes/may2010/in_defense_of_wikipedia_bonnett. 166 Dariusz Jemielniak, Common Knowledge?: An Ethnography of Wikipedia (Stanford, CA: Stanford

  18. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    equipment and training to better the region’s preparedness for earthquakes . This is essential in setting the communities expectations and... earthquake plans for the three regions primary affected by earthquakes present well thought-out models of vertically synchronized preparedness that others...ABSTRACT (maximum 200 words) National preparedness doctrine has constantly evolved to address the pressing hazards and threats the country faces

  19. Design of a sensor network system with a self-maintenance function for homeland security applications

    International Nuclear Information System (INIS)

    Fujiwara, Takeshi; Takahashi, Hiroyuki; Iyomoto, Naoko

    2008-01-01

    In this study, we develop a new concept of a robust wireless sensor network for homeland security applications. The sensor system consists of intelligent radiation sensors that can communicate each other through the wireless network. This structure can cover a wide area with a flexible geometry which is suitable for detecting a moving object with a detectable radiation source. Also, it has a tolerance against both the partial node's failure and packet errors; realized by a Self-Maintenance function. The Self-maintenance function is a function that enables an artifact to find, diagnosis and fix the trouble automatically and maintain itself. So far some approaches have been tried to realize robust monitoring system by applying the idea of multiplex system, based on ''2 out of 3'', but this requires a large amount of the hardware and is not suitable for sensor network systems. We designed a sensor network system with Self-Maintenance function based on qualitative reasoning technique for robust wireless sensor network system, and an instrument network based on ZigBee has been set up for investigations. CsI(Tl) gamma-ray detectors are used as sensors. The network system picks up correlation signals from sensors even some of sensors send false signals, which can be used as a reliable detection system for practical use. (author)

  20. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  1. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    Energy Technology Data Exchange (ETDEWEB)

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  2. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  3. One Team, One Mission, Securing Our Homeland: U.S. U.S. Department of Homeland Security Strategic Plan, Fiscal Years 2008 - 2013

    National Research Council Canada - National Science Library

    Chertoff, Michael

    2008-01-01

    .... While the Department was created to secure our country against those who seek to disrupt the American way of life, our charter also includes preparation for and response to all hazards and disasters...

  4. Economies of Scale: 9-1-1 Center Consolidation as a Means to Strengthen the Homeland Security Enterprise

    Science.gov (United States)

    2014-03-01

    sharing of these resources. Thus, PSAP consolidation might be considered a “ smart practice” for the homeland security enterprise...personnel at shift changes, team meetings or “roll calls,” working conditions (building, equipment, furniture , etc.) and actual interactions of...in the region. Each work station included desk furniture and computer, telephone, and radio equipment, all of which incurs cost for maintenance and

  5. General Multidecision Theory: Hypothesis Testing and Changepoint Detection with Applications to Homeland Security

    Science.gov (United States)

    2014-10-06

    Manuscript, 1977. [4] I. V. Pavlov . Sequential procedure of testing composite hypotheses with applications to the Kiefer-Weiss problem. Theory of...SECURITY CLASSIFICATION OF: The objective was to develop general theories of sequential hypothesis testing and quickest change detection for complex...multi-population stochastic models, as well as to apply these theories to automatic threat detection and classification with low false alarm and miss

  6. Federal Register: The President. Amendment of Executive Orders, and Other Actions, in Connection with the Transfer of Certain Functions to the Secretary of Homeland Security. Part 4

    National Research Council Canada - National Science Library

    Bush, George

    2003-01-01

    Act of 2002 (Public Law 107 296) and section 301 of title 3, United States Code, and in order to reflect the transfer of certain functions to, and other responsibilities vested in, the Secretary of Homeland Security, the transfer...

  7. Changing the paradigm: a radiation protection model for utilizing active systems in homeland defense applications

    International Nuclear Information System (INIS)

    Hertel, Nolan E.; Shannon, Michael P.

    2008-01-01

    Full text: The emerging threat from non-state actors and terrorist organizations openly asserting the use of weapons of mass destruction has led to an increased global emphasis on homeland defense and national security. The threat is real and thus many states are spending large amounts of resources to combat the problem. Issues such as unsecured radioactive sources, illicit movement of nuclear material, the use of radioactive sources in the medical and industrial sectors are just a few of the areas being examined. Countering these threats involves a major paradigm shift in the manner in which radiation is viewed. Radiation-based technologies are playing a key role in this emerging area from the development of new passive detection modalities to the use of active systems for detecting illicit materials. The screening of humans, baggage and cargo present overwhelming challenges. With these developments comes the concern from both governmental agencies and the public as to the safety of such systems. This paper will explore one such modality; the employment of radiation-based illicit material detection systems. The authors will present a review of the international (IAEA) and US regulatory and statutory documents as well as recommendations from scientific bodies such as the International Commission on Radiological Protection and the International Commission on Radiation Units and Measurements. This review coupled with sound scientific data are used to develop a proposed framework for the future employment of active systems for homeland defense applications. Issues considered include the ability to effectively measure and/or predict dose, is the As Low As Reasonably Achievable (ALARA) concept appropriate?, how much dose should be allowed relative to national security?, where does the linear-no-threshold hypothesis fit in? The authors use this analysis to develop a model which examines the trade-offs and cost-benefits in using the proposed systems. The major findings of

  8. The Department of Homeland Security’s Role in Protecting the National Economy

    Science.gov (United States)

    2017-09-01

    Revolution: A New Customs Security Framework to Secure and Facilitate Small Business eCommerce (New York: Center for Strategic and International Studies...Security Framework to Secure and Facilitate Small Business eCommerce . New York: Center for Strategic and International Studies, Rowman and Littlefield

  9. 75 FR 69689 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2010-11-15

    ...; domestic security and emergency management officials; and private sector entities or individuals into the... organizations; domestic security and emergency management officials; and private sector entities or individuals...; domestic security and emergency management officials; and private sector entities or individuals; and 2...

  10. Creation of a United States Emergency Medical Services Administration Within the Department of Homeland Security

    Science.gov (United States)

    2012-03-01

    fragmentally shared amongst the three primary departments. Critics argue that: Unlike the fire service, with its home in the Department of Homeland...policy and measures.28 Already significantly impacted by overuse, emergency room diversions and healthcare facility shutdowns , EMS systems in the...Professionals During Disasters, Pandemics, and Other Extreme Emergencies,” Prepared for the American Nurses Association by the Center for Health Policy

  11. Fortress America: The Aesthetics of Homeland Security in the Public Realm

    Science.gov (United States)

    2017-09-01

    perceived threat of a terrorist attack in public spaces. Architecture has sociological, psychological , and cultural effects, as well as security impacts...open, attractive, and promote both physical and psychological security? This thesis is a starting point for broader awareness and discussion within...sociological, psychological , and cultural effects, as well as security impacts, but there is little research or discourse on the physical manifestation of

  12. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... information to carry out their national security, law enforcement, immigration, intelligence, or other... before any court, adjudicative, or administrative body, when it is relevant or necessary to the...

  13. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-09-29

    ... standard law enforcement and national security exemptions exercised by a large number of federal law... enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also..., and administrative enforcement requirements. DATES: Comments must be received on or before October 31...

  14. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... apprehension. The exemptions proposed here are standard law enforcement and national security exemptions... enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also... criminal, civil, and administrative enforcement requirements. DATES: Comments must be received on or before...

  15. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    ..../Mexico highway carriers; rail and sea carriers; licensed U.S. Customs brokers; U.S. marine port authority... World Customs Organization accredited security program administered by a foreign customs authority... 1974; Department of Homeland Security, U.S. Customs and Border Protection--DHS/CBP-018--Customs--Trade...

  16. 76 FR 8758 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-002...

    Science.gov (United States)

    2011-02-15

    ... screen activity in the National Emergency Management Information System for both call-related customer... desktop screen as they perform work in National Emergency Management Information System (NEMIS); (3) Avaya... System (QARS). Security classification: Unclassified. System location: Federal Emergency Management...

  17. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  18. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Information System (NEMIS)--Mitigation (MT) Electronic Grants Management System of Records,'' and retitle it... Security, Federal Emergency Management Agency is proposing changes to the following: (1) System name: (2... Information System (NEMIS)--Mitigation (MT) Electronic Grants Management System of Records (69 FR 75079...

  19. Compliance Issues and Homeland Security with New Federal Regulations for Higher Education Institutions

    Science.gov (United States)

    Valcik, Nicolas A.

    2010-01-01

    Research advancements into different fields of study have increased the risks for accidents, criminal acts, or a potential breach of national security, and the types of hazardous materials (HAZMAT) stored and used at universities and colleges are under new scrutiny. Before, a chemistry laboratory might only have basic substances such as sulfur,…

  20. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Science.gov (United States)

    2011-06-14

    ... of the accounting would therefore present a serious impediment to law enforcement efforts and/or...-Terrorism Standards Personnel Surety Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism Standards...

  1. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  2. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    Science.gov (United States)

    2015-06-01

    theoretical approaches and facts, it will put together a picture of what that animal might look like—in other words, suggest a pattern in the gestalt ...222 Catarina Kinnvall, “Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security. Political Psychology 25...Management Policy,” Culture & Psychology 12, no. 4 (2006): 421. 255 Moghaddam, How Globalization Spurs Terrorism, 97–98. 256 Moghaddam

  3. 2010 Homeland Security Symposium and Exhibition Held in Arlington, Virginia on September 28-29, 2010

    Science.gov (United States)

    2010-09-29

    email database leaked after hack” • “Cyber takes centre stage in Israel’s war strategy” • “Iran confirms massive Stuxnet infection of industrial...Search and Rescue Victim First Response to the Haiti Earthquake Disaster • Aftershocks from 1/12/2010 – 2/5/2010 – M6.0 occurred 7 minutes after quake ... EAR ). Cleared by STRATIS Export Compliance (01/10)” Use of Standards in Security Maturation • Increasing Maturity and Partnership 9/30/2010 2

  4. Homeland Security, Medical, Pharmaceutical and Non-destructive Testing Applications of Terahertz Radiation

    Science.gov (United States)

    Kemp, Michael

    2005-03-01

    The terahertz region of the electromagnetic spectrum (300GHz-10THz) spans the region between radio and light. Recent advances in terahertz source, detector and systems technology are enabling new applications across a number of fields, based on both terahertz imaging and spectroscopy. This paper reviews our recent work on the development of practical systems and applications in security screening for the detection of explosives and non-metallic weapons; in medical imaging for cancer detection; as well as applications in non-destructive testing and the pharmaceutical industry.

  5. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, James [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Shedlock, Daniel [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Langeveld, Willem G.J. [Rapiscan Laboratories, Inc., Sunnyvale, CA 94085 (United States); Bharadwaj, Vinod [SLAC National Accelerator Lab., Menlo Park, CA (United States); Nosochkov, Yuri [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  6. Impact of Homeland Security Communities of Learning: Developing a Strategy for Training and Collaboration

    National Research Council Canada - National Science Library

    Braziel, Rick

    2006-01-01

    As the threat of domestic terrorism increases and the demands on Emergency Responders and the public intensify, a more distributed, efficient, and flexible training and collaboration model is needed...

  7. The Department of Homeland Security’s Pursuit of Data-Driven Decision Making

    Science.gov (United States)

    2015-12-01

    strategies as the Department makes strides towards removing itself from the GAO’s classification of DHS as “high- risk ”—a categorization due in part to...Department makes strides towards removing itself from the GAO’s classification of DHS as “high- risk ”—a categorization due in part to DHS’s inability to...91 C. POST ERP STRATEGY – TWO PATHS FORWARD .......................94 1. “Federal Shared Service Provider” Model

  8. Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter

    Science.gov (United States)

    2007-06-01

    byacuatydrioa fuid dynamledthedicm p tions the aerospace industry. Configurations with complexcomputational fluid dynamics (CFD) computations g o ere n nt a y...b o at fo h sc r including, solar heating, buoyancy, complete building geometries and unsteady buoyant flow physics are geometry specification, trees...relevant information is summarized as Dispersion scale flow and transport models based on CFD. In recent Nomograf’ datasets E31 so that it can be used

  9. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  10. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  11. Development of an Autonomous Lidar Instrument for Use on a UAV Platform in Support of Homeland Security

    Science.gov (United States)

    McGill, Matthew; Famiglietti, Joe

    2005-01-01

    Researchers at NASA's Goddard Space Flight Center have developed an autonomous aerosol backscatter lidar instrument for use on the high-altitude ER-2 aircraft (for more information please visit http://cpl.gsfc.nasa.gov). Work is currently underway to transfer this instrument to a UAV platform such as Global Hawk. While the NASA applications are Earth science and satellite validation, there is clearly a Homeland Security application for such an instrument. One novel concept is to have a fleet of UAVs stationed around the country, each UAV having a payload including a lidar instrument. In the event of attack, the appropriate UAV(s) could be launched for purposes of, e.g., plume detection and tracking that are critical for decision support. While the existing lidar instrument is not directly capable of biological species discrimination, it is capable of plume tracking and thus can demonstrate to DHS the capabilities and utility of such instruments. Using NASA funding we will have an instrument ready to fly on Global Hawk by end of 2005. We would like to find partners, either within private industry or within DHS who would be willing to contribute aircraft access and flight hours for a demonstration flight. Longer-term partnerships to develop more advanced and more capable types of lidar instruments are also desirable. In this presentation we will detail the existing ER-2 lidar instrument and show measurement results, show the progress made on adapting to the Global Hawk platform, present concepts for DHS uses of such instruments, and openly pursue partnership opportunities.

  12. Using resources of public health centers for education and professional societies to incorporate homeland security topics into public teacher continuing education.

    Science.gov (United States)

    McCarthy, Margaret E

    2003-08-01

    The Department of Education, the Association of Schools of Public Health, and national professional societies dedicated to teaching and dissemination of information for health and education in the public sector can form a clearinghouse on information and manpower on Homeland Security by affiliation with Centers for Public Health Preparedness (CPHP). The state licensed or regional societies can contribute further information and guidelines. In the HPS the Science Teacher Workshop (STW) and Public Education (PEC) Committees can assist a CPHP on radiation issues.

  13. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  14. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  15. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  16. 75 FR 14335 - Revisions to the Export Administration Regulations To Enhance U.S. Homeland Security: Addition of...

    Science.gov (United States)

    2010-03-25

    ... a person designated by the government end-user pursuant to contract. DATES: Effective Date: This... INFORMATION CONTACT: Ronald Rolfe, Senior Engineer/ Licensing Officer, Nuclear Missile Technology Controls... various private sector contractors. The U.S. Government also maintains international cooperative homeland...

  17. Campus network security model study

    Science.gov (United States)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  18. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  19. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  20. An update on the OpenOrbiter I Mission and its paradigm's benefits for the defense, homeland security and intelligence communities

    Science.gov (United States)

    Straub, Jeremy

    2017-05-01

    The OpenOrbiter I spacecraft is the culmination of significant work on reducing the cost levels of a CubeSat-class spacecraft. By redesigning the spacecraft from the ground up, down to the component level, to use readily available electronic and physical components, the cost of CubeSat construction has been significantly reduced. This paper provides an overview of the OpenOrbiter I mission, to date. It then focuses on the benefits that can be provided by the lower-cost, low-risk spacecraft. The paper discusses the prospective utility of this mission paradigm for the defense, homeland security and intelligence communities.

  1. Process Models for Security Architectures

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available This paper presents a model for an integrated security system, which can be implemented in any organization. It is based on security-specific standards and taxonomies as ISO 7498-2 and Common Criteria. The functionalities are derived from the classes proposed in the Common Criteria document. In the paper we present the process model for each functionality and also we focus on the specific components.

  2. 76 FR 70730 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-11-15

    ... security threats, Communist party, torture, genocide, killing, injuring, forced sexual contact, limiting or..., communicable disease, physical or mental disorder, prostitution, drug abuse, etc.) Education History Work...

  3. Motorola Secure Software Development Model

    Directory of Open Access Journals (Sweden)

    Francis Mahendran

    2008-08-01

    Full Text Available In today's world, the key to meeting the demand for improved security is to implement repeatable processes that reliably deliver measurably improved security. While many organizations have announced efforts to institutionalize a secure software development process, there is little or no industry acceptance for a common process improvement framework for secure software development. Motorola has taken the initiative to develop such a framework, and plans to share this with the Software Engineering Institute for possible inclusion into its Capability Maturity Model Integration (CMMI®. This paper will go into the details of how Motorola is addressing this issue. The model that is being developed is designed as an extension of the existing CMMI structure. The assumption is that the audience will have a basic understanding of the SEI CMM® / CMMI® process framework. The paper will not describe implementation details of a security process model or improvement framework, but will address WHAT security practices are required for a company with many organizations operating at different maturity levels. It is left to the implementing organization to answer the HOW, WHEN, WHO and WHERE aspects. The paper will discuss how the model is being implemented in the Motorola Software Group.

  4. 76 FR 58525 - Privacy Act of 1974; Department of Homeland Security, U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-21

    ... Security system of records notice titled ``DHS/USCIS-004 Verification Information System'' system of... Programs as part of the underlying technology, the Verification Information System on December 11, 2008. On.... DHS suspects or has confirmed that the security or confidentiality of information in the system of...

  5. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ... media, and CD-ROM. Retrievability: Records may be retrieved by name, incident code, social security... include, but is not limited to: Name; social security number or other identifier; address; phone number... agency for labor and employment relations; to an agency, organization, or individual when there could...

  6. 78 FR 60888 - Privacy Act of 1974; Department of Homeland Security/ALL-036 Board for Correction of Military...

    Science.gov (United States)

    2013-10-02

    ... Affairs (DVA) when the BCMR determines it has the need for an applicant's medical records possessed by the DVA. DHS requests medical records from DVA using an applicant's name and social security number. I. To...

  7. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-12-28

    ... Intelligence and Analysis (I&A) and/or the federal intelligence and law enforcement community members that are..., inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the...

  8. 76 FR 60059 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... Information System (ADIS); DHS/USVISIT-0012--DHS Automated Biometric Identification System (IDENT); Department... identify national security and/or law enforcement concerns. Identification of Possible Fraud Results from... provides biometric and biographic information to, and receives criminal history information from, the FBI...

  9. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-08

    ... Records System of Records. Information in this system may include, but is not limited to: Name; Social... agency for labor and employment relations; to an agency, organization, or individual when there could... Transportation Security Administration (TSA) records and functions; and to the news media in the interest of the...

  10. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... proposed here are standard law enforcement and national security exemptions exercised by a large number of... accounting would, therefore, present a serious impediment to law enforcement efforts and/or efforts to... criminal, civil, and administrative enforcement requirements. DATES: Comments must be received on or before...

  11. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... who carry concealed firearms. Categories of records in the system: Individual's name; Social Security... activity regarding child pornography, the touching of a child for sexual gratification, or child abuse. N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with...

  12. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Science.gov (United States)

    2010-02-03

    ...'s or entity's name; Digital photograph; Date of birth, place of birth, and age; Social security number; Duty/work address and telephone number; Alias; Race and ethnicity; Citizenship; Fingerprints; Sex... servers, magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by...

  13. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-03-13

    ... background investigations on employees), rather than the individuals related to those businesses (e.g., a list of employee names). A CBP Supply Chain Security Specialist (SCSS) vets the SCSP information... queries of publicly available data (e.g., through Google). The SCSS will then evaluate the SCSP...

  14. 77 FR 33683 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security, U.S. Customs...

    Science.gov (United States)

    2012-06-07

    ... risk; and aids in the enforcement of customs and immigration laws, and other laws enforced by DHS at... preclude subjects from compromising an ongoing law enforcement, national security or fraud investigation... enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national...

  15. 75 FR 28035 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2010-05-19

    ... user type can view reports for all companies associated with the E-Verify corporate account. This... Responsibility Act of 1996 (IIRIRA), Public Law (Pub. L.) 104-208, September 30, 1996. The program is a free, and... Social Security Administration (SSA). The program compares information provided by employees on the...

  16. 76 FR 26738 - Privacy Act of 1974; Department of Homeland Security/United States Citizenship and Immigration...

    Science.gov (United States)

    2011-05-09

    ... user type can view reports for all companies associated with the E-Verify corporate account. This... Responsibility Act of 1996 (IIRIRA), Public Law (Pub. L.) 104-208, September 30, 1996. The program is a free and... Social Security Administration (SSA). The program compares information provided by employees on the...

  17. 75 FR 55335 - Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information...

    Science.gov (United States)

    2010-09-10

    .... Physical descriptors: [cir] Build description. [cir] Eye color code. [cir] Eye color text. [cir] Hair color code. [cir] Hair color text. [cir] Person eyewear text. [cir] Person facial hair text. [cir] Person... retrieved by name, Social Security number, any privacy fields noted under Categories of Records, and other...

  18. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  19. Spider: a Security Model Checker

    NARCIS (Netherlands)

    Lenzini, Gabriele; Gnesi, S.; Latella, D.

    This paper presents SpyDer, a model checking environment for security protocols. In SpyDer a protocol is described as a term of a process algebra (called spy-calculus) consisting in a parallel composition of a finite number of communicating and finite-behaviored processes. Each process represents an

  20. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    December 2011 Thesis Advisor: Sam Clovis , Jr. Second Reader: Lauren Fernandez THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form...Approved by: Sam Clovis , Jr. Thesis Advisor Lauren Fernandez Second Reader Daniel Moran Chair, Department of National Security Affairs...continued education, and former Fire Commissioner Horace “Bud” Felton; a Navy man who encouraged me to apply to the program. Sam Clovis and Lauren

  1. Homeland calling

    DEFF Research Database (Denmark)

    Juul, Kristine

    2007-01-01

    . According to Mohan (2006) it can be seen as a sort of public sphere, carrying with it a sort of de-territorialized citizenship. In this sense the village/homeland becomes a platform for political, social and religious claims and practices of a transnational character.   But what is it that is being...... notions such as democracy, citizenship and national affiliation. A key feature here is the impact of identity change from being citizens of Yugoslavia to being Serb. Also recent attempts to involve the diaspora population in development projects in the area of origin will be discuss as well as the ways...... in which these claims/assertions about participation challenge previously hegemonic conceptions about citizenship and ‘natural' affiliation to certain localities...

  2. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  3. Security Theorems via Model Theory

    Directory of Open Access Journals (Sweden)

    Joshua Guttman

    2009-11-01

    Full Text Available A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi. Models (interpretations for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. *Realized* skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1 If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2 A protocol enforces for all xs . (phi implies for some ys . psi iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007 to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds.

  4. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  5. Design Validation of a {sup 10}B{sub 4}C Coated RSP with Multi-layered structure for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Su Hyun; Kim, Jong Yul; Lee, Joo Hyun; Moon, Mung Kook [KAERI, Daejeon (Korea, Republic of); Lim, Chang Hwy [Korea Research Institute of Ships and Ocean Engineering, Daejeon (Korea, Republic of); Lim, Ki Seo [Myongji University, Yongin (Korea, Republic of)

    2016-05-15

    It is a national priority to prevent radiological threats including radiological terrorism and smuggling nuclear material and devices. For this purpose, many governments and relevant organizations have been exploiting radiation detection technology. Especially, radiation portal monitor (RPM) is a widely used type of radiation detectors when it comes to homeland security and commonly deployed at strategic sites like airports and ports. In the most cases, they could be divided into two types of primary screening and secondary screening. In the latter case, hand-held detectors are mainly used for a closer inspection. On the other hand, RPMs for the primary screening, our concern, are stationary mounted type and comprise gamma-ray detector and neutron detector in many cases. The expected performance of the design of a RSP(Radiation Sensor Panel) has been demonstrated. According to the results of the simulation, three RSPs should be needed to meet the criterion mentioned in subsection 2.1. The design still can be validated when taking into account that the geometrical acceptance will be increased since it has been planned that the RPM is going to installed with four RSPs.

  6. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  7. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  8. National Strategy for Homeland Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... The lives and livelihoods of the American people also remain at risk from natural catastrophes, including naturally occurring infectious diseases and hazards such as hurricanes and earthquakes, and man-made accidents...

  9. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  10. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  11. Critically Important Object Security System Element Model

    Directory of Open Access Journals (Sweden)

    I. V. Khomyackov

    2012-03-01

    Full Text Available A stochastic model of critically important object security system element has been developed. The model includes mathematical description of the security system element properties and external influences. The state evolution of the security system element is described by the semi-Markov process with finite states number, the semi-Markov matrix and the initial semi-Markov process states probabilities distribution. External influences are set with the intensity of the Poisson thread.

  12. Security model for VM in cloud

    Science.gov (United States)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  13. Whistleblowing in a Wikileaks World: A Model for Responsible Disclosure in Homeland Security

    Science.gov (United States)

    2012-03-01

    retaliation (Project on Government Oversight, 2005). However, trust as it has been traditionally defined ( Giddens , 1990),7 does not really capture the...www.beckersasc.com/stark-act-and-fraud-abuse-issues/false-claims- recoveries-and-whistleblower-suits-reach-all-time-high.html Giddens , A. (1990). The consequences of

  14. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  15. A Model of Social Security?

    DEFF Research Database (Denmark)

    Rom-Jensen, Byron Zachary

    2017-01-01

    of Scandinavian achievements were variable in their ideological outlook and sometimes deliberately challenged the existence and goals of New Deal policies. Moreover, this essay explores the usage of Scandinavia in New Deal social legislation by examining the policymaking rhetoric of the Social Security Act...... and its 1939 amendments. The surprising plasticity of the Scandinavian image amongst policymakers ultimately reveals the fluid nature of both New Deal-era politics and the Scandinavian images it appropriated....

  16. New Models for Protocol Security

    Science.gov (United States)

    2015-06-18

    the premier Cryptography conferences (CRYPTO, EuroCrypt, TCC ); 5 of these papers were selected for special issues on best papers. 15. SUBJECT TERMS...prestigious Cryptography conferences (CRYPTO, EuroCrypt, TCC ); 5 of these papers were selected for special issues on best papers. 2 Concurrent Security...sequence of works appearing in STOC 2013, FOCS 2013 (2 on this topic), and TCC 2014, we resolved some of central outstanding open questions in this

  17. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  18. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  19. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  20. Intelligent Model for Video Survillance Security System

    Directory of Open Access Journals (Sweden)

    J. Vidhya

    2013-12-01

    Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.

  1. Modeling behavioral considerations related to information security.

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F. (Decision and Information Sciences); (SNL); (Univ. at Albany)

    2011-01-01

    The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral study of upcoming threats.

  2. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  3. Software Security and the "Building Security in Maturity" Model

    CERN Multimedia

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  4. Modelling mobility aspects of security policies

    NARCIS (Netherlands)

    Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of

  5. Probabilistic reasoning with graphical security models

    NARCIS (Netherlands)

    Kordy, Barbara; Pouly, Marc; Schweitzer, Patrick

    This work provides a computational framework for meaningful probabilistic evaluation of attack–defense scenarios involving dependent actions. We combine the graphical security modeling technique of attack–defense trees with probabilistic information expressed in terms of Bayesian networks. In order

  6. Timed Model Checking of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model

  7. Modelling of tradeable securities with dividends

    NARCIS (Netherlands)

    Vellekoop, M.H.; Nieuwenhuis, J.W.

    2006-01-01

    We propose a generalized framework for the modeling of tradeable securities with dividends which are not necessarily cash dividends at fixed times or continuously paid dividends. In our setup the dividend processes are only required to be semi-martingales. We give a definition of self-financing

  8. A improved Network Security Situation Awareness Model

    Directory of Open Access Journals (Sweden)

    Li Fangwei

    2015-08-01

    Full Text Available In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network security situation is the result of fusion three aspects evaluation. In terms of attack, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed. In terms of vulnerability, a improved Common Vulnerability Scoring System (CVSS was raised and maked the assessment more comprehensive. In terms of node weights, the method of calculating the combined weights and optimizing the result by Sequence Quadratic Program (SQP algorithm which reduced the uncertainty of fusion was raised. To verify the validity and necessity of the method, a testing platform was built and used to test through evaluating 2000 DAPRA data sets. Experiments show that the method can improve the accuracy of evaluation results.

  9. SECURE MATHEMATICALLY- ASSURED COMPOSITION OF CONTROL MODELS

    Science.gov (United States)

    2017-09-27

    SECURE MATHEMATICALLY-ASSURED COMPOSITION OF CONTROL MODELS ROCKWELL COLLINS SEPTEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE...collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE...MATHEMATICALLY-ASSURED COMPOSITION OF CONTROL MODELS 5a. CONTRACT NUMBER FA8750-12-9-0179 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 62303E

  10. Bayesian paradox in homeland security and homeland defense

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Wang, Wenjian

    2011-06-01

    In this paper we discuss a rather surprising result of Bayesian inference analysis: performance of a broad variety of sensors depends not only on a sensor system itself, but also on CONOPS parameters in such a way that even an excellent sensor system can perform poorly if absolute probabilities of a threat (target) are lower than a false alarm probability. This result, which we call Bayesian paradox, holds not only for binary sensors as discussed in the lead author's previous papers, but also for a more general class of multi-target sensors, discussed also in this paper. Examples include: ATR (automatic target recognition), luggage X-ray inspection for explosives, medical diagnostics, car engine diagnostics, judicial decisions, and many other issues.

  11. The "Global" Homeland: International Perspectives on Counterterrorism and Homeland Security

    National Research Council Canada - National Science Library

    Tussing, Bert

    2004-01-01

    .... Yet, we are not in this alone. Other nations, international organizations such as NATO and the European Union, and transnational law enforcement agencies such as Europol and Interpol are deeply committed to the counter terror effort...

  12. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  13. Leveraging Successful Collaborative Processes to Improve Performance Outcomes in Large-Scale Event Planning: Super Bowl, A Planned Homeland Security Event

    Science.gov (United States)

    2010-03-01

    PAGES 115 14. SUBJECT TERMS Event Planning, Super Bowl, Collaborative Process, Security in Special Events , Incident Management , Public Private...BLANK xi LIST OF FIGURES Figure 1. Super Bowl Event Management Condition .....................................................38 Figure 2...resources, operational efficiency, minimizing or controlling life safety, and asset or mission loss. Success in event or incident management is also

  14. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    The increasing usage of computer-based systems in almost every aspects of our daily life makes more and more dangerous the threat posed by potential attackers, and more and more rewarding a successful attack. Moreover, the complexity of these systems is also increasing, including physical devices......, software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...

  15. Modelling Public Security Operations: Evaluation of the Holistic Security Ecosystem (HSE) Proof-of-Concept

    Science.gov (United States)

    2012-12-01

    de validation pour les modèles informatisées des facteurs humains . DRDC CSS CR 2012-026 2 Executive summary Modelling Public Security ...Modelling Public Security Operations Evaluation of the Holistic Security Ecosystem (HSE) Proof-of-Concept Alexis Morris William Ross Mihaela...Centre for Security Science The scientific or technical validity of this Contract Report is entirely the responsibility of the Contractor and

  16. Design and realization of a network security model

    OpenAIRE

    WANG, Jiahai; HAN, Fangxi; Tang, Zheng; TAMURA, Hiroki; Ishii, Masahiro

    2002-01-01

    The security of information is a key problem in the development of network technology. The basic requirements of security of information clearly include confidentiality, integrity, authentication and non-repudiation. This paper proposes a network security model that is composed of security system, security connection and communication, and key management. The model carries out encrypting, decrypting, signature and ensures confidentiality, integrity, authentication and non-repudiation. Finally...

  17. Modeling the Security Ecosystem - The Dynamics of (In)Security

    Science.gov (United States)

    Frei, Stefan; Schatzmann, Dominik; Plattner, Bernhard; Trammell, Brian

    The security of information technology and computer networks is effected by a wide variety of actors and processes which together make up a security ecosystem; here we examine this ecosystem, consolidating many aspects of security that have hitherto been discussed only separately. First, we analyze the roles of the major actors within this ecosystem and the processes they participate in, and the the paths vulnerability data take through the ecosystem and the impact of each of these on security risk. Then, based on a quantitative examination of 27,000 vulnerabilities disclosed over the past decade and taken from publicly available data sources, we quantify the systematic gap between exploit and patch availability. We provide the first examination of the impact and the risks associated with this gap on the ecosystem as a whole. Our analysis provides a metric for the success of the “responsible disclosure” process. We measure the prevalence of the commercial markets for vulnerability information and highlight the role of security information providers (SIP), which function as the “free press” of the ecosystem.

  18. CRISP. Information Security Models and Their Economics

    International Nuclear Information System (INIS)

    Gustavsson, R.; Mellstrand, P.; Tornqvist, B.

    2005-03-01

    The deliverable D1.6 includes background material and specifications of a CRISP Framework on protection of information assets related to power net management and management of business operations related to energy services. During the project it was discovered by the CRISP consortium that the original description of WP 1.6 was not adequate for the project as such. The main insight was that the original emphasis on cost-benefit analysis of security protection measures was to early to address in the project. This issue is of course crucial in itself but requires new models of consequence analysis that still remains to be developed, especially for the new business models we are investigated in the CRISP project. The updated and approved version of the WP1.6 description, together with the also updated WP2.4 focus on Dependable ICT support of Power Grid Operations constitutes an integrated approach towards dependable and secure future utilities and their business processes. This document (D1.6) is a background to deliverable D2.4. Together they provide a dependability and security framework to the three CRISP experiments in WP3

  19. A Secure Operational Model for Mobile Payments

    Directory of Open Access Journals (Sweden)

    Tao-Ku Chang

    2014-01-01

    Full Text Available Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers’ security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  20. A secure operational model for mobile payments.

    Science.gov (United States)

    Chang, Tao-Ku

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  1. A Secure Operational Model for Mobile Payments

    Science.gov (United States)

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service. PMID:25386607

  2. Development of a cyber security risk model using Bayesian networks

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Son, Hanseong; Khalil ur, Rahman; Heo, Gyunyoung

    2015-01-01

    Cyber security is an emerging safety issue in the nuclear industry, especially in the instrumentation and control (I and C) field. To address the cyber security issue systematically, a model that can be used for cyber security evaluation is required. In this work, a cyber security risk model based on a Bayesian network is suggested for evaluating cyber security for nuclear facilities in an integrated manner. The suggested model enables the evaluation of both the procedural and technical aspects of cyber security, which are related to compliance with regulatory guides and system architectures, respectively. The activity-quality analysis model was developed to evaluate how well people and/or organizations comply with the regulatory guidance associated with cyber security. The architecture analysis model was created to evaluate vulnerabilities and mitigation measures with respect to their effect on cyber security. The two models are integrated into a single model, which is called the cyber security risk model, so that cyber security can be evaluated from procedural and technical viewpoints at the same time. The model was applied to evaluate the cyber security risk of the reactor protection system (RPS) of a research reactor and to demonstrate its usefulness and feasibility. - Highlights: • We developed the cyber security risk model can be find the weak point of cyber security integrated two cyber analysis models by using Bayesian Network. • One is the activity-quality model signifies how people and/or organization comply with the cyber security regulatory guide. • Other is the architecture model represents the probability of cyber-attack on RPS architecture. • The cyber security risk model can provide evidence that is able to determine the key element for cyber security for RPS of a research reactor

  3. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  4. Modeling and Security in Cloud Ecosystems

    Directory of Open Access Journals (Sweden)

    Eduardo B. Fernandez

    2016-04-01

    Full Text Available Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been developed to coexist and evolve together. The stakeholders of such a system need a variety of models to give them a perspective of the possibilities of the system, to evaluate specific quality attributes, and to extend the system. A powerful representation when building or using software ecosystems is the use of architectural models, which describe the structural aspects of such a system. These models have value for security and compliance, are useful to build new systems, can be used to define service contracts, find where quality factors can be monitored, and to plan further expansion. We have described a cloud ecosystem in the form of a pattern diagram where its components are patterns and reference architectures. A pattern is an encapsulated solution to a recurrent problem. We have recently expanded these models to cover fog systems and containers. Fog Computing is a highly-virtualized platform that provides compute, storage, and networking services between end devices and Cloud Computing Data Centers; a Software Container provides an execution environment for applications sharing a host operating system, binaries, and libraries with other containers. We intend to use this architecture to answer a variety of questions about the security of this system as well as a reference to design interacting combinations of heterogeneous components. We defined a metamodel to relate security concepts which is being expanded.

  5. Increasing security through public health: a practical model.

    Science.gov (United States)

    Parker, R David

    2011-01-01

    As political and social changes sweep the globe, there are opportunities to increase national security through innovative approaches. While traditional security methods such as defense forces and homeland security provide both pre-emptive and defensive protection, new methods could meet emerging challenges by responding to the political, financial, and social trends. One method is the integration of defense, medicine and public health. By assisting a nation by providing basic services, such as healthcare, collaborative efforts can increase stabilization in areas of unrest. Improved health outcomes leads to increased domestic security, which can create a ripple effect across a region. Assessment, uptake and sustainability by the host nation are critical for program success. The proposed methodology focuses on the use of primarily extant resources, such as programs used by Special Operations Forces and other health and defense programs. Additional components include evaluation, set objectives and mission collaborations. As the nexus between foreign affairs, security, and public health is increasingly validated through research and practice, standardized interventions should be developed to minimize overlapping expenditures, promote security and strengthen international relations. 2011.

  6. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  7. 75 FR 52542 - Extension of Agency Information Collection Activity Under OMB Review: Department of Homeland...

    Science.gov (United States)

    2010-08-26

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency... Program (DHS TRIP) AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY... Reduction Act (PRA). The collection involves the submission of identifying and travel experience information...

  8. Towards a Model of the Costs of Security

    OpenAIRE

    Larochelle, David; Rosasco, Nicholas

    2003-01-01

    We present a simple information security model to determine why, historically, the level of security has not increased despite numerous technical advances. In our model, the software design process involves trade-offs between security and functionality. Developers choose points in the design space corresponding to certain levels of security and functionality. If development resources, such as number of developers, time for completion, etc., are fixed, there is an implicit trade-off between se...

  9. On the Need for Relaxed Security Models

    DEFF Research Database (Denmark)

    Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008.......Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008....

  10. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ...; correction. SUMMARY: The Department of Homeland Security published a document in the Federal Register of April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security...

  11. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  12. Modelling Security Requirements Through Extending Scrum Agile Development Framework

    OpenAIRE

    Alotaibi, Minahi

    2016-01-01

    Security is today considered as a basic foundation in software development and therefore, the modelling and implementation of security requirements is an essential part of the production of secure software systems. Information technology organisations are moving towards agile development methods in order to satisfy customers' changing requirements in light of accelerated evolution and time restrictions with their competitors in software production. Security engineering is considered difficult...

  13. Home-Network Security Model in Ubiquitous Environment

    OpenAIRE

    Dong-Young Yoo; Jong-Whoi Shin; Jin-Young Choi

    2007-01-01

    Social interest and demand on Home-Network has been increasing greatly. Although various services are being introduced to respond to such demands, they can cause serious security problems when linked to the open network such as Internet. This paper reviews the security requirements to protect the service users with assumption that the Home-Network environment is connected to Internet and then proposes the security model based on the requirement. The proposed security mode...

  14. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  15. A new security model for collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lorch, Markus [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Perry, Marcia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2003-06-06

    Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supports the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.

  16. A Novel Model for Security Evaluation for Compliance

    DEFF Research Database (Denmark)

    Hald, Sara Ligaard; Pedersen, Jens Myrup; Prasad, Neeli R.

    2011-01-01

    With the increasing focus on security in information systems, it is becoming necessary to be able to describe and compare security attributes for different technologies. Existing are well-described and comprehensive, but expensive and resource demanding to apply. The Security Evaluation...... for Compliance (SEC) model offers a lightweight alternative for use by decision makers to get a quick overview of the security attributes of different technologies for easy comparison and requirement compliance evaluation. The scientific contribution is this new approach to security modelling as well...

  17. THE MODEL FOR RISK ASSESSMENT ERP-SYSTEMS INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    V. S. Oladko

    2016-12-01

    Full Text Available The article deals with the problem assessment of information security risks in the ERP-system. ERP-system functions and architecture are studied. The model malicious impacts on levels of ERP-system architecture are composed. Model-based risk assessment, which is the quantitative and qualitative approach to risk assessment, built on the partial unification 3 methods for studying the risks of information security - security models with full overlapping technique CRAMM and FRAP techniques developed.

  18. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  19. The Minimum Food Security Quota (MFS-Quota) in Food Security Policy Modelling

    OpenAIRE

    Mario Arturo Ruiz Estrada

    2010-01-01

    This paper proposes the construction of the Minimum Food Security Quota (MFSQuota)using mathematical economic modelling in real time. The MFS-Quota fixes a certain amount of annual food storage to prepare a country for any natural or social disasters. Any country can construct its own MFS-Quota for “food security policy”.

  20. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  1. Chapter 8. The Costs of Homeland Security

    OpenAIRE

    Payan, Tony; Vásquez, Amanda

    2017-01-01

    The US-Mexico border has undergone several historical transformations. Between 1848 and 1920 the border went through an era best characterized by informality: there were no border guards, no customs controls, and no checkpoints. This era is best referred to as a frontier system. In general, although a line divided the two countries on the sand and the river banks, border controls were practically non-existent. The Mexican Revolution of 1910-21 brought a new era for the border, one better refe...

  2. 75 FR 2880 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-01-19

    ... the Secretary's primary advisory body with the goal of providing strategic, timely and actionable... portions of the meeting will include updates on operational challenges, intelligence briefings, and pre... procedures. HSAC members will receive classified and sensitive intelligence briefings during the closed...

  3. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    .... It supports the Coast Guard's broad roles and responsibilities of maritime safety and maritime... support the Coast Guard's broad role and responsibility of maritime safety. Timetable: Action Date FR Cite... promotes the Coast Guard strategic goal of maritime safety. Timetable: Action Date FR Cite NPRM 10/30/09 74...

  4. Homeland Security Behind the Redwood Curtain

    Science.gov (United States)

    2007-09-01

    for about ten minutes. Each time they returned to the same parking spot in front of the Inn, hopped out and grabbed the Coors Light bottles they had...can,” Kathy ordered from the doorway, hands on her hips . It was clear who the law was around here. “Matt is only twenty years old,” John whispered...the kind you can burn songs onto using your home computer. “I know that it’s illegal to copy music and all that but I want you to have this CD. I

  5. The Reserve's Medical Role for Homeland Security

    National Research Council Canada - National Science Library

    Magrane, John R., Jr

    2005-01-01

    ... to employ more elaborate methods such as dirty bombs, biological agents, and the use of chemicals. Such threats require local responders to use response strategies that meet these asymmetric challenges...

  6. Complacency: A Threat to Homeland Security

    Science.gov (United States)

    2014-06-01

    employ vast numbers of men and women made it impractical to select individuals for specific jobs. Thus, the focus shifted to designing for people’s...research scientist, academician, businessman, and philanthropist, started the Santa Fe Institute in Los Alamos, New Mexico ; Stephen Wolfram began the...symptoms of groupthink, including illusions of invulnerability and a sense of superiority, collective rationalization, and stereotyping of outsiders

  7. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    Our work is based on the review of documents and interviews conducted at more than two dozen federal departments and agencies, including central management agencies such as OMB, the general Services Administration (GSA...

  8. Data Mining and Homeland Security: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2007-01-01

    .... Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets...

  9. The Submersible Threat to Maritime Homeland Security

    Science.gov (United States)

    2013-09-01

    clandestine shipyard in the jungles of Ecuador (Popkin, 2011). Although no drugs were recovered in the raid on the shipyard, this discovery was...July 2, 2010, authorities in Ecuador confiscated a nearly completed 74-foot fully-submersible submarine made of Kevlar and carbon fiber (Popkin, 2011...protect its citizens • Discourage foreign investments, tourism , or assistance programs that can affect the target country’s economy and support of

  10. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-12-20

    ... Undocumented Barges 1625-AA14 379 Commercial Fishing Industry Vessels 1625-AA77 380 Inspection of Towing... Regulation Sequence Title Identifier Number Number 384 Claims Procedures Under the Oil Pollution Act of 1990... abandoned and help prevent future marine pollution. This rulemaking supports the Coast Guard's broad role...

  11. Homeland Security Department: FY2011 Appropriations

    Science.gov (United States)

    2010-08-27

    Safety Mission The oil spill from the drilling rig in the Gulf of Mexico has focused attention on the Coast Guard’s role in marine safety and...broad missions, criminal investigations and protection. Criminal investigation activities encompass financial crimes, identity theft, counterfeiting ...Lake and Chad C. Haddal. 107 S.Rept. 111-222, pp. 106-108. 108 Institute of Medicine and National Research Council, BioWatch and Public Health

  12. 2008 Homeland Security Symposium and Exposition

    Science.gov (United States)

    2008-09-10

    TEMP) • Standards assessment and/or development by S&T • Grant program development by DHS customer • New Product Development ( NPD ) process...needed to carry out the mission of U.S. Customs and Border Protection.’ What we buy: Food and Beverage Items, Body Armor, Ammunition, Uniform Rental

  13. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    Victoroff also argues that political psychology theory advises that the better a target group understands the terrorist mindset, the better...educational programs that can be delivered to school personnel including cardiopulmonary resuscitation, first aid, and automated external defibrillator use...in CPR, First Aid and Automated External Defibrillator (AED) use. 94 In the response component, FCPS has not established a formal information

  14. A Balanced Approach to Funding Homeland Security

    Science.gov (United States)

    2014-12-01

    Citizen involvement may provide an alternative source of funding through crowdsourcing, rather than taxation . Involving citizens in making decisions...return on investment. Citizen involvement may provide an alternative source of funding through crowdsourcing, rather than taxation . Involving...because day-shift staff remained on duty, double the normal complement of health care providers was on-site at every facility.155 4. The bombs

  15. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  16. Aspect-oriented security hardening of UML design models

    CERN Document Server

    Mouheb, Djedjiga; Pourzandi, Makan; Wang, Lingyu; Nouh, Mariam; Ziarati, Raha; Alhadidi, Dima; Talhi, Chamseddine; Lima, Vitor

    2015-01-01

    This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The

  17. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... previous approaches to the problem. Starting from an open point-to-point network there is a long way to general secure multiparty computation. The dissertation contains contributions at several points along the way. In particular we investigate how to realize secure channels. We also show how threshold...... you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...

  18. Re-designing the PhEDEx Security Model

    Energy Technology Data Exchange (ETDEWEB)

    Huang, C.-H. [Fermilab; Wildish, T. [Princeton U.; Zhang, X. [Beijing, Inst. High Energy Phys.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  19. Bayesian Network Models in Cyber Security: A Systematic Review

    NARCIS (Netherlands)

    Chockalingam, S.; Pieters, W.; Herdeiro Teixeira, A.M.; van Gelder, P.H.A.J.M.; Lipmaa, Helger; Mitrokotsa, Aikaterini; Matulevicius, Raimundas

    2017-01-01

    Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these

  20. An Integrated Approach for Physical and Cyber Security Risk Assessment: The U.S. Army Corps of Engineers Common Risk Model for Dams

    Science.gov (United States)

    2016-07-01

    colleagues from the U.S. Department of Homeland Security, in particular Dr. Enrique E. Matheu, Office of Infrastructure Protection, Sector Outreach and...Assessment: The U.S. Army Corps of Engineers Common Risk Model for Dams HQ0034-14-D-0001 5 b . GR A N T N O. 5 c . P R O G R AM E LE M E N T

  1. Problem Solving in Homeland Security and Creating Policy Conditions for Enhanced Civic Engagement: An Examination of Crowdsourcing Models

    Science.gov (United States)

    2017-06-01

    catalyst. Shirky invokes psychologist Daniel Kahneman and the concept of “theory-induced blindness” to help explain the connection between motive and...or variables. Markman explains that the traditional basis for brainstorming exercises is founded in psychologist Alex Osborn’s work from the 1950s

  2. A security model for saas in cloud computing

    International Nuclear Information System (INIS)

    Abbas, R.; Farooq, A.

    2016-01-01

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. It has many service modes like Software as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS). In SaaS model, service providers install and activate the applications in cloud and cloud customers access the software from cloud. So, the user does not have the need to purchase and install a particular software on his/her machine. While using SaaS model, there are multiple security issues and problems like Data security, Data breaches, Network security, Authentication and authorization, Data integrity, Availability, Web application security and Backup which are faced by users. Many researchers minimize these security problems by putting in hard work. A large work has been done to resolve these problems but there are a lot of issues that persist and need to overcome. In this research work, we have developed a security model that improves the security of data according to the desire of the End-user. The proposed model for different data security options can be helpful to increase the data security through which trade-off between functionalities can be optimized for private and public data. (author)

  3. Adaptable Authentication Model: Exploring Security with Weaker Attacker Models

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Most methods for protocol analysis classify protocols as “broken” if they are vulnerable to attacks from a strong attacker, e.g., assuming the Dolev-Yao attacker model. In many cases, however, exploitation of existing vulnerabilities may not be practical and, moreover, not all applications may......; for each fine level authentication goal, we determine the “least strongest-attacker” for which the authentication goal can be satisfied. We demonstrate that this model can be used to reason about the security of supposedly insecure protocols. Such adaptability is particularly useful in those applications...

  4. A model-driven approach to information security compliance

    Science.gov (United States)

    Correia, Anacleto; Gonçalves, António; Teodoro, M. Filomena

    2017-06-01

    The availability, integrity and confidentiality of information are fundamental to the long-term survival of any organization. Information security is a complex issue that must be holistically approached, combining assets that support corporate systems, in an extended network of business partners, vendors, customers and other stakeholders. This paper addresses the conception and implementation of information security systems, conform the ISO/IEC 27000 set of standards, using the model-driven approach. The process begins with the conception of a domain level model (computation independent model) based on information security vocabulary present in the ISO/IEC 27001 standard. Based on this model, after embedding in the model mandatory rules for attaining ISO/IEC 27001 conformance, a platform independent model is derived. Finally, a platform specific model serves the base for testing the compliance of information security systems with the ISO/IEC 27000 set of standards.

  5. Nuclear security culture: a generic model for universal application

    International Nuclear Information System (INIS)

    Khripunov, I.

    2005-01-01

    Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that

  6. Modeling of Information Security Strategic Planning Methods and Expert Assessments

    Directory of Open Access Journals (Sweden)

    Alexander Panteleevich Batsula

    2014-09-01

    Full Text Available The article, paper addresses problem of increasing the level of information security. As a result, a method of increasing the level of information security is developed through its modeling of strategic planning SWOT-analysis using expert assessments.

  7. Wormuth: Work on Security, Defense 'Holistically'

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, PRESS RELEASES Concepts spawned at the Center for Homeland Defense and Security could be very valuable to government entities such as the Department of Defense as that agency expands its focus in...

  8. ONTOLOGICAL MODEL OF STRATEGIC ECONOMIC SECURITY OF ENTERPRISE

    Directory of Open Access Journals (Sweden)

    L. A. Zaporozhtseva

    2014-01-01

    Full Text Available Article explains the necessity the application of the ontological approach to modeling the strategic economic security in the formalization of the basic categories of domain company recognized its benefits. Among the advantages of the model distinguishes its versatility and ability to describe various aspects of strategic security - the system strategies and goals of the organization and business processes; possibility of its use at different levels of detail - from the top-level description of the basic categories of management, to design-level analytic applications; as well as the adaptability of the model, with depth on particular aspects determined by practical necessity and not regulated methodology. The model integrates various aspects of the concept of enterprise architecture and organizes conceptual apparatus. Ontological model easy to understand and adjust as business architects and specialists in designing systems of economic security and offers many categories of verbal representation of the domain of the enterprise. Proved the feasibility of using process-functional approach in providing strategic economic security, according to which the components of such a security company proposed as business processes, finance, staff and contractors. The article presents the author's ontological model of strategic economic security, including endangered sites, the presence of factors that threaten the security of the object and the subject of providing security. Further, it is proved that in the subjects of security impact on the object using the tools, measures and activities within the strategy formed the mechanism is implemented managerial decisions to strengthen the strategic economic security. The process of diagnosis, detection, identification of threats of economic security, and the development of enterprise development strategies, taking into account its level of economic security must be under the constant supervision of the process of

  9. A Novel Computer Virus Propagation Model under Security Classification

    Directory of Open Access Journals (Sweden)

    Qingyi Zhu

    2017-01-01

    Full Text Available In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.

  10. Optimizing ZigBee Security using Stochastic Model Checking

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report......, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic...

  11. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  12. Transnationalism: Diaspora-Homeland Development

    Science.gov (United States)

    Patterson, Rubin

    2006-01-01

    Based on detected correlations between the strategic collaboration of U.S.-based diasporas and their respective ancestral homelands on the one hand and the socioeconomic and technological development of those homelands on the other, this paper, which provides a conceptual foundation of the correlation, attempts to ignite a new area of research on…

  13. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  14. Information Governance: A Model for Security in Medical Practice

    Directory of Open Access Journals (Sweden)

    Patricia A.H. Williams

    2007-03-01

    Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data. 

  15. MULTILEVEL RECURRENT MODEL FOR HIERARCHICAL CONTROL OF COMPLEX REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Andrey V. Masloboev

    2014-11-01

    Full Text Available Subject of research. The research goal and scope are development of methods and software for mathematical and computer modeling of the regional security information support systems as multilevel hierarchical systems. Such systems are characterized by loosely formalization, multiple-aspect of descendent system processes and their interconnectivity, high level dynamics and uncertainty. The research methodology is based on functional-target approach and principles of multilevel hierarchical system theory. The work considers analysis and structural-algorithmic synthesis problem-solving of the multilevel computer-aided systems intended for management and decision-making information support in the field of regional security. Main results. A hierarchical control multilevel model of regional socio-economic system complex security has been developed. The model is based on functional-target approach and provides both formal statement and solving, and practical implementation of the automated information system structure and control algorithms synthesis problems of regional security management optimal in terms of specified criteria. An approach for intralevel and interlevel coordination problem-solving in the multilevel hierarchical systems has been proposed on the basis of model application. The coordination is provided at the expense of interconnection requirements satisfaction between the functioning quality indexes (objective functions, which are optimized by the different elements of multilevel systems. That gives the possibility for sufficient coherence reaching of the local decisions, being made on the different control levels, under decentralized decision-making and external environment high dynamics. Recurrent model application provides security control mathematical models formation of regional socioeconomic systems, functioning under uncertainty. Practical relevance. The model implementation makes it possible to automate synthesis realization of

  16. History as the Architect of the Present: What Made Kashmir the Nucleus of South Asia Terrorism? India-Pakistan Conflict and Its Impact on U.S. Homeland Security

    Science.gov (United States)

    2012-03-01

    Historians have claimed that in the Indian subcontinent, British colonialism contributed to postcolonial violence by construction of oppositional identities...colonial and postcolonial India. In the case of India, the violence began before the independence and became worse after the independence. (Baber, 2004...was needed as their homeland (Jafferlot, 2002). Conversely, postcolonial India was founded as a secular pluralistic democracy, a home for the

  17. Spent fuel reprocessing system security engineering capability maturity model

    International Nuclear Information System (INIS)

    Liu Yachun; Zou Shuliang; Yang Xiaohua; Ouyang Zigen; Dai Jianyong

    2011-01-01

    In the field of nuclear safety, traditional work places extra emphasis on risk assessment related to technical skills, production operations, accident consequences through deterministic or probabilistic analysis, and on the basis of which risk management and control are implemented. However, high quality of product does not necessarily mean good safety quality, which implies a predictable degree of uniformity and dependability suited to the specific security needs. In this paper, we make use of the system security engineering - capability maturity model (SSE-CMM) in the field of spent fuel reprocessing, establish a spent fuel reprocessing systems security engineering capability maturity model (SFR-SSE-CMM). The base practices in the model are collected from the materials of the practice of the nuclear safety engineering, which represent the best security implementation activities, reflect the regular and basic work of the implementation of the security engineering in the spent fuel reprocessing plant, the general practices reveal the management, measurement and institutional characteristics of all process activities. The basic principles that should be followed in the course of implementation of safety engineering activities are indicated from 'what' and 'how' aspects. The model provides a standardized framework and evaluation system for the safety engineering of the spent fuel reprocessing system. As a supplement to traditional methods, this new assessment technique with property of repeatability and predictability with respect to cost, procedure and quality control, can make or improve the activities of security engineering to become a serial of mature, measurable and standard activities. (author)

  18. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  19. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  20. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  1. Document and author promotion strategies in the secure wiki model

    DEFF Research Database (Denmark)

    Lindberg, Kasper; Jensen, Christian D.

    2012-01-01

    , but this also means that anyone can introduce errors into documents, either by accident or on purpose. A security model for wiki-style authoring systems, called the Secure Wiki Model, has previously been proposed to address this problem. This model is designed to prevent corruption of good quality documents......Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system......, by limiting updates, to such documents, to users who have demonstrated their ability to produce documents of similar or better quality. While this security model prevents all user from editing all documents, it does respect the wiki philosophy by allowing any author who has produced documents of a certain...

  2. A Layered Decision Model for Cost-Effective System Security

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Huaqiang; Alves-Foss, James; Soule, Terry; Pforsich, Hugh; Zhang, Du; Frincke, Deborah A.

    2008-10-01

    System security involves decisions in at least three areas: identification of well-defined security policies, selection of cost-effective defence strategies, and implementation of real-time defence tactics. Although choices made in each of these areas affect the others, existing decision models typically handle these three decision areas in isolation. There is no comprehensive tool that can integrate them to provide a single efficient model for safeguarding a network. In addition, there is no clear way to determine which particular combinations of defence decisions result in cost-effective solutions. To address these problems, this paper introduces a Layered Decision Model (LDM) for use in deciding how to address defence decisions based on their cost-effectiveness. To validate the LDM and illustrate how it is used, we used simulation to test model rationality and applied the LDM to the design of system security for an e-commercial business case.

  3. International Conference on Computational Intelligence, Cyber Security, and Computational Models

    CERN Document Server

    Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn

    2016-01-01

    This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

  4. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    Science.gov (United States)

    2013-12-01

    mental domain in terms of another.”31 Ricoeur , Gerhart and Russell concur, emphasizing the central role metaphors play in thinking, creativity, and...Christian University Press, 1984), 133; P. Ricoeur , foreword to Metaphoric Process: The Creation of Scientific and Religious Understanding (Fort Worth...decisions of others. This creates multiple self -sustaining feedback loops, which are sometimes seen in the cyclical nature of markets; sometimes

  5. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    Science.gov (United States)

    2014-12-01

    and Social Network Analysis: The Framingham Study The growing obesity epidemic provides fertile ground for applying social network analysis as a...Study: Obesity and Social Network Analysis: The Framingham Study ............................................................................84 D...nation is more unequal, more diverse, more mixed race, more digitally linked, more tolerant, less married, less fertile , less religious, less mobile

  6. Security model for picture archiving and communication systems.

    Science.gov (United States)

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  7. An intruder model for verifying liveness in security protocols

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi

    2006-01-01

    We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equivalent to a Dolev-Yao intruder that does not delay indefinitely the delivery of messages. In order to prove the

  8. Re-designing the PhEDEx security model

    CERN Document Server

    Wildish, Anthony

    2013-01-01

    PhEDEx. the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model was designed to provide a safe working environment for site agents and operators, but provided little more protection than that. CMS data was not sufficiently protected against accidental loss caused by operator error or software bugs or from loss of data caused by deliberate manipulation of the database. Operations staff were given high levels of access to the database, beyond what should have been needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time.In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and r...

  9. Using a Prediction Model to Manage Cyber Security Threats.

    Science.gov (United States)

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  10. Using a Prediction Model to Manage Cyber Security Threats

    Directory of Open Access Journals (Sweden)

    Venkatesh Jaganathan

    2015-01-01

    Full Text Available Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  11. And at Home: Homeland Defense Strategy at the Southwest Border

    Science.gov (United States)

    2009-06-12

    NMS, 5. 2 For an in-depth study of the concept of globalization, see Friedman‘s The Lexus and the Olive Tree. 3 Strategy for Homeland Defense and... Lexus and The Olive Tree. New York: Random House, Inc., 1999. Hayworth, J. D. Whatever It Takes: Illegal Immigration, Border Security, and the War on

  12. Managing business compliance using model-driven security management

    Science.gov (United States)

    Lang, Ulrich; Schreiner, Rudolf

    Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.

  13. Trust Model to Enhance Security and Interoperability of Cloud Environment

    Science.gov (United States)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  14. European Climate - Energy Security Nexus. A model based scenario analysis

    International Nuclear Information System (INIS)

    Criqui, Patrick; Mima, Silvana

    2011-01-01

    In this research, we have provided an overview of the climate-security nexus in the European sector through a model based scenario analysis with POLES model. The analysis underline that under stringent climate policies, Europe take advantage of a double dividend in its capacity to develop a new cleaner energy model and in lower vulnerability to potential shocks on the international energy markets. (authors)

  15. European Climate - Energy Security Nexus. A model based scenario analysis

    Energy Technology Data Exchange (ETDEWEB)

    Criqui, Patrick; Mima, Silvana

    2011-01-15

    In this research, we have provided an overview of the climate-security nexus in the European sector through a model based scenario analysis with POLES model. The analysis underline that under stringent climate policies, Europe take advantage of a double dividend in its capacity to develop a new cleaner energy model and in lower vulnerability to potential shocks on the international energy markets. (authors)

  16. Modelling effective and simultaneous promotion of food security and ...

    African Journals Online (AJOL)

    This ineffectiveness extends to promoting household food security within the context of encouraging biodiversity conservation on farm lands. To examine this, this paper draws on recently conducted research to sketch the current model within which extension pursues these seemingly dichotomous objectives and identifies ...

  17. Composable security in the bounded-quantum-storage model

    NARCIS (Netherlands)

    S.D.C. Wehner (Stephanie); J. Wullschleger

    2007-01-01

    htmlabstractWe present a simplified framework for proving sequential composability in the quantum setting. In particular, we give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols.

  18. Organizational information assets classification model and security architecture methodology

    Directory of Open Access Journals (Sweden)

    Mostafa Tamtaji

    2015-12-01

    Full Text Available Today's, Organizations are exposed with huge and diversity of information and information assets that are produced in different systems shuch as KMS, financial and accounting systems, official and industrial automation sysytems and so on and protection of these information is necessary. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released.several benefits of this model cuses that organization has a great trend to implementing Cloud computing. Maintaining and management of information security is the main challenges in developing and accepting of this model. In this paper, at first, according to "design science research methodology" and compatible with "design process at information systems research", a complete categorization of organizational assets, including 355 different types of information assets in 7 groups and 3 level, is presented to managers be able to plan corresponding security controls according to importance of each groups. Then, for directing of organization to architect it’s information security in cloud computing environment, appropriate methodology is presented. Presented cloud computing security architecture , resulted proposed methodology, and presented classification model according to Delphi method and expers comments discussed and verified.

  19. South African Homelands as Frontiers

    DEFF Research Database (Denmark)

    This book explores what happened to the homelands – in many ways the ultimate apartheid disgrace – after the fall of apartheid. The nine chapters contribute to understanding the multiple configurations that currently exist in areas formerly declared "homelands" or "Bantustans". Using the concept ...... case study on the predicaments of African postcoloniality in general. This book was originally published as a special issue of the Journal of Southern African Studies....... of frontier zones, the homelands emerge as areas in which the future of the South African postcolony is being renegotiated, contested and remade with hyper-real intensity. This is so because the many fault lines left over from apartheid (its loose ends, so to speak) – between white and black; between...

  20. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  1. Adaptable Authentication Model - for Exploring the Weaker Notions of Security

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    operational environment. In past, this often caused increasing the power of attacker model, for instance, now a days we also consider privacy concerns and side channel leakage beside the classic Dolev-Yao attacker. A protocol is labeled as insecure protocol once an effective attack or flaw is found in it....... In fact, the most of the published protocols are considered insecure from this point of view. In practice, however, this approach has a side effect, namely, we rarely bother to explore how much insecure is the protocol. This question asks us to explore the area between security and insecurity; after all...... and sometimes with additional capabilities such as dynamic corruption of communicating nodes. Then, one tries to show that the protocol achieves its objective under this specific attacker. Naturally there are three possibilities: one may succeed in constructing a security proof; one may fail in proving security...

  2. CONCEPTUAL MODELLING AND ORGANIZATION OF SECURITY MECHANISMS IN DISTRIBUTED SYSTEMS

    Directory of Open Access Journals (Sweden)

    T. Galibus

    2016-01-01

    Full Text Available We analyze the existing DS from the point of security and construct a two-level hierarchy of models. Such approach allows us to separate the abstraction (architecture level and the concrete (component level of ISS. The core set of methods, i. e. authentication and key exchange protocols, corresponds to the abstraction level and is defined as security infrastructure (SI. The final security parameters optimization and additional mechanisms such as authorization, routing and data auditing of the protection mechanisms are configured on the component level of the DS. In addition, we outline the systematic step-by-step ISS configuration method.

  3. The Haptic Lines of Homeland

    Science.gov (United States)

    Dawson, P.; Takatsuka, M.

    2013-02-01

    This paper discusses the conceptual underpinnings, working processes and the tools used for preparing the scene files of a holographic art work which offers a subjective view point on the idea of homeland. The art work, Homeland, an optically formed fringe digital hologram, which is contextualized by the holographic maps used in situational awareness, indicates its subjectivity by strongly referencing the human body, particularly the lines of the palm of the hand. ... because the body belongs to the order of things as the world is universal flesh. Maurice Merleau-Ponty

  4. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  5. Generic Model to Send Secure Alerts for Utility Companies

    Directory of Open Access Journals (Sweden)

    Perez–Díaz J.A.

    2010-04-01

    Full Text Available In some industries such as logistics services, bank services, and others, the use of automated systems that deliver critical business information anytime and anywhere play an important role in the decision making process. This paper introduces a "Generic model to send secure alerts and notifications", which operates as a middleware between enterprise data sources and its mobile users. This model uses Short Message Service (SMS as its main mobile messaging technology, however is open to use new types of messaging technologies. Our model is interoperable with existing information systems, it can store any kind of information about alerts or notifications at different levels of granularity, it offers different types of notifications (as analert when critical business problems occur,asanotificationina periodical basis or as 2 way query. Notification rules can be customized by final users according to their preferences. The model provides a security framework in the cases where information requires confidentiality, it is extensible to existing and new messaging technologies (like e–mail, MMS, etc. It is a platform, mobile operator and hardware independent. Currently, our solution is being used at the Comisión Federal de Electricidad (Mexico's utility company to deliver secure alerts related to critical events registered in the main power generation plants of our country.

  6. Physical security and vulnerability modeling for infrasturcture facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen; Jones, Dean A.; Davis, Chad Edward; Turnquist, Mark Alan

    2006-07-01

    A model of malicious intrusions in infrastructure facilities is developed, using a network representation of the system structure together with Markov models of intruder progress and strategy. This structure provides an explicit mechanism to estimate the probability of successful breaches of physical security, and to evaluate potential improvements. Simulation is used to analyze varying levels of imperfect information on the part of the intruders in planning their attacks. An example of an intruder attempting to place an explosive device on an airplane at an airport gate illustrates the structure and potential application of the model.

  7. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  8. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  9. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  10. Application of military uncooled infrared sensors to homeland defense

    Science.gov (United States)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  11. Modeling Turkey’s future LNG supply security strategy

    International Nuclear Information System (INIS)

    Efe Biresselioglu, Mehmet; Hakan Demir, Muhittin; Kandemir, Cansu

    2012-01-01

    Turkey was among those countries which decided to increase its natural gas consumption in the 1990s, due to its relative low cost and lack of impact on the environment. However, a heavy dependence on imports, from Algeria, Qatar and Nigeria, respectively, creates a threat to energy security, both in terms of source and supply diversity. Accordingly, we follow an analytical approach to identify the accuracy of our assumption, considering the current economic, political and security risk. To this end, we formulate and solve a mixed integer programming model that determines the optimal sourcing strategy for Turkey’s increasing LNG demand. This model demonstrates a number of alternative policy options for LNG supply. Furthermore, we consider that increasing the proportion of LNG in the overall gas supply will contribute to the aim of improving Turkey’s level of energy security. - Highlights: ► Turkey’s best policy option is to increase the share of LNG. ► Turkey’s main suppliers of LNG will be Algeria, Egypt, Nigeria, and Trinidad and Tobago. ► Norway, Libya, and Oman contribute to the supply with rather smaller shares. ► With high risk scenario Algeria, Egypt, Nigeria and Libya will not be suppliers. ► Oman and Qatar will cover; even though they are high-cost suppliers.

  12. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  13. A Service Access Security Control Model in Cyberspace

    Science.gov (United States)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  14. Future consumer mobile phone security : a case study using the data centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    2008-01-01

    In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested,

  15. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  16. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control and data acquisition (SCADA) security...software assurance, critical infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control

  17. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  18. Modelling of Processes of Logistics in Cyberspace Security

    Directory of Open Access Journals (Sweden)

    Konečný Jiří

    2017-01-01

    Full Text Available The goal of this contribution is especially to familiarize experts in various fields with the need for a new approach to the system-defined model and modelling of processes in the engineering practice and the expression of some state variables' possibilities for the modelling of real-world systems with regard to the highly dynamic development of structures and to the behaviour of systems of logistics. Thus, in this contribution, the necessity of making full use of cybernetics as a field for the management and communication of information is expressed, and also the environment of cybernetics as a much needed cybernetic realm (cyberspace, determining the steady state between cyber-attacks and cyber-defence as a modern knowledge-based potential in general and specifically of logistics in cyber security. Connected with this process is the very important area of lifelong training of experts in the dynamic world of science and technology (that is, also in a social system which is also expressed here briefly, and also the cyber and information security, all of which falls under the cyberspace of new perspective electronic learning (e-learning with the use of modern laboratories with new effects also for future possibilities of process modelling of artificial intelligence (AI with a perspective of mass use of UAVs in logistics.

  19. Aviation security : TSA has completed key activities associated with implementing secure flight, but additional actions are needed to mitigate risks.

    Science.gov (United States)

    2009-05-01

    To enhance aviation security, the Department of Homeland Securitys (DHS) Transportation Security Administration (TSA) developed a programknown as Secure Flightto assume from air carriers the function of matching passenger information against...

  20. A model to secure a stable iodine concentration in milk

    Directory of Open Access Journals (Sweden)

    Gisken Trøan

    2015-12-01

    Full Text Available Background: Dairy products account for approximately 60% of the iodine intake in the Norwegian population. The iodine concentration in cow's milk varies considerably, depending on feeding practices, season, and amount of iodine and rapeseed products in cow fodder. The variation in iodine in milk affects the risk of iodine deficiency or excess in the population. Objective: The first goal of this study was to develop a model to predict the iodine concentration in milk based on the concentration of iodine and rapeseed or glucosinolate in feed, as a tool to securing stable iodine concentration in milk. A second aim was to estimate the impact of different iodine levels in milk on iodine nutrition in the Norwegian population. Design: Two models were developed on the basis of results from eight published and two unpublished studies from the past 20 years. The models were based on different iodine concentrations in the fodder combined with either glucosinolate (Model 1 or rapeseed cake/meal (Model 2. To illustrate the impact of different iodine concentrations in milk on iodine intake, we simulated the iodine contribution from dairy products in different population groups based on food intake data in the most recent dietary surveys in Norway. Results: The models developed could predict iodine concentration in milk. Cross-validation showed good fit and confirmed the explanatory power of the models. Our calculations showed that dairy products with current iodine level in milk (200 µg/kg cover 68, 49, 108 and 56% of the daily iodine requirements for men, women, 2-year-old children, and pregnant women, respectively. Conclusions: Securing a stable level of iodine in milk by adjusting iodine concentration in different cow feeds is thus important for preventing excess intake in small children and iodine deficiency in pregnant and non-pregnant women.

  1. Cooperative Monitoring Center Occasional Paper/7: A Generic Model for Cooperative Border Security

    Energy Technology Data Exchange (ETDEWEB)

    Netzer, Colonel Gideon

    1999-03-01

    This paper presents a generic model for dealing with security problems along borders between countries. It presents descriptions and characteristics of various borders and identifies the threats to border security, while emphasizing cooperative monitoring solutions.

  2. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    Science.gov (United States)

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  3. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  4. Business models and business model innovation in a “Secure and Distributed Cloud Clustering (DISC) Society”

    DEFF Research Database (Denmark)

    Lindgren, Peter; Taran, Yariv

    2011-01-01

    secure—but we still have some steps to go before we reach the final destination. The paper gives a conceptual futuristic outlook on behalf of the input from SW2010 and state of the art business model research to what we can expect of business Model and business model innovation in a future secure cloud......The development and innovation of business models to a secure distributed cloud clustering society (DISC)—is indeed still a complex venture and has not been widely researched yet. Numerous types of security technologies are in these years proposed and in the “slip stream” of these the study...... of secure business models and how business models can be operated and innovated in a secure context have intensified tremendously. The development of new mobile and wireless security technologies gives hopes to really realize a secure cloud clustering society where business models can act and be innovated...

  5. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initi......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...... and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it...

  6. A comprehensive Network Security Risk Model for process control networks.

    Science.gov (United States)

    Henry, Matthew H; Haimes, Yacov Y

    2009-02-01

    The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.

  7. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-07-21

    ... all levels of government to complete a cyber network security assessment so that a full measure of... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... comments; New Information Collection Request. SUMMARY: The Department of Homeland Security (DHS), National...

  8. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-04-21

    ... for all levels of government to complete a cyber network security assessment so that a full measure of... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... comments; New Information Collection Request: 1670-NEW. SUMMARY: The Department of Homeland Security (DHS...

  9. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    Science.gov (United States)

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…

  10. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...

  11. Analysis Social Security System Model in South Sulawesi Province: On Accounting Perspective

    OpenAIRE

    Mediaty,; Said, Darwis; Syahrir,; Indrijawati, Aini

    2015-01-01

    - This research aims to analyze the poverty, education, and health in social security system model based on accounting perspective using empirical study on South Sulawesi Province. Issued Law No. 40 for 2004 regarding National Social Security System is one of attentions from government about social welfare. Accounting as a social science deserves to create social security mechanisms. One of the crucial mechanisms is social security system. This research is a grounded exploratory research w...

  12. Modelling security properties in a grid-based operating system with anti-goals

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Bicarregui, J.; Matthews, B.; Yang, E.

    2008-01-01

    In this paper, we discuss the use of formal requirements-engineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to represent two security goals for Grid systems, namely authorisation and single-sign on authentication. We apply goal-refinement to derive security requirements for these two security goals and we develop a model of antigoals and show how system vulnerabilities and threats to the security goals can arise from such anti-m...

  13. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    OpenAIRE

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is a new model for creating and implementing information technology procedures. This model was validated by two different methods: the first being int...

  14. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  15. VBMP Digital Terrain Models - 2006/2007 (VA State Plane South)

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — These files contain Digital Elevation Model (DTM) file data for the Commonwealth of Virginia developed from imagery acquired in spring 2006 and 2007. In the spring...

  16. A model for best practice driven information security governance

    OpenAIRE

    2008-01-01

    To ensure the likely success of an organisation’s Information Security Governance, discipline leaders recommend that organisations follow the guidelines as set out in Information Security Governance best practice documents. Best practices and related documents from the Information Security Governance discipline, as well as best practices and related documents from the Corporate Governance and Information Technology Governance disciplines, all include sections pertaining to Information Securit...

  17. Threats at Our Threshold: Homeland Defense and Homeland Security in the New Century

    Science.gov (United States)

    2006-10-21

    what items were needed for collection. No one, for example, foresaw the immense need for diapers and baby formula. The diverse set of actors and...the local communications system wasn’t simply degraded ; it was, at least for a period of time, destroyed.”5 Over 180 central office locations were...forced off the air.6 Up to 2,000 cell towers were also knocked out and responder Land Mobile Radio communications were significantly degraded .7

  18. Aspects and Class-based Security: A Survey of Interactions between Advice Weaving and the Java 2 Security Model.

    NARCIS (Netherlands)

    Sewe, Andreas; Bockisch, Christoph; Mezini, Mira

    2008-01-01

    Various aspect-oriented languages, e.g., AspectJ, Aspect-Werkz, and JAsCo, have been proposed as extensions to one particular object-oriented base language, namely Java. But these extensions do not fully take the interactions with the Java 2 security model into account. In particular, the

  19. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  20. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  1. Evaluating the Security Risks of System Using Hidden Markov Models

    African Journals Online (AJOL)

    System security assessment tools are either restricted to manual risk evaluation methodologies that are not appropriate for real-time application or used to determine the impact of certain events on the security status of networked systems. In this paper, we determine the strength of computer systems from the perspective of ...

  2. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...

  3. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  4. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  5. A developmental approach to learning causal models for cyber security

    Science.gov (United States)

    Mugan, Jonathan

    2013-05-01

    To keep pace with our adversaries, we must expand the scope of machine learning and reasoning to address the breadth of possible attacks. One approach is to employ an algorithm to learn a set of causal models that describes the entire cyber network and each host end node. Such a learning algorithm would run continuously on the system and monitor activity in real time. With a set of causal models, the algorithm could anticipate novel attacks, take actions to thwart them, and predict the second-order effects flood of information, and the algorithm would have to determine which streams of that flood were relevant in which situations. This paper will present the results of efforts toward the application of a developmental learning algorithm to the problem of cyber security. The algorithm is modeled on the principles of human developmental learning and is designed to allow an agent to learn about the computer system in which it resides through active exploration. Children are flexible learners who acquire knowledge by actively exploring their environment and making predictions about what they will find,1, 2 and our algorithm is inspired by the work of the developmental psychologist Jean Piaget.3 Piaget described how children construct knowledge in stages and learn new concepts on top of those they already know. Developmental learning allows our algorithm to focus on subsets of the environment that are most helpful for learning given its current knowledge. In experiments, the algorithm was able to learn the conditions for file exfiltration and use that knowledge to protect sensitive files.

  6. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  7. Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models

    Energy Technology Data Exchange (ETDEWEB)

    Droppo, James G.

    2006-07-01

    The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and

  8. Advancing botnet modeling techniques for military and security simulations

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2011-06-01

    Simulation environments serve many purposes, but they are only as good as their content. One of the most challenging and pressing areas that call for improved content is the simulation of bot armies (botnets) and their effects upon networks and computer systems. Botnets are a new type of malware, a type that is more powerful and potentially dangerous than any other type of malware. A botnet's power derives from several capabilities including the following: 1) the botnet's capability to be controlled and directed throughout all phases of its activity, 2) a command and control structure that grows increasingly sophisticated, and 3) the ability of a bot's software to be updated at any time by the owner of the bot (a person commonly called a bot master or bot herder.) Not only is a bot army powerful and agile in its technical capabilities, a bot army can be extremely large, can be comprised of tens of thousands, if not millions, of compromised computers or it can be as small as a few thousand targeted systems. In all botnets, their members can surreptitiously communicate with each other and their command and control centers. In sum, these capabilities allow a bot army to execute attacks that are technically sophisticated, difficult to trace, tactically agile, massive, and coordinated. To improve our understanding of their operation and potential, we believe that it is necessary to develop computer security simulations that accurately portray bot army activities, with the goal of including bot army simulations within military simulation environments. In this paper, we investigate issues that arise when simulating bot armies and propose a combination of the biologically inspired MSEIR infection spread model coupled with the jump-diffusion infection spread model to portray botnet propagation.

  9. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  10. An Impact Assessment Model for Distributed Adaptive Security Situation Assessment

    National Research Council Canada - National Science Library

    Heckman, Mark; Joshi, Nikhil; Tylutki, Marcus; Levitt, Karl; Just, James; Clough, Lawrence

    2005-01-01

    The goal of any intrusion detection, anti-virus, firewall or other security mechanism is not simply to stop attacks, but to protect a computing resource so that the resource can continue to perform its function...

  11. Using Bayesian Networks and Decision Theory to Model Physical Security

    National Research Council Canada - National Science Library

    Roberts, Nancy

    2003-01-01

    .... Cameras, sensors and other components used along with the simple rules in the home automation software provide an environment where the lights, security and other appliances can be monitored and controlled...

  12. A multi-dimensional model for information security management

    OpenAIRE

    2011-01-01

    D.Phil. Any organisation is dependent on its information technology resources. The challenges posed by new developments such as the World Wide Web and e-business, require new approaches to address the management and protection of IT resources. Various documents exist containing recommendations for the best practice to follow for information security management. BS7799 is such a code of practice for information security management. The most important problem to be addressed in this thesis i...

  13. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  14. Virginia Base Mapping Program (VBMP) 2002; Digital Terrain Model developed for 1"=400' scale Digital Orthophotography for the North Zone of the Virginia State Plane Grid

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — These files contain rectified digital vector terrain model data. The vector files are uncompressed complete with coordinate information. The VBMP project encompasses...

  15. Virginia Base Mapping Program (VBMP) 2002; Digital Terrain Model developed for 1"=400' scale Digital Orthophotography for the South Zone of the Virginia State Plane Grid

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — These files contain rectified digital vector terrain model data. The vector files are uncompressed complete with coordinate information. The VBMP project encompasses...

  16. Methodology for Applying Cyber Security Risk Evaluation from BN Model to PSA Model

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Kang, Hyun Gook; Son, Han Seong

    2014-01-01

    There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility

  17. Homeland Security Strategic Research Action Plan 2016-2019

    Science.gov (United States)

    This is a four-year research strategy designed to meet the following objectives:Improve water utilities’ abilities to prepare for and respond to incidents that threaten public health; andAdvance EPA’s capabilities to respond to wide-area contamination

  18. Japan as a Paradigm for U.S. Homeland Security

    Science.gov (United States)

    2006-12-01

    aviation industry and offers rewards to those who support efforts to combat international terrorism against U.S. citizens or U.S. property. These...upon Huffman Aviation in Venice, Florida and started training. Jarrah obtained his single-engine private pilot certificate in early August, while Atta...and Britain. The FBO 55 National Commission on Terrorist Attacks upon the United States, 268–69

  19. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    safety belt law means that a citation for not wearing a safety belt can only be issued after the officer stops the vehicle or cites the offender for...implementation occurring at the state and local levels. Third, the campaign has had a significant focus on teens , and thus, has been messaged in the...Furthermore, there is a focus on youth, primarily teens , which lends itself well to repetitive messaging in the school systems. The case study on the

  20. Leveraging Social Media to Engage the Public in Homeland Security

    Science.gov (United States)

    2009-09-01

    safety cards are more likely to survive (Glass, 2001). Glass wrote, “Our tendency is to withhold information too long for fear that it will cause...to popular opinion, they do not loot. They do more than they’re given credit for. 13. They need to get acquainted and have a plan. 14. I’ve...so that they can define their needs.  You need to get to “Robust Statement of Needs” 84 Enablers  New Generation (The Millennials ) are

  1. Unmanned Aircraft Systems: A Logical Choice for Homeland Security Support

    Science.gov (United States)

    2011-12-01

    UAS, known as a Wasp , to conduct an aerial surveillance of the suspect’s 113 U.S. Library of Congress...Engineers in mapping areas affected by flooding along the Red River Valley. In places, such as California and Colorado, major forest fires are a...installing backup systems, still making UAS an operationally attractive and cost effective capability. Moreover, UAS have not traditionally been

  2. CADRE Quick-Look: Homeland Security-NORTHCOM's Coalition War

    National Research Council Canada - National Science Library

    Conway, John L

    2005-01-01

    .... Coalition warfare has many facets: it involves the blending of different cultures, multiple languages dialects, and disparate weapon systems, as well as differing perceptions of end states and how to...

  3. Deciding Who Lives: Considered Risk Casualty Decisions in Homeland Security

    National Research Council Canada - National Science Library

    Mahoney, Robert T

    2008-01-01

    .... Other disciplines such as philosophy, theology, bioethics, and the military, etc. have examined principles that are involved in the concept of accepting loss of life and have identified theoretical circumstances under which acceptance...

  4. Quantifying a Negative: How Homeland Security Adds Value

    Science.gov (United States)

    2015-12-01

    a fire in order to promote spread in a structure and realistically a very unlikely place for a non- arson fire to originate. The authors point out...medical services, special rescue services, hazardous materials response, and arson investigation could be great value as a performance measure to fire

  5. Homeland Security: There’s an App for That

    Science.gov (United States)

    2017-03-01

    views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S...sp800_163_draft.pdf. 17 Ken Yarmosh, “How Often You Should Update Your Apps,” Savvyapp, January 12, 2016, http://savvyapps.com/ blog /how-often-should-you-update...technologies. A system’s thinking approach reflects a group’s shared understanding of an incident and its interaction with the complex environment. The

  6. Department of Homeland Security Policy for Defense of Cyberspace

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2003-01-01

    .... A closer look at commercial enterprises includes web browsing, chat rooms, e-mail, e-commerce, overhauls of business practices and organizations, telecommunication operations, and management of power...

  7. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    fence row to fence row. 52 agribusiness .137 These policy shifts undid many of the New Deal agricultural policies that encouraged restraint138...their fields lie fallow.139 The reversal of this act coincided with the rise of major agribusiness corporations, and the declining financial...root plants instead of an organism sharing its micro and macro nutrients. 137 “ Agribusiness

  8. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    that left 12 families homeless .57 Citizens in other communities in the United States have also had their lives and homes directly threatened as a...Metal Theft, the Built Environment and the Dark Side of the Global Recycling Market,” Environmental Law and Management 20 (2008): 176–83. 88 “The...European Police Raid Scrapyards in Metal Theft Crackdown,” Global Post, May 31, 2013, accessed August 10, 2015, http://www.globalpost.com/dispatch

  9. Bioterrorism Countermeasure Development: Issues in Patents and Homeland Security

    National Research Council Canada - National Science Library

    Schacht, Wendy H; Thomas, John R

    2006-01-01

    ... potential biological threats. These bills proposed reforms to current policies and practices associated with intellectual property, particularly patents, and the marketing of pharmaceuticals and related products...

  10. Does the Army Need a Homeland Security Skill Identifier?

    Science.gov (United States)

    2011-06-10

    MOS is represented in the fourth character of the warrant officer MOSC . The use of a skill qualification identifier (SQI) in the fifth character of...the MOSC creates another MOS that carries the title of the SQI. (Department of the Army 2009a, 50) Multiple Skill Position (officers). A position...training. The SQI is represented in the fifth character of the warrant officer MOSC and may be used to represent functional career tracks with an

  11. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-06-25

    ... trends in international education; how colleges and universities use specific capabilities, tools, and... Historically Black Colleges and Universities, Hispanic Serving Institutions, Tribal Colleges and Universities, and other Minority Serving Institutions know of and take advantage of DHS internship and job...

  12. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    178). Philadelphia, PA: University of Pennsylvania Press. Leiss, W., & Powell, D. (1997). Mad cows and mother’s milk : The perils of poor risk...activities, watching their kids play ball, enjoying a family picnic, or finishing up their evening meal. Meteorologists had been talking about the...in a tornado, but I knew, and I said, ‘ Kids go get in the basement now.’ The ten steps that it took to get to my basement it was already hitting and

  13. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... usage conventions. Add a new HSAR subpart 3003.10, Contractor Code of Business Ethics and Conduct, with... to read as follows: Subpart 3003.10--Contractor Code of Business Ethics and Conduct Sec. 3003.1003 Requirements. 3003.1004 Contract clauses. Subpart 3003.10--Contractor Code of Business Ethics and Conduct 3003...

  14. Homeland Security: The Road Ahead for Continued Success

    National Research Council Canada - National Science Library

    Griese, Kevin R

    2008-01-01

    ... coordinated when responding to a disaster. The following research project addresses these issues and provides recommendations on how to continue the success that has been achieved. Finally, it addresses areas that should be more closely monitored such as continuing collaborative efforts and ensuring unity of effort.

  15. The Homeland Security Enterprise: Where Do We Fit?

    Science.gov (United States)

    2009-09-01

    Similarities Differences Religion Catholic 26.4%, Anglican 20.5%, other Christian 20.5%, Buddhist 1.9%, Muslim 1.5%, other 1.2%, unspecified...12.7%, none 15.3% (Central Intelligence Agency, 2008) Protestant 51.3%, Roman Catholic 23.9%, Mormon 1.7%, other Christian 1.6%, Jewish 1.7

  16. Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts

    National Research Council Canada - National Science Library

    Decker, Raymond

    2001-01-01

    .... Mail and postal workers. As requested, my testimony will focus on the work we have done over the past five years on combating terrorism and our recommendations advocating a risk management approach for such programs...

  17. Interagency collaboration challenges among homeland security disciplines in urban areas

    OpenAIRE

    Hagen, Jerome D.

    2006-01-01

    CHDS State/Local First responders have struggled to incorporate strategic direction provided by the federal government into their existing plans. An urgent call for teamwork and cooperation has changed the landscape for America's first responders. They have been required to shoulder new responsibilities and become more networked and interactive with their peer disciplines to achieve higher levels of performance and response capability. This thesis examines interactions among four key homel...

  18. Congressional Oversight of Homeland Security: Help or Hinderance?

    Science.gov (United States)

    2012-12-01

    goes on to examine what effect this assumption has on legislative activity. Three types of legislative activity he describes are “ advertising ,” “credit...1956, the SASC identified what they viewed as a duplication of efforts between the Army and the Air Force. The Army had sought to fund a Nike ...The “ Nike -Talos dispute” was only one of several disagreements between services Congress mediated in the late 1950s.218 As Thomas McNaugher wrote in

  19. Safety Risk Management for Homeland Defense and Security Responders

    National Research Council Canada - National Science Library

    Meyers, Tommey H

    2005-01-01

    .... Coast Guard and the U.S. Navy. This revealed that Operational Risk Management (ORM), a risk-based decision-making tool that systematically balances risk and mission completion, and Crew Resource Management (CRM...

  20. Southwest Hispanic Community -- The Absence of Homeland Security Threats

    Science.gov (United States)

    2012-12-01

    167 Philip Zimbardo, The Lucifer Effect (New York: Random House Trade Paperbacks, 2008), 211. 88 We are best...Hispanic groups and elite groups that would provide support. 168 Philip Zimbardo, The Lucifer Effect (New...Historical Perspective.” World Politics, Volume 32 (1981): 554–589. Zimbardo, Philip. The Lucifer Effect . New York: Random House Trade Paperbacks

  1. Volunteer Military Forces Provide Homeland Security Around the World

    Science.gov (United States)

    2007-01-01

    were in 1948.21 Membership to the Danish Home Guard is open to both men and women with an age requirement to be at least 18 years old at application...the Home Guard, is able to demonstrate his right - voluntarily and unpaid - to participate in the defence of his country and its democratic values...by planting 2.5 crore (i.e., 25-million) trees over 20,000 hectare of land in Mussoori Hills and Pithoragarh (UP), Bikaner and Jaisalmer ( Rajasthan

  2. Does Homeland Security Constitute an Emerging Academic Discipline?

    Science.gov (United States)

    2013-03-01

    disciplines that make it easy for them to find a job and receive good pay. 7. Entrepreneurs will enter and firms will expand in sectors that promise to be...industry-government triad and the societal influences that impact that ecosystem . As the components of the framework are evaluated on their own respective

  3. Risk Unbound: Threat, Catastrophe, and the End of Homeland Security

    Science.gov (United States)

    2015-09-01

    Louis Borges , Jorge Luis Borges , Collected Fictions, translated by H. Hurley (New York, NY: Penguin Books, 1998), 235. 15 So we now use the...3 (September 2003): 99–104. Borges , Jorge Louis. Jorge Luis Borges . Collected Fictions. Translated by Hurley, H. New York, NY: Penguin Books, 1998...that vast Map was Useless, and not without some Pitilessness was it, that they delivered it up to the Inclemencies of Sun and Winters. — Jorge Luis

  4. War in the Atlantic: A Historical Case of Homeland Security

    Science.gov (United States)

    2015-09-01

    Great Britain was the world’s premier naval power. This small kingdom governed colonies across the globe by dominating the ocean sea. During World War I...treaties and the League of Nations to resolve peacefully any disagreements among nations. The government had developed a fear of enemy bombers by this...to the Indian Ocean as a show of force, to be augmented over time by additional warships capable of deterrence. By contrast, Churchill wanted to

  5. Developing the Bench: Building An Effective Homeland Security Undergraduate Program

    National Research Council Canada - National Science Library

    Winegar, Scott

    2008-01-01

    .... The meta-analysis utilized a template of common HLS rubric, then used systematic study of existing core curriculum, topics in frequently used HLS texts, opinions of HLS leaders, opinions of Emergency...

  6. The Italian Army’s Role in Homeland Security

    Science.gov (United States)

    2003-04-07

    Roma: Stato Maggiore dell’Esercito – Reparto Impiego delle Forze, Ottobre 2000), B/1-2. 6 Norme di principio sulla disciplina militare, Legge 382, art...contrastare la criminalita` organizzata in Sicilia. Decreto-legge 349 (25 Luglio 1992). Norme di principio sulla disciplina militare. Legge 382 (11 Luglio

  7. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-10-09

    ... social media and other means of communication to most effectively reach this audience; how to ensure that... relationships with 4-year schools so that DHS employees' credits transfer towards a higher level degree; how to enhance existing relationships between FEMA's Emergency Management Institute and the higher education...

  8. Strengthening Homeland Security through Improved Foreign Language Capability

    Science.gov (United States)

    2011-12-01

    Multiculturalism , and Second Language Learning: The McGill Conference in Honour of Wallace E. Lambert, ed. Allan G. Reynolds (New Jersey: Lawrence...as valuable as immersion abroad, organizations may change their lax attitude regarding the use of foreign language in the workplace and at home... Multiculturalism , and Second Language Learning: The McGill Conference in Honour of Wallace E. Lambert, edited by Allan G. Reynolds, 43– 63. New

  9. Expanding the Role of Emergency Medical Services in Homeland Security

    Science.gov (United States)

    2013-03-01

    Conference, Aug 30–Sept 3, 2006. 15 issued the National Strategy for Biosurveillance .49 This report defines biosurveillance as “the process of...Strategy for Biosurveillance (Washington, D.C.: The White House, 2012). 50 Alex Garza G., “Real Time EMS Events as Surrogate Events in Syndromic...Statistical Challenges Facing Early Outbreak Detection in Biosurveillance ,” Technometrics 52, no. 1 (February, 2010), 39–51. 58 In addition

  10. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    Science.gov (United States)

    2012-12-01

    include terrorism. See Comprehensive Preparedness Guide (502) Factsheet at: http://www.fema.gov/pdf/about/divisions/ npd /cpg_502_factsheet_sept_%209...its ability to respond in a timely manner with food , shelter, clothing, and financial assistance has been eroded by the new bureaucracy. Some are...the hell is the cavalry on this one? We need food ! We need water! We need people! If we do not get more food into the south end (South Dade) in a

  11. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Kimberly A. [Georgia Inst. of Technology, Atlanta, GA (United States)

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

  12. Securing Nuclear and Radiological Material in the Homeland

    Science.gov (United States)

    2007-03-01

    to thank my wife Cindy, and children , Michael and Michelle. I thank you for your patience, support, and understanding for these eighteen months. I...Northwest,” Los Angeles Times, 13 July 2002 6/3/2002 Radiological al-Qa`ida allegedly attempts to acquire 11 lbs of radioactive thallium from

  13. Improving Information Exchange and Coordination Amongst Homeland Security Organizations

    National Research Council Canada - National Science Library

    Goan, Terrance; Mayk, Israel

    2005-01-01

    Command and Control for coordinated response to domestic terrorist attack will require the ability of Federal, state, and local agencies to maintain awareness of the status, capabilities, requirements...

  14. Homeland Security Organizations: Design Contingencies in Complex Environments

    Science.gov (United States)

    2011-09-01

    groups,” but that hierarchies are essentially “here to stay” (pp. 69–82). Tucker considers the relative advantages and disadvantages of both...Alberts & Hayes, 2003, p. 37). Hierarchies have several advantages , including a clear concept of reporting relationships, authority, and...intelligence agencies did not anticipate the adaptation of al-Qaeda from a central command structure to the current collection of regional franchises

  15. Basic Practices Aiding High-Performance Homeland Security Regional Partnerships

    National Research Council Canada - National Science Library

    Caudle, Sharon

    2006-01-01

    ....1 A national priority under the Goal is the use of geographic regions across the nation to share risk, engage in joint planning, and share resources to develop and sustain risk-based capability levels...

  16. Enhancing Public Helicopter Safety as a Component of Homeland Security

    Science.gov (United States)

    2016-12-01

    5 II. REVIEW OF THE LITERATURE AND BACKGROUND ........................... 7 A. EXEMPTIONS FROM THE FEDERAL AVIATION...Risk Assessment Tool GPS Global Positioning System IFR instrument flight rules ILS instrument landing system IMC instrument meteorological...flight rules ( IFR ) flying and the lack of a pre-flight risk assessment. Pilot fatigue is a factor that appeared in two of the accident reports (New

  17. The Strategic Value of Humanitarian Immigration Policy Toward Homeland Security

    National Research Council Canada - National Science Library

    Kliska, Jennifer

    2008-01-01

    The United States faces a terrorist threat provoked by an extremist ideology. A greater, more strategic, contribution to the global good would reduce anger toward the United States and enhance constructive alliances...

  18. The Affordable Care Act: A Prescription for Homeland Security Preparedness?

    Science.gov (United States)

    2014-09-01

    levied against the adult responsible for that juvenile. The ACA provides tax credits to people with lower incomes on a sliding scale in order to...Anthony, Thomas G. Ksiazek, Pierre E. Rollin, Clarence J. Peters, Stuart T. Nichol, Ali S. Khan, and Brian W. J. Mahy. “Reemergence of Ebola Virus in

  19. Overview of Infrastructure Science and Analysis for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-07-21

    This presentation offers an analysis of infrastructure science with goals to provide third-party independent science based input into complex problems of national concern and to use scientific analysis to "turn down the noise" around complex problems.

  20. Military Unmanned Aircraft Systems in Support of Homeland Security

    National Research Council Canada - National Science Library

    Weiger, Rusty L

    2007-01-01

    .... Potential roles would include border patrols, drug interdiction, illegal fishing/whaling, oil spills, disaster relief missions, long-term airborne communications nodes in times of national emergency...

  1. Membrane Inlet Mass Spectrometry for Homeland Security and Forensic Applications

    Science.gov (United States)

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; France, Neil

    2015-02-01

    A man-portable membrane inlet mass spectrometer has been built and tested to detect and monitor characteristic odors emitted from the human body and also from threat substances. In each case, a heated membrane sampling probe was used. During human scent monitoring experiments, data were obtained for inorganic gases and volatile organic compounds emitted from human breath and sweat in a confined space. Volatile emissions were detected from the human body at low ppb concentrations. Experiments with compounds associated with narcotics, explosives, and chemical warfare agents were conducted for a range of membrane types. Test compounds included methyl benzoate (odor signature of cocaine), piperidine (precursor in clandestine phencyclidine manufacturing processes), 2-nitrotoluene (breakdown product of TNT), cyclohexanone (volatile signature of plastic explosives), dimethyl methylphosphonate (used in sarin and soman nerve agent production), and 2-chloroethyl ethyl sulfide (simulant compound for sulfur mustard gas). Gas phase calibration experiments were performed allowing sub-ppb LOD to be established. The results showed excellent linearity versus concentration and rapid membrane response times.

  2. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  3. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  4. Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources

    Science.gov (United States)

    2012-01-01

    Protection photo by Gerald L. Nino. iii Preface The U.S. Department of Homeland Security (DHS) has the responsibility to protect and con- trol U.S. borders... bandit models (see, e.g., Cesa-Bianchi and Lugosi, 2006). A second rationale for introducing systematic randomness is that it makes it harder for

  5. Model-based security analysis of the German health card architecture.

    Science.gov (United States)

    Jürjens, J; Rumm, R

    2008-01-01

    Health-care information systems are particularly security-critical. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such systems. This work presents the experiences and results from the security analysis of the system architecture of the German Health Card, by making use of an approach to model-based security engineering that is based on the UML extension UMLsec. The focus lies on the security mechanisms and security policies of the smart-card-based architecture which were analyzed using the UMLsec method and tools. Main results of the paper include a report on the employment of the UMLsec method in an industrial health information systems context as well as indications of its benefits and limitations. In particular, two potential security weaknesses were detected and countermeasures discussed. The results indicate that it can be feasible to apply a model-based security analysis using UMLsec to an industrial health information system like the German Health Card architecture, and that doing so can have concrete benefits (such as discovering potential weaknesses, and an increased confidence that no further vulnerabilities of the kind that were considered are present).

  6. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  7. DESIGN AND RESEARCH OF MATHEMATICAL MODEL FOR INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK

    OpenAIRE

    Корнієнко, Б.Я.; кафедра комп`ютеризованих систем захисту інформації, Національний авіаційний університет; Галата, Л.П.; кафедра комп`ютеризованих систем захисту інформації, Національний авіаційний університет

    2017-01-01

    This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. The main approaches to simulation of computer networks are considered. The functional capabilities of the GNS3 package are explored. When building an imitation model, the main components of information protection were used. The Kali Linux package imp...

  8. Social security as Markov equilibrium in OLG models: A note

    DEFF Research Database (Denmark)

    Gonzalez Eiras, Martin

    2011-01-01

    I refine and extend the Markov perfect equilibrium of the social security policy game in Forni (2005) for the special case of logarithmic utility. Under the restriction that the policy function be continuous, instead of differentiable, the equilibrium is globally well defined and its dynamics alw...

  9. Enterprise Architecture-Based Risk and Security Modelling and Analysis

    NARCIS (Netherlands)

    Jonkers, Henk; Quartel, Dick; Kordy, Barbara; Ekstedt, Mathias; Seong Kim, Deng

    2016-01-01

    The growing complexity of organizations and the increasing number of sophisticated cyber attacks asks for a systematic and integral approach to Enterprise Risk and Security Management (ERSM). As enterprise architecture offers the necessary integral perspective, including the business and IT aspects

  10. An Intruder Model for Verifying Termination in Security Protocols

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    We formally describe an intruder that is suitable for checking fairness properties of security protocols. The intruder is proved to be equivalent to the Dolev-Yao intruder that respects the resilient communication channels assumption, in the sense that, if a fairness property holds in one of these

  11. Building a world class information security governance model

    CSIR Research Space (South Africa)

    Lessing, M

    2008-05-01

    Full Text Available The lack of a fully inclusive guideline document to assist the functioning of sufficient Information Security Governance is common in the business environment. This article focuses on developing such a guideline document, based on a number of best...

  12. Agent-Based Modelling for Security Risk Assessment

    NARCIS (Netherlands)

    Janssen, S.A.M.; Sharpans'kykh, Alexei; Bajo, J.; Vale, Z.; Hallenborg, K.; Rocha, A.P.; Mathieu, P.; Pawlewski, P.; Del Val, E.; Novais, P.; Lopes, F.; Duque Méndez, N.D.; Julián, V.; Holmgren, J.

    2017-01-01

    Security Risk Assessment is commonly performed by using traditional methods based on linear probabilistic tools and informal expert judgements. These methods lack the capability to take the inherent dynamic and intelligent nature of attackers into account. To partially address the limitations,

  13. Social security as Markov equilibrium in OLG models: A note

    DEFF Research Database (Denmark)

    Gonzalez Eiras, Martin

    2011-01-01

    I refine and extend the Markov perfect equilibrium of the social security policy game in Forni (2005) for the special case of logarithmic utility. Under the restriction that the policy function be continuous, instead of differentiable, the equilibrium is globally well defined and its dynamics...

  14. Analysis Of The Windows Vista Security Model And The Implications ...

    African Journals Online (AJOL)

    This paper provides an in-depth technical assessment of the security improvements implemented in the new Microsoft Windows Vista (officially released February, 2007), focusing primarily on the areas of User Account Protection and User Interface Privilege Isolation. This paper discusses these features and touches on ...

  15. A Key Generation Model for Improving the Security of Cryptographic ...

    African Journals Online (AJOL)

    In public key cryptography, the security of private keys is very importance, for if ever compromised, it can be used to decrypt secret messages. Conventional methods that use textual passwords, graphical passwords and single modal biometric systems that are used to encryption and protect private keys do not provide ...

  16. 76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2011-11-28

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Aviation Security Advisory...) will hold a meeting of the Aviation Security Advisory Committee (ASAC) via telephone conference on... Security, via the Administrator of TSA on matters affecting civil aviation security. This meeting is open...

  17. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  18. Dynamic Model of Islamic Hybrid Securities: Empirical Evidence From Malaysia Islamic Capital Market

    Directory of Open Access Journals (Sweden)

    Jaafar Pyeman

    2016-12-01

    Full Text Available Capital structure selection is fundamentally important in corporate financial management as it influence on mutually return and risk to stakeholders. Despite of Malaysia’s position as one of the major players of Islamic Financial Market, there are still lack of studies has been conducted on the capital structure of shariah compliant firms especially related to hybrid securities. The objective of this study is to determine the hybrid securities issuance model among the shariah compliant firms in Malaysia. As such, this study is to expand the literature review by providing comprehensive analysis on the hybrid capital structure and to develop dynamic Islamic hybrid securities model for shariah compliant firms. We use panel data of 50 companies that have been issuing the hybrid securities from the year of 2004- 2012. The outcomes of the studies are based on the dynamic model GMM estimation for the determinants of hybrid securities. Based on our model, risk and growth are considered as the most determinant factors for issuing convertible bond and loan stock. These results suggest that, the firms that have high risk but having good growth prospect will choose hybrid securities of convertible bond. The model also support the backdoor equity listing hypothesis by Stein (1992 where the hybrid securities enable the profitable firms to venture into positive NPV project by issuing convertible bond as it offer lower coupon rate as compare to the normal debt rate

  19. Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

    Directory of Open Access Journals (Sweden)

    Chun-Juan Ouyang

    2017-01-01

    Full Text Available Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.

  20. A Department of Homeland Security Reserves (DHS-R): Simultaneously Protecting the Homeland While Alleviating the Increased DoD Role in Homeland Defense and Security

    National Research Council Canada - National Science Library

    Schulz, David V

    2007-01-01

    .... Post-Katrina assessments highlight that the response to Hurricane Katrina has tarnished the DHS and FEMA's image and trust that Americans have in the government's ability to respond effectively to a disaster...

  1. Representing humans in system security models: An actor-network approach

    NARCIS (Netherlands)

    Pieters, Wolter

    2011-01-01

    System models to assess the vulnerability of information systems to security threats typically represent a physical infrastructure (buildings) and a digital infrastructure (computers and networks), in combination with an attacker traversing the system while acquiring credentials. Other humans are

  2. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    23 G. INTELLIGENCE COMMUNITY AND BORDER DEFENSE ..........25 H. STATE AND LOCAL LAW ENFORCEMENT ..................................28 I...2014, 6, http://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT415/RAND_CT415.pdf. 5 changes in cargo security and the costs companies ...that private companies take. In the private sector, ROI is a measure of the overall profit or loss of an investment, expressed in percentage.25 For

  3. A model of airport security work flow based on petri net

    Science.gov (United States)

    Dong, Xinming

    2017-09-01

    Extremely long lines at airports in the United States have been sharply criticized. In order to find out the bottleneck in the existing security system and put forward reasonable improvement plans and proposal, the Petri net model and the Markov Chain are introduced in this paper. This paper uses data collected by transportation Security Agency (TSA), assuming the data can represent the average level of all airports in the Unites States, to analysis the performance of security check system. By calculating the busy probabilities and the utilization probabilities, the bottleneck is found. Moreover, recommendation is given based on the parameters’ modification in Petri net model.

  4. The Model-Driven openETCS Paradigm for Secure, Safe and Certifiable Train Control Systems

    DEFF Research Database (Denmark)

    Peleska, Jan; Feuser, Johannes; Haxthausen, Anne Elisabeth

    2012-01-01

    A novel approach to managing development, verification, and validation artifacts for the European Train Control System as open, publicly available items is analyzed and discussed with respect to its implications on system safety, security, and certifiability. After introducing this so-called model......-driven openETCS approach, a threat analysis is performed, identifying both safety and security hazards that may be common to all model-based development paradigms for safety-critical railway control systems, or specific to the openETCS approach. In the subsequent sections state-of-the-art methods suitable...... of security hazards....

  5. Research of Models for Evaluating the Optimal Level of Information Security Investment

    Directory of Open Access Journals (Sweden)

    A. S. Polyakova

    2012-03-01

    Full Text Available This article presents a research of Gordon—Loeb model for evaluating the optimal level of information security investment and a model of interdependent risks. One is provided by practical recommendations for choosing and applying models, for choosing a range of vulnerabilities to concentrate financial resources on, and weak points of models are discussed.

  6. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    Science.gov (United States)

    Schaffner, Christian

    2010-09-01

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. König, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from König suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from König requires less noise in storage to achieve security, our “canonical” protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  7. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    International Nuclear Information System (INIS)

    Schaffner, Christian

    2010-01-01

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  8. Security Process Capability Model Based on ISO/IEC 15504 Conformant Enterprise SPICE

    Directory of Open Access Journals (Sweden)

    Mitasiunas Antanas

    2014-07-01

    Full Text Available In the context of modern information systems, security has become one of the most critical quality attributes. The purpose of this paper is to address the problem of quality of information security. An approach to solve this problem is based on the main assumption that security is a process oriented activity. According to this approach, product quality can be achieved by means of process quality - process capability. Introduced in the paper, SPICE conformant information security process capability model is based on process capability modeling elaborated by world-wide software engineering community during the last 25 years, namely ISO/IEC 15504 that defines the capability dimension and the requirements for process definition and domain independent integrated model for enterprise-wide assessment and Enterprise SPICE improvement

  9. Model Based Cyber Security Analysis for Research Reactor Protection System

    International Nuclear Information System (INIS)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung; Son, Hanseong

    2013-01-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN

  10. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  11. Generating unique IDs from patient identification data using security models.

    Science.gov (United States)

    Mohammed, Emad A; Slack, Jonathan C; Naugler, Christopher T

    2016-01-01

    The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  12. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Science.gov (United States)

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  13. Modeling Local vs. Global Dimensions of Food Security in Sub-Saharan Africa

    Science.gov (United States)

    Evans, T. P.; Caylor, K. K.; Estes, L. D.; McCord, P. F.; Attari, S.; Sheffield, J.

    2015-12-01

    Food security remains a daunting challenge in Sub-Saharan Africa despite dramatic efforts to foster innovation in the agricultural sector. Food security is complicated by a diversity of factors whose relative influence varies across scales, such as the nature of transportation infrastructure, the variety of agricultural practices, and the relative importance of food production versus food access. Efforts to model food security often focus on local-level dynamics (agricultural decision-making) or regional/coarse scale dynamics (e.g. GCM output + generalized equilibrium models of food trade) - both scales are of paramount importance to food security. Yet models of food security rarely span this scale divide. We present work linking agent-based models of agricultural decision-making to regional and global dynamics of environmental change, food movement and virtual water trade in sub-Saharan Africa. Specifically we investigate the heterogeneity of environmental factors and agricultural decisions within the context of droughts of different duration and spatial extent. Drivers of meteorological drought manifest in agricultural drought through the complexity inherent in agricultural management. But efforts to model food security are often challenged by a lack of local-level empirical data to characterize the relationship between meteorological drought and agricultural drought. Our agent-based model is built using detailed information on household farm assets and individual farmer decisions, combined with crop yield estimated developed using the DSSAT cropping system model run with bias-corrected meteorological data. We then address food access through a analysis of food trade data given the increasing relevance of food movement to mitigate local and regional drought. We discuss the analytical challenges and opportunities in linking these cross-scale dynamics in food security modeling.

  14. Security Audit of WLAN Networks Using Statistical Models of Specified Language Group

    Directory of Open Access Journals (Sweden)

    KREKAN Jan

    2013-05-01

    Full Text Available In order to build a secure computing environment, persons responsible for data security need tools which allow them to test the security of data being protected. Research of passwords, used in usual computing environments, showed that easy to remember non-dictionary passwords are widely used. So it should be useful to build a statistical model,which can then be used to create very effective password lists for testing the security of a given protected data object. The problem is that the society from specified location is using also foreign words,from languages widely used. This article describes a comparison of different language models used for this new statistical candidates generation method. This generator could be then used to test the strength of passwords used to protect wireless networks which useWPA-PSK as its data encryption standard. The password candidates passed to tools which perform the security audit. This method could be described also as sorting of Brute-force password candidates usingknowledge about languages used by the users. The tests showed that using combination of language models (MIX of specified language group for the password candidates’ generator could improve thespeed of the security procedure by 37% relatively in average (60% speedup when finding 50% of passwords – in 0.69% vs 1.715% of Bruteforce combinations comparing to mother language model (SK and 20 times average absolute speedup comparing to Bruteforce.

  15. A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qian Xiao

    2012-09-01

    Full Text Available To provide security for data gathering based on network coding in wireless sensor networks (WSNs, a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPPaamp;PP protocol using network coding is designed. DPPaamp;PP makes use of a new proposed pollution symbol selection and pollution (PSSP scheme based on a new obfuscation idea to pollute existing symbols. Analyses of DPPaamp;PP show that it not only requires low overhead on computation and communication, but also provides high security on resisting brute-force attacks.

  16. An energy security management model using quality function deployment and system dynamics

    International Nuclear Information System (INIS)

    Shin, Juneseuk; Shin, Wan-Seon; Lee, Changyong

    2013-01-01

    An energy security management model using quality function deployment (QFD) and system dynamics (SD) is suggested for application in public policymaking in developing economies. Through QFD, experts are guided toward identifying key energy security components, including indicators and policies, and in making these components consistent, focused, and customized for a particular country. Using these components as inputs, we construct an intermediate complex system dynamics model with a minimal number of crucial interactions. Key policies are simulated and evaluated in terms of the improvement of key indicators. Even with little data, our approach provides a coherent, useful, and customized energy security management model to help policymakers more effectively manage national energy security. To demonstrate its advantages, the model is applied to the Korean gas sector as an example. - Highlights: ► We suggest an energy security management model for developing economies. ► We identify a consistent set of key components, indicators and policies by using QFD. ► A coherent and practical system dynamics model based on QFD's output is constructed. ► The model is applied to the Korean gas sector as an example

  17. Regional Radiological Security Partnership in Southeast Asia - Increasing the Sustainability of Security Systems at the Site-Level by Using a Model Facility Approach

    International Nuclear Information System (INIS)

    Chamberlain, Travis L.; Dickerson, Sarah; Ravenhill, Scott D.; Murray, Allan; Morris, Frederic A.; Herdes, Gregory A.

    2009-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO), created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's Global Threat Reduction Initiative (GTRI) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP is to cooperate with countries in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports objectives to improve the security of high risk radioactive sources by raising awareness of the need and developing national programs to protect and control such materials, improve the security of such materials, and recover and condition the materials no longer in use. The RRSP has utilized many tools to meet those objectives including: provision of physical protection upgrades, awareness training, physical protection training, regulatory development, locating and recovering orphan sources, and most recently - development of model security procedures at a model facility. This paper discusses the benefits of establishing a model facility, the methods employed by the RRSP, and three of the expected outcomes of the Model Facility approach. The first expected outcome is to increase compliance with source security guidance materials and national regulations by adding context to those materials, and illustrating their impact on a facility. Second, the effectiveness of each of the tools above is increased by making them part of an integrated system. Third, the methods used to develop the model procedures establishes a sustainable process that can ultimately be transferred to all facilities beyond the model. Overall, the RRSP has utilized the Model Facility approach as an important tool to increase the security of radioactive sources, and to position facilities and countries for the long term secure management of those sources.

  18. Main control computer security model of closed network systems protection against cyber attacks

    Science.gov (United States)

    Seymen, Bilal

    2014-06-01

    The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.

  19. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  20. Routing in Vehicular Networks: Feasibility, Modeling, and Security

    Directory of Open Access Journals (Sweden)

    Ioannis Broustis

    2008-01-01

    Full Text Available Vehicular networks are sets of surface transportation systems that have the ability to communicate with each other. There are several possible network architectures to organize their in-vehicle computing systems. Potential schemes may include vehicle-to-vehicle ad hoc networks, wired backbone with wireless last hops, or hybrid architectures using vehicle-to-vehicle communications to augment roadside communication infrastructures. Some special properties of these networks, such as high mobility, network partitioning, and constrained topology, differentiate them from other types of wireless networks. We provide an in-depth discussion on the important studies related to architectural design and routing for such networks. Moreover, we discuss the major security concerns appearing in vehicular networks.