WorldWideScience

Sample records for modeling homeland security

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. A value model for evaluating homeland security decisions.

    Science.gov (United States)

    Keeney, Ralph L; von Winterfeldt, Detlof

    2011-09-01

    One of the most challenging tasks of homeland security policymakers is to allocate their limited resources to reduce terrorism risks cost effectively. To accomplish this task, it is useful to develop a comprehensive set of homeland security objectives, metrics to measure each objective, a utility function, and value tradeoffs relevant for making homeland security investments. Together, these elements form a homeland security value model. This article develops a homeland security value model based on literature reviews, a survey, and experience with building value models. The purposes of the article are to motivate the use of a value model for homeland security decision making and to illustrate its use to assess terrorism risks, assess the benefits of countermeasures, and develop a severity index for terrorism attacks. © 2011 Society for Risk Analysis.

  3. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  4. Creation of a Homeland Security Jail Information Model

    Science.gov (United States)

    2012-03-01

    In contrast, law enforcement officers at a jail have a better gestalt understanding of homeland security threats and trends in the same...and my personal familiarity with each model. In his book Beyond the Two Disciplines of Scientific Psychology , Lee Cronbach claims that...muhajir.background/index.html Cronbach, L. J. (1975). Beyond the two disciplines of scientific psychology . Washington, D.C.: American Psychologist

  5. Department of Homeland Security

    Science.gov (United States)

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... HP - 2016 CISRM HP - 2016 CISRM Critical Infrastructure Security HP - Surge Capacity Force HP - Surge Capacity Force ...

  6. Modeling Homeland Security: A Value Focused Thinking Approach

    Science.gov (United States)

    2013-02-21

    BIB -1 viii List of Figures Page Figure 2-1: Organization of the Department of Homeland Security...richard.deckro@afit.edu. BIB -1 Bibliography 1. Advisory Panel to Assess Domestic Response Capabilities For Terrorism Involving Weapons of...House, 2002. BIB -2 13. CERN: European Organization for Nuclear Resources. “Affinity Diagram.” Technical Support Division. November 2002

  7. Homeland Security and Information.

    Science.gov (United States)

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  8. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...... challenge. Europe and the United States have reacted differently to the emergence of mass casualty terrorism, but must work together to cope with the diverse issue areas, sectors, professions, and relevant actors involved in such a broad-based concept. The authors suggest that Europe and the US have a lot...

  9. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... SECURITY Homeland Security Information Network Advisory Committee AGENCY: Department of Homeland Security... Applicants for Appointment to Homeland Security Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information...

  10. Homeland Security: A Selected Bibliography

    Science.gov (United States)

    2011-04-01

    March 7, 2006. 19pp. (AD-A449- 850) http://handle.dtic.mil/100.2/ADA449850 Flynn, Stephen E., and Daniel B. Prieto . Neglected Defense: Mobilizing...R41250.pdf Flynn, Stephen E., and Daniel B. Prieto . Neglected Defense: Mobilizing the Private Sector to Support Homeland Security. New York: Council...ADA478240 Clarke, Richard Alan . Your Government Failed You: Breaking the Cycle of National Security Disasters. New York: Ecco, 2008. 408pp

  11. Robotic systems for homeland security

    Science.gov (United States)

    Esser, Brian; Miller, Jon; Huston, Dryver R.; Bourn, Phil

    2004-07-01

    This paper will present the concept of utilizing various mobile robotic platforms for homeland security. Highly specialized mobile robots equipped with the proper sensors and data processing capabilities have the ability to provide security and surveillance for a wide variety of applications. Large infrastructure components, such as bridges, pipelines, dams, and electrical power grids pose severe challenges for monitoring, surveillance, and protection against man-made and natural hazards. The structures are enormous, often with awkward and dangerous configurations that make it difficult, if not impossible, for continuous human surveillance. Properly outfitted robots have the potential to provide long-term surveillance without requiring continuous human supervision. Furthermore, these robotic platforms can have disaster mitigation capabilities such as evaluation of infrastructure integrity at the disaster site. The results presented will include proof-of-concept robotic platforms equipped with various sensor arrays, as well as discussion of design criteria for numerous homeland security applications.

  12. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  13. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  14. The National Homeland Security Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — The National Homeland Security Research Center advances our nation's security by providing scientific products and expertise to improve the ability to respond to and...

  15. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    ... homeland security, results of a cyber security exercise, sharing information with others, and Southwest... would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially...

  16. Homeland security intelligence : to what end?

    OpenAIRE

    2010-01-01

    CHDS State/Local Approved for public release; distribution is unlimited In this thesis, I present potential solution sets to the question of why homeland security leaders and practitioners use intelligence to improve homeland security decisions. Specific roles and benefits of intelligence are identified, analyzed, and where applicable, extended to domestic security objectives across the homeland security community spectrum. This thesis purports and defends the theory that there are many...

  17. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... AGENCY Department of Homeland Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA... of Homeland Security. The Department of Homeland Security will work with OPP pursuant to the Homeland Security Presidential Directives and the 2009 National Infrastructure Protection Plan. DATES:...

  18. The Proposed Homeland Security Budget for 2013

    Science.gov (United States)

    2012-09-01

    United States Holocaust Memorial Museum. CBO 6 THE PROPOSED HOMELAND SECURITY BUDGET FOR 2013 CBOFigure 2. Homeland Security Funding Requested by the...Marshals Service Bureau of Alcohol, Tobacco, Firearms, and Explosives Federal Bureau of Investigation Miscellaneousa Food and Drug Administration...Administration National Security Division Food and Drug Administration Federal Bureau of Investigation Firearms, and Explosives Bureau of Alcohol, Tobacco

  19. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology Advisory...

  20. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... violent extremism domestically; the current threat environment; evolving threats in cyber security... receive a briefing on evolving threats in cyber security. This will include lessons learned and potential... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of...

  1. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ...) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the... (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Closed...

  2. Curriculum Evaluation and Revision in a Nascent Field: The Utility of the Retrospective Pretest-Posttest Model in a Homeland Security Program of Study

    Science.gov (United States)

    Pelfrey, William V., Sr.; Pelfrey, William V., Jr.

    2009-01-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent…

  3. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  4. 75 FR 2880 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-01-19

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Committee management... providing strategic, timely and actionable advice. ] The HSAC will meet publicly to swear in new Council members, receive observations and remarks from DHS senior leadership, and review and...

  5. U.S. Homeland Security R&D Budgets

    Energy Technology Data Exchange (ETDEWEB)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  6. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  7. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  8. Homeland Security Affairs Journal, Volume IV - 2008: Issue 3, October

    OpenAIRE

    2008-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. October 2008. The articles in this issue of Homeland Securit...

  9. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  10. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  11. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the... public. DATES: The Homeland Security Science and Technology Advisory Committee will meet January 26, 2010...

  12. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  13. 33 CFR 101.205 - Department of Homeland Security alignment.

    Science.gov (United States)

    2010-07-01

    ... alignment. 101.205 Section 101.205 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Department of Homeland Security alignment. The MARSEC Levels are aligned with the Department of Homeland... alignment. Table 101.205—Relation Between HSAS and MARSEC Levels Homeland security advisory system...

  14. Analytical Approaches to Address Homeland Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Holter, Gregory M.; Young, Jonathan

    2003-11-01

    Homeland security concerns arising since September 11, 2001, have captured national attention and sparked a number of responses at all levels of government. As events have unfolded and the nature of the situation has become better understood within the United States, the need for effective planning and response has resulted in the identification of significant analytical challenges. These challenges relate to a number of different needs, including the following: (1) estimating the probability and the potential impact of various threats, (2) identifying the need for and effectiveness of specific counter-measures, and (3) assessing the combined results of interacting activities and events. Analytical approaches traditionally used for safety engineering and risk analysis, coupled with analytical approaches borrowed from other systems analysis disciplines, can be usefully adapted to help meet these challenges. This paper identifies and discusses several illustrative examples of the analytical challenges currently being faced with respect to homeland security. Linkages are then examined between these specific challenges and traditional analytical approaches from a variety of disciplines, including safety engineering and risk analysis. Since effective cooperation among responsible agencies and organizations has been identified as an issue of concern and is essential to achieve an effective homeland security strategy and response capability, issues relating to multiple interacting activities are specifically highlighted.

  15. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  16. Homeland security in the USA: past, present, and future.

    Science.gov (United States)

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.

  17. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    Science.gov (United States)

    2012-12-01

    Gail F. Thomas, and Erik Jansen , “Building Collaborative Capacity: An Innovative Strategy for Homeland Security Preparedness,” in Advances in...Intelligence Analysis (Washington DC: CQ Press, 2011), 123. 184 Ropert Bood and Theo Postma, “Scenario Analysis as a Strategic Management Tool” (Groningen...World Mirrors Life of Ecosystems.” Computer Reseller News (February 1996): 36. Bood, Ropert and Theo Postma. “Scenario Analysis as a Strategic

  18. Economics definitions, methods, models, and analysis procedures for Homeland Security applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

    2010-01-01

    This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation & Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

  19. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  20. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC) AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet on February 27th-28th, 2013 in Washington, DC....

  1. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    National Preparedness: A Case Study in the Development of Public Policy,” Sam Clovis agrees that homeland security is a national issue but...recommends that state and local governments have maximum flexibility in implementing homeland security programs ( Clovis , 2006). He sees the federal...national preparedness ( Clovis , 2006). The author goes on to recommend a framework of “Collaborative Federalism” for homeland security. A review of

  2. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security....

  3. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    Science.gov (United States)

    2014-12-01

    Exchange Commission (SEC), was a champion of plain language and realized how critical it is for financial documents. The SEC handbook remains an excellent...contagious back to the 1930s, as described in the Jacob Moreno sociograms. The language of contagion is part of pop culture today, and it is common to... contagion are also applicable to resiliency matters of homeland security. Fostering resilient behaviors in the community can have a contagious influence on

  4. Risk Unbound: Threat, Catastrophe, and the End of Homeland Security

    Science.gov (United States)

    2015-09-01

    something different of homeland security professionals. B. PROBLEM STATEMENT Three dominant pillars of homeland security theory and practice...term is that in which the price of copper and the rate of interest twenty years hence, all the obsolescence of a new invention are uncertain. About

  5. Homeland security: sharing and managing critical incident information

    Science.gov (United States)

    Ashley, W. R., III

    2003-09-01

    Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.

  6. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... SECURITY Committee Name: Homeland Security Information Network Advisory Committee (HSINAC) AGENCY... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network... Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the...

  7. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Science.gov (United States)

    2010-07-29

    ... SECURITY Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday, August... meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet from... Homeland Security Information Network Advisory Committee is to identify issues and provide to...

  8. Curriculum evaluation and revision in a nascent field: the utility of the retrospective pretest--posttest model in a homeland security program of study.

    Science.gov (United States)

    Pelfrey, William V; Pelfrey, William V

    2009-02-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent field, the establishment of a program curriculum was forced to draw from a variety of disciplines. Curriculum evaluation was complicated by the rapid changes occurring in the emerging discipline, producing response shift bias, and interfering with the pre-post assessments. To compensate for the validity threat associated with response shift bias, a retrospective pretest-posttest evaluative methodology was used. Data indicate the program has evolved in a significant and orderly fashion and these data support the use of this innovative evaluation approach in the development of any discipline.

  9. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    and largely ignores the social aspects that influence an individual’s beliefs, attitudes and, behaviors.53 Self-efficacy is defined by Albert Bandura ...master’s thesis Naval Postgraduate School, Monterey, CA), 39–52 53 Ibid., 53. 54 Albert Bandura , “Self-efficacy: Toward a Unifying Theory of...Hometown Security: Advancing the Homeland Security Paradigm, Homeland Security Affairs V (2009). http://www.hsaj.org/?fullarticle=5.2.2. Bandura

  10. 75 FR 59278 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-09-27

    ... enforcement agencies concerning transportation infrastructure. Members will also receive domestic and international intelligence briefings that are focused on threats against the homeland which require responsive... vulnerabilities identified in a cyber exercise and discuss potential methods to improve a federal response...

  11. Ultrafast fiber lasers for homeland security

    Science.gov (United States)

    Okhotnikov, O. G.

    2005-09-01

    Detecting weapons concealed underneath clothing, analyzing the contents of suspicious-looking envelopes, or even spotting the onset of cancer: these are just some of the exciting prospects that have been turning terahertz wave research into one of the most important topics in photonics. Most broadband pulsed THz sources are based on the excitation of different materials with ultrashort laser pulses. So far, generation of tunable narrow-band THz radiation has been demonstrated using ultrafast solid state lasers as a source of high-intensity optical pulses. The lack of a high-power, low-cost, portable room-temperature THz source is the most significant limitation of modern THz systems. Advances in fiber laser technology can be used to further the capabilities of the homeland security. Using semiconductor saturable absorber mirrors allows for reliable mode-locked operation with different values of cavity dispersion in a broad spectrum ranged from 900 to 1600 nm. Semiconductor saturable absorbers mirrors have been used successfully to initiate and to sustain mode-locking in a wide range of core-pumped fiber lasers. The main advantage of the semiconductor saturable absorber mirrors (SESAM) is the possibility to control important parameters such as absorption recovery time, saturation fluence and modulation depth through the device design, growth conditions and post-growth processing. The SESAM as a cavity mirror in the fiber laser results in compact size, environmentally stable and simple ultrashort pulse lasers that can cover wide wavelength range and generate optical pulses with durations from picoseconds to femtoseconds. Employing SESAM technology for mode-locking, the double-clad fiber laser promises superior pulse quality, high stability and pulse energy without need for power booster that eventually degrades the pulse quality due to nonlinear distortions in the amplifier fiber. We give an overview of recent achievements in ultrafast fiber lasers; discuss basic

  12. Application of Near-Space Passive Radar for Homeland Security

    Science.gov (United States)

    Wang, Wenqin

    2007-03-01

    To protect the homeland from terrorist attacks employing explosive devices, revolutionary advances across a wide range of technologies are required. Inspired by recent advances in near-space (defined as the region between 20 km and 100 km), this paper proposes a new passive radar system using opportunistic transmitter as an illuminator and near-space platform as a receiver. This concept differs substantially from current radars. This system can be operated as a passive bistatic or multistatic radar and hence largely immune to jamming. By placing the receiver in near-space platforms, many functions that are currently performed with satellites or airplanes could be performed much more cheaply and with much greater operational utility. These advantages make near-space passive attractive for a variety of applications, many of which fit well with the needs of homeland security. This paper details the role of near-space passive radar as sensor system that can support homeland security applications. The strengths and weakness of near-space passive radar, compared to current spaceborne and airborne radars, are detailed. The signal models and processing algorithms for near-space passive radar are provided. It is shown that the use of cost effective near-space platforms can provide the solutions that were previously thought to be out of reach to remote sensing and government customers.

  13. Managing Materials and Wastes for Homeland Security Incidents

    Science.gov (United States)

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  14. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-06-25

    ... community approach and preparedness culture within student and neighboring communities; how to strengthen... relating to student and recent graduate recruitment; international students; academic research; campus and... (Student and Recent Graduate Recruitment, Homeland Security Academic Programs, Academic Research and...

  15. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on...

  16. Solving homeland security's wicked problems: a design thinking approach

    OpenAIRE

    Wyckoff, Kristin L.

    2015-01-01

    Approved for public release; distribution is unlimited The Department of Homeland Security’s Science and Technology Directorate (DHS S&T) requires a consistent yet flexible approach to address wicked problems. A design-thinking methodology holds promise, as its tenets align with the diversity and complexity inherent within the homeland security environment. Design thinking emphasizes a human-centered and multidisciplinary approach to solution development. The research examined how design t...

  17. Homeland Security Department: FY2011 Appropriations

    Science.gov (United States)

    2010-08-27

    administers several programs, including the BioWatch program, the National Biosurveillance Integration System (NBIS), and the department’s...coordination activities are implemented); the National Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.104...Acquisition 20 61 78 Radiation Portal Monitoring Program — 8 20 Securing the Cities 20 — 20 Human Portable Radiation Detection Systems — 53 38

  18. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  19. Homeland Security Department: FY2009 Appropriations

    Science.gov (United States)

    2009-03-04

    programs throughout DHS, and administers several of them, including the BioWatch program, the National Biosurveillance Integration System (NBIS...increase of $68 million for procurement of Advanced Spectroscopic Portals (ASPs) was partly offset by a decrease of $10 million for the Securing the...Nuclear Forensics Center, and $15 million for the Radiation Portal Monitoring Program. The House continued the prohibition on full-scale procurement

  20. Homeland Security Department: FY2006 Appropriations

    Science.gov (United States)

    2005-06-29

    continuing resolution.” e. P.L. 101-130, enacted after the Loma Prieta earthquake, appropriated $1.1 billion in supplemental funding for FY1990. In...cooperate with and assist DHS in any investigation or reinvestigation. The authorization would cease to be effective once the President has selected...that investigations for DHS security clearances are done in the most timely and efficient manner once the 9/11 Act reforms take effect .” (Congressional

  1. A Homeland Security Net Assessment Needed Now!

    Science.gov (United States)

    2015-12-01

    significant such historical comparisons are for today. One of the most important developments has been the establishment of a network of 78 state...mission of directing DOD cyber opera- tions and defending military information networks . The commander of USCYBERCOM also serves as director of the...to telecoms to aviation.”71 In recent years it seems as if just about everybody in the national security and intelligence communities has jumped on

  2. Homeland Security Affairs Journal, Volume VII - 2011, 10 Years After: The 9/11 Essays

    OpenAIRE

    2011-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. 10 Years After: the 9/11 Essays. Homeland Security Affairs (...

  3. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  4. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION... Homeland Security has determined that the renewal of the charter of the Homeland Security Science...

  5. Homeland Security Research and Development Funding, Organization, and Oversight

    Science.gov (United States)

    2006-08-22

    University of Southern California; agro-security at the University of Minnesota and at Texas A&M; on behavioral and sociological aspects of terrorism at the...computational challenges for homeland security. DHS also supports a university fellowship /training program, which plans to train 200 students in 2007, down from...300 in 2006, and up to 15 postdoctoral fellows. Regarding intramural R&D, DHS may use any federal laboratory and may establish a headquarters

  6. Homeland Security Intelligence: To What End

    Science.gov (United States)

    2010-09-01

    author’s adaptive threat orientation model are derived spring from military strategist John Boyd’s (1995) “Observe-Orient-Decide-Act Loop” or “OODA...In his revolutionary presentation Organic Design for Command and Control (1995), military strategist John Boyd proposed the key to decisive combat...scholar Henry P. Monaghan (1970, p. 25) has proposed that contemporary Presidents have embraced the role of “Protector-in-Chief” and with “ever

  7. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal Emergency...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue...

  8. Integrating statewide research and education resources for homeland security: the State University System of Florida Consortium on Homeland Security (Invited Paper)

    Science.gov (United States)

    Pearson, James E.; Olson, Peter J.

    2005-05-01

    The eleven universities of the State University System of Florida (SUS-FL) have established a consortium to address the full range of homeland security and domestic preparedness requirements for both Florida and the U.S. The Consortium has established the Florida Homeland Security Institute to provide an effective and efficient mechanism to coordinate, mobilize, combine, and form into teams the diverse, cross-disciplinary expertise, facilities, and established large base of technology development activities within the SUS-FL institutions and their established associates at industrial companies, governmental labs, and other universities. The Florida Consortium and Institute may provide a model for other state university systems for how to combine established resources effectively to address specific homeland security and domestic preparedness needs. This paper describes the Consortium and Institute goals, structure, and operations, with examples of how it has functioned in its brief existence as an effective mechanism for integrating the wide range of university, industry, and government capabilities within the state for addressing homeland security requirements.

  9. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data

  10. The Role of the National Guard in Homeland Security

    Science.gov (United States)

    2007-05-01

    became the tool to militarily protect the westward expansion. In 1790, under Harmer , and in 1791 under St. Clair, forces which consisted of primarily...militia with additional regular units were defeated by Indians in the Northwest frontier. Both Harmer and St. Clair defended themselves by...and Charles W. Yost. Army Forces for Homeland Security. Santa Monica, CA: RAND Corporation, 2004. Davis, Lynn E., and Jeremy Shapiro, ed. The U.S

  11. Federal-Tribal Government Collaboration in Homeland Security

    Science.gov (United States)

    2007-09-01

    wide variety of national critical infrastructure. Dams, water impoundments and reservoirs, electrical generation plants, drinking water, and...Kalt and Singer point out, “did not and do not absorb the tribes into the United States; rather, the reverse is true. The treaties recognize and...identified as a point of need for effective homeland security actions, Kettl points out that without better collaboration between the state and local

  12. The Homeland Security Enterprise: Where Do We Fit?

    Science.gov (United States)

    2009-09-01

    they are dependent upon the grant funding to help offset the burdens of establishing and maintaining a state of readiness. Samuel Clovis (2006...by Samuel H. Clovis , Jr., Chair of the Department of Business Administration and Economics at Morningside College in Sioux City, Iowa. 15 Like...Secretary Chertoff (2006, p. 1), Clovis (2006, p. 1) asserts future homeland security challenges “Require solutions for which the existing structures

  13. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    familysecuritymatters.org/publications/id.7744/pub_detail.asp. 2 Arthur Tulak, Robert Kraft, and Don Silbaugh, “State Defense Forces and Homeland Security...not part of an elite group of well-armed, well-trained military soldiers hardened by the trials of lethal combat—most were simply the undesirables of...Guard. Accessed September 15, 2014. http://www.tnmilitary.org/tennessee-state- guard.html. Tulak, Arthur , Robert Kraft, and Don Silbaugh. “State

  14. Role of Information Management in Advancing Homeland Security

    Science.gov (United States)

    2011-07-01

    understanding they need to make decisions. Many articles have addressed the tangled web of homeland security issues in terms of authorities, bud- gets , or...directly impact public safety. Despite significant strides since 9/11, decision makers at all levels still do not get the information they need when...Texas Law Review, Vol. 88, p. 1854. 7. Merrie Archer, “The Whole of Government Planning Process,” U.S. Department of State, Washington, D.C., 18

  15. The Fire Service’s Role in Maritime Homeland Security

    Science.gov (United States)

    2011-03-01

    homeland security partners, information sharing, planning and ferry/ cruise ship response. Leaders from other federal and local agencies that have a role...explosion on a cruise ship or ferryboat will require a fire boat, response vessels and specialized training. Currently, the ability of first...responders to work with cruise ships is at the discretion of the cruise ship operators as most of these vessels are foreign flagged and local governments

  16. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed...-036, Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6036....

  17. Field-Capable Biodetection Devices for Homeland Security Missions

    Energy Technology Data Exchange (ETDEWEB)

    Dougherty, G M; Clague, D S; Miles, R R

    2007-04-05

    Biodetection instrumentation that is capable of functioning effectively outside the controlled laboratory environment is critical for the detection of health threats, and is a crucial technology for Health Security. Experience in bringing technologies from the basic research laboratory to integrated fieldable instruments suggests lessons for the engineering of these systems. This overview will cover several classes of such devices, with examples from systems developed for homeland security missions by Lawrence Livermore National Laboratory (LLNL). Recent trends suggest that front-end sample processing is becoming a critical performance-determining factor for many classes of fieldable biodetection devices. This paper introduces some results of a recent study that was undertaken to assess the requirements and potential technologies for next-generation integrated sample processing.

  18. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting...

  19. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY: The Secretary of Homeland Security has determined that...

  20. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... Management Agency--006 Citizen Corps Database'' and retitle it ``Department of Homeland Security/ Federal... System name: DHS/FEMA--006 Citizen Corps Program Security classification: Unclassified. System location... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal...

  1. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS... Security Information Network Advisory Committee (HSINAC) will meet on Tuesday, June 25th, 2013 from 1 p.m...: http://www.dhs.gov/homeland-security-information-network-advisory-committee . There is a meeting...

  2. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Undue influence upon Department of Homeland... Brokers § 111.34 Undue influence upon Department of Homeland Security employees. A broker must not influence or attempt to influence the conduct of any representative of the Department of Homeland Security...

  3. Test of radiation detectors used in homeland security applications.

    Science.gov (United States)

    Pibida, L; Minniti, R; O'Brien, M; Unterweger, M

    2005-05-01

    This work was performed as part of the National Institute of Standards and Technology (NIST) program to support the development of the new American National Standards Institute (ANSI) standards N42.32-2003 and N42.33-2003 for hand-held detectors, and personal electronic dosimeters, as well as to support the Office of Law Enforcement Standards (OLES) and the Department of Homeland Security (DHS) in testing these types of detectors for their use by first responders. These instruments are required to operate over a photon energy range of 60 keV to 1.33 MeV and over a wide range of air-kerma rates. The performance and response of various radiation detectors, purchased by the NIST, was recorded when placed in 60Co, 137Cs, and x-ray beams at different air-kerma rates. The measurements described in this report were performed at the NIST x-ray and gamma-ray radiation calibration facilities. The instruments' response (exposure or dose rate readings) shows strong energy dependence but almost no dependence to different air-kerma rates. The data here reported provide a benchmark in support of current protocols that are being developed for radiation detection instrumentation used in homeland security applications. A future plan is to test these devices, plus other commercially available detectors, against ANSI standards N42.32-2003 and N42.33-2003.

  4. Nuclear Theory for Astrophysics, Stockpile Stewardship, and Homeland Security

    Science.gov (United States)

    Hayes, Anna

    2004-10-01

    A large number of problems key to astrophysics, stockpile stewardship, and homeland defense rely on knowledge of nuclear physics in regimes inaccessible to experiment. In stellar and nuclear explosions unstable nuclei and nuclear isomers are produced in copious quantities and are used to diagnose the explosion. Similarly, analysis of the unstable nuclei from the debris will be key to attribution in the event of a terrorist domestic nuclear attack. In the case of nuclear non-proliferation a number of new schemes are being considered by the IAEA to address the ever greater needs, including neutrino monitoring of the plutonium content of reactors. For all of these problems detailed nuclear theory is required. In this talk I discuss the theoretical physics needs for the type of problems of overlapping interest to astrophysics and national security.

  5. Pulse-shape discrimination scintillators for homeland security applications

    Science.gov (United States)

    Ellis, Mark E.; Duroe, Kirk; Kendall, Paul A.

    2016-09-01

    An extensive programme of research has been conducted for scintillation liquids and plastics capable of neutron-gamma discrimination for deployment in future passive and active Homeland Security systems to provide protection against radiological and nuclear threats. The more established detection materials such as EJ-301 and EJ-309 are compared with novel materials such as EJ-299-33 and p-terphenyl. This research also explores the benefits that can be gained from improvements in the analogue-to-digital sampling rate and sample bit resolution. Results are presented on the Pulse Shape Discrimination performance of various detector and data acquisition combinations and how optimum configurations from these studies have been developed into field-ready detector arrays. Early results from application-specific experimental configurations of multi-element detector arrays are presented.

  6. The Impact of Organizational Culture on the Sharing of Homeland Security Information

    Science.gov (United States)

    2008-04-04

    IMPACT OF ORGANIZATIONAL CULTURE ON THE SHARING OF HOMELAND SECURITY INFORMATION By Jeffery E. Bradey GS-15, Department of Defense...information sharing tool. 15. SUBJECT TERMS organizational culture , Homeland Security Information Network, information sharing 16. SECURITY...41 Organizational Culture .................................................................................................. 41

  7. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and Technology Directorate, DHS..., 56662-56663 that the Homeland Security Science and Technology Advisory Committee (HSSTAC) would meet on... will be held at the Department of Homeland Security (DHS), Science and Technology Directorate, 1120...

  8. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    Science.gov (United States)

    2013-05-24

    Future of Homeland Security,” FDCH Congressional Testimony (July 12, 2012): Military & Government Collection, EBSCOhost , 2, (accessed July 31, 2012...Government Collection, EBSCOhost , 1, (accessed July 31, 2012). 12 U.S. Department of Homeland Security, Department of Homeland Security Strategic Plan...Department’s Roles/Missions,” FDCH Political Transcripts (n.d.): Military & Government Collection, EBSCOhost , 8, (accessed July 31, 2012). 14 Don Harvey and

  9. Formal Critiques and After Action Reports from Conventional Emergencies: Tools for Homeland Security Training and Education

    Science.gov (United States)

    2010-09-01

    Exercise Evaluation Guide EMS Emergency Medical Services HSEEP Homeland Security Exercise and Evaluation Program IAP Incident Action Plan IP...must not be dumped from the pedagogical learning model used primarily for childhood education into an andragorical model without orientation on how...reporting an explosion at a food processing plant is received. The initial responding companies confirm the report and identify the source of the

  10. Wearable high-tech gear for homeland security personnel

    Science.gov (United States)

    Venkateswarlu, Ronda; Hui Wei, Choo; Li Lian, Ngiam; Lim, E. T.; Zhu, Zijian; Yang, Mingjiang

    2006-05-01

    Recent homeland security problems in various countries indicate that fixed surveillance systems at important places are not adequate enough. As the security threats take new dimensions in future, mobile smart security personnel wearing high-tech gear will form the basic infrastructure. See first, listen first, detect first, track first, communicate first with peers, assess the threat and coordinate with security head-quarters are the functions of high-tech gear. This paper proposes a high-tech gear involving (i) hands-free and obtrusion-free textile-based wearable microphone array to capture users voice and interface with body-worn computer, (ii) microphone arrays embedded in textiles to listen and record others voices from a distance, (iii) miniature cameras embedded in the shirt to provide the user with omni vision (iv) wireless personal display as GUI hidden in textile or natural glasses, (v) GPS and body area network for positional awareness for information in the form of text or textile integrated, (vi) reconfigurable HW/SW for all the above functions configured in the form of a usual belt. The main focus of this paper is how to configure the high-tech gear with all these sophisticated functions to disappear into the natural wearables of the user giving him normal look in the public. This project is sponsored by Defence Science & Technology Agency, Ministry of Defence, Singapore. This paper covers multi-discipline technologies at system level, hence not possible to go into details of any subsystem. The main objective of this paper is to share our thoughts and get feedback. Progress and some critical design issues are discussed in this paper.

  11. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... Administration-015 Registered Traveler Operations Files (November 8, 2005, 69 FR 67735), which was written to...)-015 Registered Traveler (RT) Operations File Files (November 8, 2005, 69 FR 67735), which was written... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland...

  12. Fire Stations - FIRE_STATIONS_HSIP_IDHS_IN: Fire Stations in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — FIRE_STATIONS_HSIP_IDHS_IN is a point shapefile that contains locations of fire station, as developed for the Homeland Security Infrastructure Program (HSIP). The...

  13. Hospitals - HOSPITALS_HSIP_IDHS_IN: Hospitals in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — HOSPITALS_HSIP_IDHS_IN is a point shapefile that contains hospital locations, as developed for the Homeland Security Infrastructure Program (HSIP). The data were...

  14. Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter

    Science.gov (United States)

    2007-06-01

    Bringing HPC to the First Responder and Warfighter DISTRIBUTION: Approved for public release, distribution unlimited This paper is part of the following...thru ADP023803 UNCLASSIFIED Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter Gopal Patnaik and...Urban AerodynamicsE1 3, these models are now the fidelity and accuracy of CFD to the first responder or commonly applied to predict contaminant

  15. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science...

  16. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    Constitution. From the requirement for Congress to appropriate money before the executive branch can spend it, to the advice and consent given by the...addressed and improve bills. a. Recommendation 14 The homeland security committees should take any parliamentary actions that will help them secure... parliamentary actions that will help them secure larger jurisdiction over homeland security topics. 101 APPENDIX B. HURRICANE KATRINA HEARINGS Date

  17. How Should Municipal Police Agencies Participate in America’s Homeland Security Strategy?

    Science.gov (United States)

    2008-12-01

    from a decidedly federal approach to a municipal orientation. After all, Thomas Ridge, former director of the department of Homeland Security, said...policy or operating procedures is 82 Remarks By Homeland Security Director Thomas Ridge to...R. Mauborgne. Blue Ocean Strategy. Massachusetts: Harvard Business School Press, 2005. Laqueur , Walter. The New Terrorism: Fanaticism and the Arms

  18. Defining the Role and Responsibility of the Fire Service Within Homeland Security

    Science.gov (United States)

    2010-03-01

    High Low Strategy Canvas : The Fire Service’s Approach to Homeland Security Eliminate Raise Reduce Create A Holistic Approach to Homeland Security Red...The starfish and the spider : The unstoppable power of leaderless organizations. London, England: Penguin Books Ltd. Bryson, J. (2004). Strategic

  19. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    Science.gov (United States)

    2007-09-01

    Rosell, Richard, “2007 Troop “C” Strategic Plan”. Hamilton: NJSP, 2007. Schwarzenegger , Arnold . California State Homeland Security Strategy...Strategy’s CMA do not contain goals. Arnold Schwartzenegger, The California Homeland Security Strategy. (Sacramento: Office of the Governor, 2005

  20. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  1. 76 FR 19107 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-011...

    Science.gov (United States)

    2011-04-06

    ...In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department of Homeland Security system of records titled, ``Department of Homeland Security Federal Emergency Management Agency--011 Training and Exercise Program Records System of Records.'' This system of records will allow the Department of Homeland Security/Federal Emergency Management Agency to collect and maintain records on its training and exercise programs. This system of records will include the personally identifiable information of current and former Federal Emergency Management Agency employees and contractors, current and former members of the first responder and emergency management communities, and others who have applied or registered to participate in or who have assisted with Federal Emergency Management Agency's training and exercise programs. The Department of Homeland Security is issuing a Notice of Proposed Rulemaking, to exempt this system of records from certain provisions of the Privacy Act, elsewhere in the Federal Register. In addition, in accordance with the Privacy Act of 1974 the Department of Homeland Security is giving notice that it proposes to consolidate the Privacy Act system of records notice titled, Department of Homeland Security/ Federal Emergency Management Agency/National Emergency Training Center--017 Student Application and Registration Records system of records (October 5, 2004, 69 FR 192) into this system of records. This newly established system will be included in the Department of Homeland Security's inventory of record systems.

  2. 75 FR 41097 - Homeland Security Acquisition Regulation; Lead System Integrators [HSAR Case 2009-003

    Science.gov (United States)

    2010-07-15

    ...The Department of Homeland Security (DHS) is issuing an interim rule amending the Homeland Security Acquisition Regulation (HSAR) to implement section 6405 of the U.S. Troop Readiness, Veterans' Care, Katrina Recovery, and Iraq Accountability Appropriations Act, 2007. This section of the Act and these implementing regulations restrict contractors from acting as lead system integrators in the......

  3. 75 FR 55335 - Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information...

    Science.gov (United States)

    2010-09-10

    ... private sector. Additionally, the Department of Homeland Security is issuing a Notice of Proposed... SECURITY Office of the Secretary Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security... the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department...

  4. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... Security Management System of Records AGENCY: Privacy Office; DHS. ACTION: Notice of Privacy Act system of... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... routine uses of this system have been reviewed and updated to reflect the personnel security...

  5. The National Guard and its Role in Homeland Security

    Science.gov (United States)

    2007-11-02

    Mobilizing Against Terrorism," CQ Weekly 57, no. 10 (6 March 99) 522 [ database on-line]; available from EBSCOhost ; accessed 8 September 2001. 34 Alan Ferber...November 2001. 6 Ibid. ś Kevin Stringer, "A Homeland Defense Mission," Military Review 80 (May/June 2000) 98 [ database on-line]; available from UMI...Implications for Homeland Defense," Abstract from Air University Research Database ; available from http://au.af.mil/au/ database /research/ay2001/affp

  6. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Science.gov (United States)

    2010-04-01

    ... authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY § 0.2 All other CBP regulations issued under the authority of the Department of Homeland Security. (a...

  7. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... and future leadership, employees, and the public about the history of the Department. DHS is... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--027 The History..., Department of Homeland Security-2004- 0004 Oral History Program: The History of the Department of Homeland...

  8. 41 CFR 102-73.196 - What types of special purpose space may the Department of Homeland Security lease?

    Science.gov (United States)

    2010-07-01

    ... purpose space may the Department of Homeland Security lease? 102-73.196 Section 102-73.196 Public... Delegations § 102-73.196 What types of special purpose space may the Department of Homeland Security lease? The Department of Homeland Security is delegated authority to lease whatever space its...

  9. Solving Homeland Security’s Wicked Problems: A Design Thinking Approach

    Science.gov (United States)

    2015-09-01

    business innovation research, futures and forecasting , prize authority, business accelerators, and engagement with industry, international...tackle homeland security’s complex problems. 14. SUBJECT TERMS design thinking, innovation , DHS S&T, Department of Homeland Security, science and...design thinking? .......................................................................................16 a. Innovation Labs

  10. An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.

  11. Intelligence-Led Risk Management for Homeland Security: A Collaborative Approach for a Common Goal

    Science.gov (United States)

    2011-12-01

    and how they will be disseminated. The intelligence analysis/production step and risk analysis/production step represent a codependent ...NEED FOR COLLABORATION IN RISK MANAGEMENT Risk management and intelligence within the homeland security context share a codependent relationship

  12. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... terrorists, drug cartel leaders or other persons known to have been involved in major crimes or terror of... to Homeland Security; and Known terrorists, drug cartel leaders or other persons known to have...

  13. Groupthink: a significant threat to the homeland security of the United States

    OpenAIRE

    Ricciuti, James E.

    2014-01-01

    Approved for public release; distribution is unlimited The groupthink psychological phenomenon prevalent in the homeland security enterprise is a significant threat to the United States. Homeland security is vulnerable to groupthink because its leaders frequently share similar backgrounds, work histories, and world-views. This similarity minimizes the chance of outside perspectives being introduced to the decision-making process, which insulates leadership from external ideas. This researc...

  14. Homeland Security Vulnerabilities Of The US National Capital Region’s Bridges

    Science.gov (United States)

    2016-06-10

    THE HOMELAND SECURITY VULNERABILITIES OF THE US NATIONAL CAPITAL REGION’S BRIDGES A thesis presented to the Faculty of the U.S...AUG 2015 – JUNE 2016 4. TITLE AND SUBTITLE The Homeland Security Vulnerabilities of the US National Capital Region’s Bridges 5a. CONTRACT...SUPPLEMENTARY NOTES 14. ABSTRACT The National Capital Region (NCR) is plagued by the same critical infrastructure vulnerabilities, disrepair, and

  15. Bureaucracies, communities and networks : interagency cooperation for Homeland Security In Monterey County

    OpenAIRE

    Scott, Gerald R.

    2003-01-01

    Approved for public release; distribution is unlimited. The federal government has undertaken a massive reorganization in order to create the Department of Homeland Security, and a parallel debate over how to organize homeland security functions has arisen at the State and Local government levels. In a time of severe budget constraints and rapidly changing threats, governments at all levels recognize the need for multiple government agencies, the private sector and nongovernmental organiza...

  16. Ethernet-based integrated surveillance system for homeland security and homeland defense

    Science.gov (United States)

    Schooley, Michael G.; Thompson, Dean

    2004-09-01

    This report documents the results of an internal DRS effort to develop an Ethernet based integrated defense system to improve defense of cities, harbors, airports, power production, energy supplies, bridges, monuments, dams and so forth. Results of the integration of multiple SCOUT LPI radars and multiple Electro-optical targeting systems will be provided, illustrating the benefits of interfacing surveillance radars with imaging sensors to confirm detection and provide visual recognition and identification. An analysis of the handover errors will be provided including errors due to; sensor platforms location and orientation uncertainty, target location measurement errors, data latency and motion prediction errors, which contribute to target handoff and the re-acquisition timeline. These predictions will be compared to measured results. The system architecture will be defined including; security, support for both stationary and moving sensor platforms, remote control of sensor systems and distribution of imagery through the network and remote diagnostics, maintenance and software upgrades. Growth capabilities include secure wireless communication to/from moving platforms, integration with sonar and seismic sensors, cooperative location of friendly forces and acoustic detection and triangulation of gunshots with automated cueing of sensors and security forces to the shooters most probable location. The use of ad hoc multi-hopping wireless networking supplements hardwire networks, augments disaster response capabilities, provides high-speed communications for moving platforms and supplements GPS outage areas.

  17. An exploratory risk perception study of attitudes toward homeland security systems.

    Science.gov (United States)

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  18. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... NICCS Portal is a national online resource for cybersecurity awareness, education, talent management... following Information Collection Request (ICR) to the Office of Management and Budget (OMB) for review and... Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security Presidential Directive (HSPD)...

  19. Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding

    Science.gov (United States)

    2015-12-01

    case study of the United Kingdom’s grant allocation approach provides a comparative analysis for DHS funding. Components of the UK’s allocation...the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL December 2015...38 V. UNITED KINGDOM CASE STUDY ................................................................41 A. UNITED KINGDOM APPROACH

  20. Management of the Severely Mentally Ill and Its Effects on Homeland Security

    Science.gov (United States)

    2011-09-01

    Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from...waiting. Gang and graffiti calls Public Intoxication calls, some of which may be a result of the mentally ill. The process the go through when dealing

  1. Impact of Homeland Security Alert level on calls to a law enforcement peer support hotline.

    Science.gov (United States)

    Omer, Saad B; Barnett, Daniel J; Castellano, Cherie; Wierzba, Rachel K; Hiremath, Girish S; Balicer, Ran D; Everly, George S

    2007-01-01

    The Homeland Security Advisory System (HSAS) was established by the Department of Homeland Security to communicate the risk of a terrorist event. In order to explore the potential psychological impacts of HSAS we analyzed the effects of terror alerts on the law enforcement community. We used data from the New Jersey Cop 2 Cop crisis intervention hotline. Incidence Rate Ratios--interpreted as average relative increases in the daily number of calls to the Cop 2 Cop hotline during an increased alert period--were computed from Poisson models. The hotline received a total of 4,145 initial calls during the study period. The mean daily number of calls was higher during alert level elevation compared to prior 7 days (7.68 vs. 8.00). In the Poisson regression analysis, the Incidence Rate Ratios of number of calls received during elevated alert levels compared to the reference period of seven days preceding each change in alert were close to 1, with confidence intervals crossing 1 (i.e. not statistically significant) for all lag periods evaluated. This investigation, in the context of New Jersey law enforcement personnel, does not support the concern that elevating the alert status places undue stress upon alert recipients.

  2. Integrating Local Public Health Agencies into the Homeland Security Community

    Science.gov (United States)

    2007-03-01

    public health needs that require attention (such as poor prenatal health, teen pregnancy , and sexually transmitted diseases) it is not difficult to...Security objectives. It also assumes that war and terrorism are the sole results of poor health, nutrition , and housing, while ignoring other

  3. Department of Defense Homeland Security Joint Operating Concept

    Science.gov (United States)

    2004-02-01

    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while...security, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  4. Defense and Homeland Security Applications of Multi-Agent Simulations

    Science.gov (United States)

    2007-12-01

    Monterey, CA 93943-5219, U.S.A. Felix Martinez Wargaming Department Centro de Estudios Superiores Navales Mexico, D.F. 04840, MEXICO Lisa R...critical asset, Petroleos Mexicano (PE- MEX) and the Mexican Navy maintain mutually supportive security strategies in the Campeche Sound. During a state of

  5. Achieving Homeland Security in a Time of Diminishing Resources

    Science.gov (United States)

    2012-06-08

    Kristine L. Shelstad, “The Domestic Security Command–The Evolution of the U.S. Northern Command” (Master’s Thesis, Naval Postgraduate School, Monterrey , CA...through the use of economic, diplomatic, military, and political power. 59 BIBLIOGRAPHY Books Turabian, Kate L. A Manual for Writers of Term

  6. Homeland security R&D roadmapping : risk-based methodological options.

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  7. Interagency Collaboration Challenges Among Homeland Security Disciplines in Urban Areas

    Science.gov (United States)

    2006-03-01

    Strategic National Stockpile SPD Seattle Police Department SPOC Seattle Police Operations Center SWAT Special Weapons and Tactics xix TCL Target...established a command post at their Seattle Police Operations Center ( SPOC ) and not at the incident site. The SPOC is a secure police facility and its choice...https://www.chds.us/public.php?met. Christopher Bellavita, online class forum discussion with the author, January, 2006, https://www.chds.us/ courses

  8. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    Science.gov (United States)

    2009-09-01

    Thesis Advisor Glen Woodbury Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security Affairs iv THIS PAGE...Barry Berman and Joel R. Evans define gap analysis as the tool that “Enables a company to compare its actual performance against its potential...Management: A Strategic Approach 7/E, Barry Berman and Joel R Evans,” Prentice Hall, http://www.prenhall.com/rm_student/html/start.html (accessed

  9. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors ...magazine-feature-article-september-2014. pdf ?sfvrsn=2, 12. 2 “Copper Theft Threatens U.S. Critical Infrastructure,” Federal Bureau of Investigation...www.nerc.com/files/6_Dabdoub_10-20_v2. pdf . 10 Jasvir Gill, Continuous Monitoring: A New Approach to Secure Critical Infrastructure (Atlanta, GA: North

  10. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Interprofessional Learning Scale (RIPLS) or the 18-item Interprofessional Education Perception Scale ( IEPS ) to measure students’ attitudes and perceptions of...multi-disciplinary teamwork and collaboration, professional identity, and roles and responsibilities. RIPLS and/or IEPS data is gathered and analyzed...changes in knowledge, skills, and attitudes via RIPLS or IEPS data could quantitatively identify the benefits of the CHDS model to building

  11. Homeland Security: Implications for Information Policy and Practice--First Appraisal.

    Science.gov (United States)

    Feinberg, Lotte E.

    2002-01-01

    Discusses information policy in the wake of the September 11 terrorist attacks. Topics include access to government records, including Freedom of Information Act issues; removing or expanding information on government Web sites; state actions; coordination versus secrecy in homeland security; and patterns and trends in federal and state…

  12. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... (OPS), including the National Operations Center (NOC), proposes to establish a new DHS system of... Fusion System of Records.'' This system of records will allow DHS/OPS, including the NOC, to collect... natural disasters. The NOC serves as the nation's homeland security center for information sharing...

  13. 75 FR 32723 - Revision of Department of Homeland Security Acquisition Regulation; Limitations on Subcontracting...

    Science.gov (United States)

    2010-06-09

    ... National Operations Center (NOC), through the National Response Coordination Center (NRCC), coordinates the... the National Operations Center (NOC). Requests include a summary of the situation, types and amount of..., the Secretary of Homeland Security issues an operations order to the NOC. The NOC, through the...

  14. Citizenship and Terrorism: The Significance of a Pathway to Citizenship on Homeland Security

    Science.gov (United States)

    2014-03-01

    question: How would providing a pathway to citizenship for the illegal immigrant population of the United States affect homeland security with respect to... illegal immigrant , and non- immigrating foreigner. An analysis of terrorism defined by the categories of citizenship status and estimated population...domestic terrorism. 14. SUBJECT TERMS Citizenship, terrorism, comprehensive immigration reform, illegal immigrant , pathway to citizenship

  15. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-05-13

    ....S. Coast Guard--008 Courts Martial Case Files System of Records AGENCY: Privacy Office, DHS. ACTION..., ``Department of Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from... Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records from one or...

  16. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ... Protection-003 Credit/Debit Care Data System of Records'' and this proposed rulemaking. In this proposed...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Care...

  17. The National Guard -- DOD’s Logical Homeland Security "First Responder" for the 21st Century

    Science.gov (United States)

    2005-01-01

    Virginia 22134-5068 FUTURE WAR PAPER TITLE: THE NATIONAL GUARD – DOD’S LOGICAL HOMELAND SECURITY “ FIRST RESPONDER ” FOR THE 21ST...INCLUDE THE FOREGOING STATEMENT. EXECUTIVE SUMMARY TITLE: THE NATIONAL GUARD – DOD’S LOGICAL HOMELAND SECURITY “ FIRST RESPONDER ” FOR THE 21ST

  18. Quantifying a Negative: How Homeland Security Adds Value

    Science.gov (United States)

    2015-12-01

    Many studies and publications examine fire spread of closely spaced buildings, including “On Radiant Heat Transfer from Turbulent Flames” by Cox.4...flame effects how much radiant heat is put out. This study was the foundation for modeling fire spread in urban and wildland environments. In 2002...Technical Note 1600) (Washington, DC: National Institute of Standards and Technology, 2006). 4 Gordon Cox, “On Radiant Heat Transfer from Turbulent

  19. The Role of the Corps of Engineers in Homeland Security

    Science.gov (United States)

    2007-11-02

    companies and pipe line companies could be required in a TF dealing with a coastal area or a large sea or river port. A revised model for the engineer...Hampshire, Vermont, Rhode Island, Connecticut, Mass) ELEMENT UNIT STATE COMPONENT Engineer RTF 240th EN GRP Maine Army NG HQ’s (CONST) Construction...Virginia, Virginia, Maryland, Delaware, and D.C.) ELEMENT UNIT STATE COMPONENT Engineer RTF 11 1th EN GRP WV Army NG HQ’s (COST) Construction BN 1092nd

  20. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  1. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... Security Administration--011, Transportation Security Intelligence Service Operations Files Systems of... Administration--011 Transportation Security Intelligence Service Operations Files previously published on... Security Intelligence Service (TSIS) Operations Files System of Records (69 FR 71828, December 10,...

  2. Image-Based Vehicle Identification Technology for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A

    2002-10-08

    The threat of terrorist attacks against US civilian populations is a very real, near-term problem that must be addressed, especially in response to possible use of Weapons of Mass Destruction. Several programs are now being funded by the US Government to put into place means by which the effects of a terrorist attack could be averted or limited through the use of sensors and monitoring technology. Specialized systems that detect certain threat materials, while effective within certain performance limits, cannot generally be used efficiently to track a mobile threat such as a vehicle over a large urban area. The key elements of an effective system are an image feature-based vehicle identification technique and a networked sensor system. We have briefly examined current uses of image and feature recognition techniques to the urban tracking problem and set forth the outlines of a proposal for application of LLNL technologies to this critical problem. The primary contributions of the proposed work lie in filling important needs not addressed by the current program: (1) The ability to create vehicle ''fingerprints,'' or feature information from images to allow automatic identification of vehicles. Currently, the analysis task is done entirely by humans. The goal is to aid the analyst by reducing the amount of data he/she must analyze and reduce errors caused by inattention or lack of training. This capability has broad application to problems associated with extraction of useful features from large data sets. (2) Improvements in the effectiveness of LLNL's WATS (Wide Area Tracking System) by providing it accurate threat vehicle location and velocity. Model predictability is likely to be enhanced by use of more information related to different data sets. We believe that the LLNL can accomplish the proposed tasks and enhance the effectiveness of the system now under development.

  3. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  4. Status Summary of 3He and Neutron Detection Alternatives for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Kouzes, Richard T.; Ely, James H.

    2010-04-28

    This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

  5. An Agent-Based Approach for Data Fusion in Homeland Security

    Directory of Open Access Journals (Sweden)

    Rafael de Solís Montes

    2013-09-01

    Full Text Available This article presents an agent-based solution for data fusion in Homeland Security. Communication technology has been developed very fast in the last decades. We can get lots of data in milliseconds. Our current problem is to process such amounts of data in order to provide useful information. We have to focus our effort on developing intelligent information systems able to handle big amounts of data extracting or revealing relations among data and able to produce information easily understandable for the human user. That is the case of data fusion in tactical operations, especially in the field of defense and Homeland security. Our research is focused on obtaining a Multi-agent system able to inference future enemy’s actions or behaviors from data received from heterogeneous sensors.

  6. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    Science.gov (United States)

    2009-03-01

    effectively. One of the primary functions of the GRT is to provide DHS with an electronic database to query in the event of a Congressional data call. In...we need an easy to ready catalog/ database of what resources (physical and non-physical) are available at the federal, state, regional, and local...Local Performance Regimes for Homeland Security.” Review of Policy Research 23, no. 1 (2006). Business Source Complete, EBSCOhost (accessed December 30

  7. Mission Command: Retooling the Leadership Paradigm for Homeland Security Crisis Response?

    Science.gov (United States)

    2015-03-01

    can be implemented by a homeland security organization. Fatal fires, such as 344 Francis Fukuyama , “America in Decay: The Sources of Political...Dysfunction,” Foreign Affairs (September–October 2014), accessed February 7, 2015, http://www.foreignaffairs.com/articles/141729/ francis - fukuyama /america...Bismark to Hitler, The Von Moltke Family’s Impact on German History. New York, Harper Collins, 1995. Fukuyama , Francis . “America in Decay: The

  8. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    Science.gov (United States)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  9. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    intergovernmental relations by using network theory means that the system should be based on linkages and interrelationships, rather than...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some... theory tells us that every relay doubles the noise and cuts the message in half. Also, change leadership requires the willingness and ability to change

  10. The DoD Role in Homeland Security: Past, Present, and Future

    Science.gov (United States)

    2013-03-01

    specifically chartered to address homeland security was the Council of National Defense ( CND ). The CND was established as an emergency agency by...responsibilities to state governments. On April 9, 1917, the CND chairman requested all Governors establish councils of defense.9 The armistice of 1918 prompted...councils to disband and CND operations were suspended on June 30, 1921.10 A parallel pattern emerged during World War II. Most wartime

  11. Of Nasa and Neanderthals, Elephants and Machines: Metaphors and the Conceptualization of Homeland Security

    Science.gov (United States)

    2013-12-01

    favor of the pursuit of knowledge. Charles Darwin , genius though he was, was not a sharp mathematician183 but had he been so, he would have realized...is crucial since, as Charles Darwin understood, selection as the instrument for evolution can only work if there are different characteristics from... Charles Darwin Can Teach Tom Ridge about Homeland Security,” Foreign Policy (September–October 2003): 69. 292. Johanson and Wong, Lucy’s Legacy, 248. 293

  12. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-08

    ... race, ethnicity, or religion, by employees and officials of the Department of Homeland Security. The.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it);...

  13. Enabling private and public sector organizations as agents of homeland security

    Science.gov (United States)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  14. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    Science.gov (United States)

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  15. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  16. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Madhavi Z [ORNL; Wullschleger, Stan D [ORNL; Vass, Arpad Alexander [ORNL; Martin, Rodger Carl [ORNL; Grissino-Mayer, Henri [ORNL

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  17. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ... Transportation Security Administration. Information in this system also includes records related to the... occurred during passenger or property screening would be covered by this system. Portions of this system... information system of records has been compromised. Another routine use permits the release of information to...

  18. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    outlines a holistic community preparedness approach to securing the nation. “The national preparedness system shall be designed to help guide the domestic...failed its first test.”40 As the horror of Hurricane Katrina was being witnessed globally, so too was the issue of leadership, specifically, who was in...have impacted multiple in-groups to include patriotic Bostonians, concerned Muslim-Americans, and those who felt the need to revisit the horror of 9

  19. DHS Workshop -- Homeland Security: New Challenges for Decision Making Under Uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, R; Edmunds, T; Howarth, S

    2004-02-20

    A workshop addressing the decision-making challenges confronted by the United States Department of Homeland Security (DHS) in the face of large uncertainties, complex value systems, and multiple stakeholders was held November 13-14, 2003, in Washington, D.C. Forty-six participants drawn from the DHS, other government agencies, universities, national laboratories, and the private sector attended the workshop. The goals were: (1) to develop a common understanding of the range of decisions DHS program elements must make; (2) to review selected examples of decision processes and approaches used by other organizations for similarly complex problems; and (3) to recommend steps DHS can take to ensure high quality decision making. The workshop brought together diverse perspectives on decision making in the context of complex risks. Participants included those who must make decisions affecting homeland security, those who have faced risky decisions in other domains, and those who have developed theoretical and practical approaches to high quality decision-making. The workshop was sponsored by the Science & Technology (S&T) Directorate, but was intended to address issues of concern to the three DHS operating directorates as well as S&T. The purpose of this breadth was to identify areas in which S&T capabilities and resources could be valuable to DHS as a whole. The workshop consisted of three main segments: (1) Presentations by managers from DHS Directorates, reflecting the diverse nature of decision making across DHS; (2) Presentations on four alternative approaches used to address problems in both government (counter-terrorism R&D investment; identification of critical capabilities in bioterrorism) and the private sector (corporate strategy development; terrorism insurance); and (3) Breakout groups chartered to identify barriers and propose actions to address them, in each of five decision classes: (1) Portfolio management; (2) Grant allocation; (3) Critical one

  20. 76 FR 24901 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-002...

    Science.gov (United States)

    2011-05-03

    ... Homeland Security's inventory of record system. DATES: Submit comments on or before on or before June 2... contain Department of Transportation-required Substance Abuse evaluations and USCG Sexual Abuse Prevention... software tools which ensure the protection of the confidential information by making reconstruction...

  1. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... us. DHS will disclose two separate data files through a computer matching operation for our use in... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security... an existing computer matching program that will expire on July 18, 2012. SUMMARY: In accordance...

  2. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... unintended changes this action makes in DHS policies and procedures for drug-free workplaces. All comments or.... Adopting the OMB guidance in place of the common rule will not substantively change the drug-free workplace... Implementation of OMB Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS...

  3. Introducing the Future Now: Using Memetics and Popular Culture to Identify the Post-9/11 Homeland Security Zeitgeist

    Science.gov (United States)

    2008-03-01

    becoming an increasingly “ hieroglyphic civilization.”37 This characterization is even more appropriate today. Ann Marie Seward Barry argues that we live...original official purpose to become a hieroglyphic with rich cultural meaning. No other meme related to homeland security has permeated our popular

  4. Changing Napoleonic Leadership In The Department Of Homeland Security: The Identification Of Toxic Leadership Behaviors And How To Facilitate Change To Those Behaviors

    Science.gov (United States)

    2016-02-06

    negative workforce behaviors, and how it correlates to practices within the US Department of Homeland Security (DHS) and US Customs and Border...aspects: sociability , self-control, well-being, and emotionality.”30 10 Table 1. Models of Emotional Intelligence31 As illustrated above, many of...program is designed to provide basic knowledge, practical skills, and tools needed to successfully manage supervisory responsibilities and challenges

  5. Leveraging Knowledge Management Tools to Support Security Risk Management in the Department of Homeland Security

    Science.gov (United States)

    2011-12-01

    Administration NEN NASA Engineering Network NISAC National Infrastructure Simulation and Analysis Center NPIA National Policing Improvement... cognitive dimension,” “…of mental models, beliefs, and perspectives so ingrained that we take them for granted, and therefore cannot easily...tacit knowledge and experience through mentoring and apprenticeship on decades long projects. Time and budget pressures, along with an expanded array

  6. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    Robotics: The Key to Immediate Assessment & Response to Hazardous Situations, Mr. Alan Bignall, CEO, ReconRobotics Using Modeling and Simulation for...Corporation 9:20 am Reconnaissance Robotics: The Key to Immediate Assessment & Response to Hazardous Situations • Mr. Alan Bignall, CEO...Department of Employment and Economic Development 3:25 pm Prevention of Terrorism & Industry’s Role • Mr. Sam Brinkley , Vice

  7. Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

    2009-06-17

    Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

  8. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    Science.gov (United States)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  9. System-on-chip-centric unattended embedded sensors in homeland security and defense applications

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin; Shih, Min-Yi; Walter, Kevin; Lee, Kang; Gans, Eric; Esterkin, Vladimir

    2009-05-01

    System-on-chip (SoC) single-die electronic integrated circuit (IC) integration has recently been attracting a great deal of attention, due to its high modularity, universality, and relatively low fabrication cost. The SoC also has low power consumption and it is naturally suited to being a base for integration of embedded sensors. Such sensors can run unattended, and can be either commercial off-the-shelf (COTS) electronic, COTS microelectromechanical systems (MEMS), or optical-COTS or produced in house (i.e., at Physical Optics Corporation, POC). In the version with the simplest electronic packaging, they can be integrated with low-power wireless RF that can communicate with a central processing unit (CPU) integrated in-house and installed on the specific platform of interest. Such a platform can be a human body (for e-clothing), unmanned aerial vehicle (UAV), unmanned ground vehicle (UGV), or many others. In this paper we discuss SoC-centric embedded unattended sensors in Homeland Security and military applications, including specific application scenarios (or CONOPS). In one specific example, we analyze an embedded polarization optical sensor produced in house, including generalized Lambertian light-emitting diode (LED) sources and secondary nonimaging optics (NIO).

  10. Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system

    Science.gov (United States)

    Antony, Richard T.; Karakowski, Joseph A.

    2010-04-01

    A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.

  11. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    Energy Technology Data Exchange (ETDEWEB)

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  12. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  13. An Examination of Four Successes in the Coast Guard’s Innovation Program and Implications for Innovation within Homeland Security

    Science.gov (United States)

    2008-03-01

    Elixir guitar strings, and approximately 1,000 other products .32 Prior to founding Gore and Associates, Bill Gore spent seventeen years working for...and local government agencies, and private entities supporting government homeland security operations. The product of this research is an analysis...literature conveys when it calls innovation: The creation, development and implementation of a new product , process or service, with the aim of

  14. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... organizations; domestic security and emergency management officials; and private sector entities or individuals... governments and international organizations; domestic security and emergency management officials; and private... international officials; domestic security and emergency management officials; and private sector...

  15. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... security threat assessment of law enforcement, immigration, and intelligence databases, including a... agency to perform a security threat assessment. The security threat assessment will be used to identify... ] security threat assessment to identify individuals who present a low risk to transportation security....

  16. Federal Register: The President. Amendment of Executive Orders, and Other Actions, in Connection with the Transfer of Certain Functions to the Secretary of Homeland Security. Part 4

    National Research Council Canada - National Science Library

    Bush, George

    2003-01-01

    Act of 2002 (Public Law 107 296) and section 301 of title 3, United States Code, and in order to reflect the transfer of certain functions to, and other responsibilities vested in, the Secretary of Homeland Security, the transfer...

  17. HOMELAND SECURITY: Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance Goals

    Science.gov (United States)

    2004-05-01

    Office GAO May 2004 HOMELAND SECURITY Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated...Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance Goals 5a. CONTRACT NUMBER 5b...2004 HOMELAND SECURITY Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance

  18. Development of neutron/gamma generators and a polymer semiconductor detector for homeland security applications

    Science.gov (United States)

    King, Michael Joseph

    Instrumentation development is essential to the advancement and success of homeland security systems. Active interrogation techniques that scan luggage and cargo containers for shielded special nuclear materials or explosives hold great potential in halting further terrorist attacks. The development of more economical, compact and efficient source and radiation detection devices will facilitate scanning of all containers and luggage while maintaining high-throughput and low-false alarms Innovative ion sources were developed for two novel, specialized neutron generating devices and initial generator tests were performed. In addition, a low-energy acceleration gamma generator was developed and its performance characterized. Finally, an organic semiconductor was investigated for direct fast neutron detection. A main part of the thesis work was the development of ion sources, crucial components of the neutron/gamma generator development. The use of an externally-driven radio-frequency antenna allows the ion source to generate high beam currents with high, mono-atomic species fractions while maintaining low operating pressures, advantageous parameters for neutron generators. A dual "S" shaped induction antenna was developed to satisfy the high current and large extraction area requirements of the high-intensity neutron generator. The dual antenna arrangement generated a suitable current density of 28 mA/cm2 at practical RF power levels. The stringent requirements of the Pulsed Fast Neutron Transmission Spectroscopy neutron generator necessitated the development of a specialized ten window ion source of toroidal shape with a narrow neutron production target at its center. An innovative ten antenna arrangement with parallel capacitors was developed for driving the multi-antenna arrangement and uniform coupling of RF power to all ten antennas was achieved. To address the desire for low-impact, low-radiation dose active interrogation systems, research was performed on mono

  19. Groupthink: A Significant Threat to the Homeland Security of the United States

    Science.gov (United States)

    2014-12-01

    news/blogs/ ken - walshs-washington/2012/10/31/a-tale-of-two-storms-comparing-bush-and-obamas-hurricane-response. 142 Morton, Next–Generation Homeland... Wilber , “Dress Code Relaxed for Air Marshals,” Washington Post, August 25, 2006, http://www.washingtonpost.com/wp-dyn/content/article/2006/08/24...Koresh had told him that he knew the raid was imminent.235 According to BATF Special Agent Ken King, no alternative plan for peacefully serving the

  20. 77 FR 12606 - Homeland Security Academic Advisory Council; Establishment and Meeting

    Science.gov (United States)

    2012-03-01

    ... recruitment; international students; ] academic research; campus and community resiliency, security and... time of appointment by Department ethics officials. Individuals appointed for their expertise would be... committee has completed its business. ADDRESSES: The meeting will be held at the Ronald Reagan...

  1. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ..., Security and Authentication, and Network Evolution working groups. A more detailed agenda will be released... Commission will also provide audio and/or video coverage of the meeting over the Internet from the FCC's...

  2. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  3. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... public comment period may end before the time indicated, following the last call for comments. To... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge.... The agenda on December 5 focuses solely on the interaction between DHS S&T and Customs and...

  4. 76 FR 63206 - Supplemental Standards of Ethical Conduct for Employees of the Department of Homeland Security

    Science.gov (United States)

    2011-10-12

    ... (DAEO) to manage and coordinate the ethics programs within the Department's components and offices. B... by the DHS DAEO to manage and coordinate the ethics programs within the DHS components pursuant to... (FEMA); (2) Federal Law Enforcement Training Center; (3) Transportation Security Administration;...

  5. Homeland Security Department: FY2011 President’s Request for Appropriations

    Science.gov (United States)

    2010-04-15

    program, the National Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.87 Dr. Alexander G. Garza... Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.88 Issues for Congress BioWatch: Effectiveness and Deployment...20 23 Systems Acquisition 20 61 Radiation Portal Monitoring Program - 8 Securing the Cities 20 - Human Portable Radiation Detection

  6. 2010 Homeland Security Symposium and Exhibition Held in Arlington, Virginia on September 28-29, 2010

    Science.gov (United States)

    2010-09-29

    Animal Disease A dynamic disaster environment Got Security? More Public/Private Up-Front Interaction “Recommendation: That the President direct the...movement of materials We provide hope and help around the world. Earthquake in China © Matthew Marek , Red Cross © Matthew Marek , Red Cross © Matthew... Marek , Red Cross Phases of a Disaster • Rescue • Response • Recovery • Rebuilding Phases of a Disaster • Rescue • Response • Recovery • Rebuilding The

  7. Rethinking Merida’s Priorities: The Time is Now to Invest in Homeland Security

    Science.gov (United States)

    2011-10-28

    Development Assistance (DA) to support domestic poverty reduction and maximize economic benefit from NAFTA . Congress, for example, increased FY 2011 DA to...border with Canada , the Great Lakes region, or American cities like New York or Los Angeles, where drugs enter the United States. Sufficiently...investment and, more importantly, is in the collective security interests of North America. Mexican drug cartels profit off criminal trade in both Canada

  8. Measuring Boston’s Security Investment: Methods and Tools to Assess Homeland Security Initiatives. Policy Analysis Exercise

    Science.gov (United States)

    2009-03-31

    recommendations for MOEP as they move forward in developing a performance management system: (1) Implement a Balanced Scorecard approach; (2) Focus on...performance management systems, particularly those measuring preparedness and security -- we determined that the Balanced Scorecard is the most practical, applicable, and sustainable solution for MOEP.

  9. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    security procedures, encouraging their followers to attack the global transportation system.15 The consequences of these attacks are not just the visual ...partnerships for DHS.31 Though this argument is sound , the author only reviews a few programs, and does not acknowledge the broader DHS capability nor its...Capacity Development,”2. 89 Neil A. Englehart, “State Capacity, State Failure, and Human Rights,” Journal of Peace Research 46, no. 2 (2009): 163

  10. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, James [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Shedlock, Daniel [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Langeveld, Willem G.J. [Rapiscan Laboratories, Inc., Sunnyvale, CA 94085 (United States); Bharadwaj, Vinod [SLAC National Accelerator Lab., Menlo Park, CA (United States); Nosochkov, Yuri [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  11. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  12. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  13. XGraphticsCLUS: Web Mining Hyperlinks and Content of Terrorism websites for Homeland Security

    Directory of Open Access Journals (Sweden)

    Dr.S.K.Jayanthi

    2011-05-01

    Full Text Available World Wide Web has become one of the best and fast communication media and information could be distributed within few seconds to the world day by day. The evolution of social networking media increases it further more to transfer information in a rapid speed to common people. Terrorism organizations utilize these facets of the web in very efficient manner for their destructive plans. Understanding web data is a decisive task to assure the better perceptive of a website. This paper focuses on the content and link structure mining of the website which was suspicious through XGraphticsCLUS. This is done through viewing the web as graph and retrieving the various content of the website. This could help in terms of better understanding the motto and various other web connections in the suspicion. The navigational links offered in the particular website could leave with some informative evidence. This paper puts a step towards the national security and provides the user a good perception.

  14. The Buck Stops Where Aligning Authority to Strategy in Homeland Security

    Science.gov (United States)

    2015-12-01

    Organizations,” Revista Portuguesa de Saúde Pública 31, no. 2 (2013): 129–144, DOI: 10.1016/j.rpsp.2012.12.006. 171 Glen Woodbury, “Measuring...of Quinn and the Miles & Snow Strategic Models: Case Studies in Health Organizations.” Revista Portuguesa de Saúde Pública 31, no. 2 (2013): 129

  15. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  16. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  17. Model-Based Security Testing

    CERN Document Server

    Schieferdecker, Ina; Schneider, Martin; 10.4204/EPTCS.80.1

    2012-01-01

    Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST) is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing,...

  18. Using DOD ISR Capabilities in Support of Homeland Security and Defense; Policy Challenges and Considerations for Effective Incident Awareness and Assessment

    Science.gov (United States)

    2011-03-01

    CONOPS) that gives a brief overview of active duty and National Guard capabilities and processes for responding to homeland security contingencies...fire and the worst oil pollution disaster in history (James, 2010). More than 205 million gallons of raw crude oil are estimated to have gushed into...pertain to the employment of DoD airborne assets for DSCA missions. The DSCA Air Support Handbook provides an overview of the full spectrum of DoD

  19. A model of security monitoring

    Science.gov (United States)

    Bishop, Matt

    1990-01-01

    A model of security monitoring is presented that distinguishes between two types of logging and auditing. Implications for the design and use of security monitoring mechanisms are drawn from this model. The usefulness of the model is then demonstrated by analyzing several different monitoring mechanisms.

  20. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  1. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  2. Homeland Security Interagency Support. (Joint Center for Lessons Learned Quarterly Bulletin. Volume 4, Issue 2, March 2002)

    Science.gov (United States)

    2002-03-01

    U.S. Capitol, the White House, and nuclear power facilities. In the United States and Europe, Disney amusement parks are likely targets. In Britain, the...appropriate when such attacks will involve small bands of individuals engaged in criminal acts within our homeland instead of stereotyped conventional

  3. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  4. An update on the OpenOrbiter I Mission and its paradigm's benefits for the defense, homeland security and intelligence communities

    Science.gov (United States)

    Straub, Jeremy

    2017-05-01

    The OpenOrbiter I spacecraft is the culmination of significant work on reducing the cost levels of a CubeSat-class spacecraft. By redesigning the spacecraft from the ground up, down to the component level, to use readily available electronic and physical components, the cost of CubeSat construction has been significantly reduced. This paper provides an overview of the OpenOrbiter I mission, to date. It then focuses on the benefits that can be provided by the lower-cost, low-risk spacecraft. The paper discusses the prospective utility of this mission paradigm for the defense, homeland security and intelligence communities.

  5. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  6. Campus network security model study

    Science.gov (United States)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  7. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  8. 76 FR 69749 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-029 Notice of...

    Science.gov (United States)

    2011-11-09

    .... eNOAD information includes complete name, date and place of birth, gender, country of citizenship... security, maritime law enforcement, marine environmental protection, and other related purposes....

  9. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  10. Process Models for Security Architectures

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available This paper presents a model for an integrated security system, which can be implemented in any organization. It is based on security-specific standards and taxonomies as ISO 7498-2 and Common Criteria. The functionalities are derived from the classes proposed in the Common Criteria document. In the paper we present the process model for each functionality and also we focus on the specific components.

  11. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... Security Administration, TSA-1, FOIA Division, 400 Seventh Street, SW., Washington, DC 20590 3. United... 6 Domestic Security 1 2010-01-01 2010-01-01 false FOIA/Privacy Act Offices of the Department of... follows: A. Former components of the Department of Agriculture: 1. Animal and Plant Health...

  12. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    .../FBI-019 Terrorist Screening Records System of Records (August 22, 2007, 72 FR 47073) Exemptions... System of Records (August 22, 2007, 72 FR 47073) in order to automate and simplify the current method for... (May 19, 2010, 75 FR 28046); (2) TSA, Secure Flight Program: DHS/TSA-019 Secure Flight Records...

  13. 77 FR 47415 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2012-08-08

    ... added two new sources of records: (1) Customer Profile Management System (CPMS) for biometric... Country of Issuance (COI) Visa number Social Security Number (in very limited circumstances using the Form...) Country of birth Class of admission code File control office code Social Security Number I-94 number...

  14. 76 FR 58525 - Privacy Act of 1974; Department of Homeland Security, U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-21

    ..., Form G-845, if appropriate. Although SAVE may receive a Social Security Number (SSN) from its... Exchange Visitor Identification System (SEVIS) ID, foreign passport number, visa number, social security...), Customer Profile Management System (CPMS), Student and Exchange Visitor Identification System (SEVIS...

  15. Motorola Secure Software Development Model

    Directory of Open Access Journals (Sweden)

    Francis Mahendran

    2008-08-01

    Full Text Available In today's world, the key to meeting the demand for improved security is to implement repeatable processes that reliably deliver measurably improved security. While many organizations have announced efforts to institutionalize a secure software development process, there is little or no industry acceptance for a common process improvement framework for secure software development. Motorola has taken the initiative to develop such a framework, and plans to share this with the Software Engineering Institute for possible inclusion into its Capability Maturity Model Integration (CMMI®. This paper will go into the details of how Motorola is addressing this issue. The model that is being developed is designed as an extension of the existing CMMI structure. The assumption is that the audience will have a basic understanding of the SEI CMM® / CMMI® process framework. The paper will not describe implementation details of a security process model or improvement framework, but will address WHAT security practices are required for a company with many organizations operating at different maturity levels. It is left to the implementing organization to answer the HOW, WHEN, WHO and WHERE aspects. The paper will discuss how the model is being implemented in the Motorola Software Group.

  16. 78 FR 20680 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-04-05

    ...; Divorce Certificates; Explanatory Statements; Unsolicited information submitted voluntarily in support of...); Employment Information; Financial Information; Position and Relationship to an Organization; Family... security awareness training to all information system users (including managers, senior executives,...

  17. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    ... will have rights to run ad hoc reports and query data as it relates to quality assurance tracking and... or fraud, or harm to the security or integrity of this system or other systems or programs (whether...

  18. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ... Presidential Directive--12 program, directing the use of a common identification credential for both logical... a National Special Security Event; and record source categories has been updated to include records...Gate System; (4) Automated Continuing Evaluation System (ACES) Pilot; (5) Personal Identity...

  19. 76 FR 60070 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel..., address, organization, e-mail, phone number, relation, paid/unpaid). Signature (electronic or scanned..., debts, encumbrances, etc.). Social Security Number (SSN), if applicable. Supporting documentation...

  20. 76 FR 60063 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... Immigration Services-014 Electronic Immigration System- 1 Temporary Accounts and Draft Benefit Requests System....S. Citizenship and Immigration Services-014 Electronic Immigration System-1 Temporary Accounts and... Security/U.S. Citizenship and Immigration Services to collect and maintain records on an individual as...

  1. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-03-13

    ... provided in the SCSP is a narrative description of the procedures the applicant business uses to adhere to each C-TPAT Security Criteria or Guideline articulated for their particular business type (importer... the subject of the inquiry could also permit the subject to avoid detection or apprehension....

  2. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    and a related abstract titled “Distributed preparedness: the spatial logic of domestic security in the United States” (Collier & Lakoff , 2008...hurricanes, earthquakes, and floods. The result of this evolution created a new field of expertise called “emergency management” (Collier & Lakoff , 2008...Collier and Lakoff examined two dimensions of distributed preparedness— emergency federalism and vulnerability mapping—to assess their

  3. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ...; violations of the confidentiality provisions of the Violence Against Women Act; conditions of detention... Transportation Security Administration (TSA) records and functions; and to the news media in the interest of the..., or other benefit. P. To the news media and the public, with the approval of the Chief Privacy...

  4. 78 FR 57402 - Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection-019 Air...

    Science.gov (United States)

    2013-09-18

    .... 1101, et seq., including 8 U.S.C. 1103, 1225, and 1324; the Illegal Immigration Reform and Immigrant..., AMOSS has users from various DHS components including the U.S. Immigration and Customs Enforcement (ICE... to know the information to carry out national security, law enforcement, immigration,...

  5. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... and the intelligence landscape. However, the use of ATS is governed by a number of policy and... rules in ] ATS, which are based on current intelligence or past case experience. Travelers may also be... Identity Theft: A Strategic Plan'' at http://www.identitytheft.gov ) to address security breaches...

  6. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... resources; Date and time of access; Logs of activity of DHS IT resources; IP address of access; Logs of... to the Department that is derived from other sources to facilitate authorized access to DHS... General Information Technology Access Account Records system of records security protocols will...

  7. Rules And A Rubric Could Be Used To Assess The Openness Of A Homeland Security Enterprise Social Network

    Science.gov (United States)

    2016-12-01

    Cybersecurity and Communication Integration Center NPOV neutral point of view I&A intelligence and analysis PCLOB Privacy and Civil Liberties...establish a culture of “need to share” securely while respecting civil rights and privacy. In February 2011, the DHS Office of Intelligence and Analysis ...I&A) issued its strategic plan designed to last through 2018. The plan consisted of four goals, to apply intelligence analysis to understand threats

  8. Suicide Terrorism in America?: The Complex Social Conditions of This Phenomenon and the Implications for Homeland Security

    Science.gov (United States)

    2014-11-05

    AND ABBREVIATIONS CPOST Chicago Project on Security and Terrorism LTTE Liberation Tigers of Tamil Eelam PKK Kurdistan Workers’ Party SIT Social...Kurdistan Workers’ Party ( PKK -Partiy Karkeren Kurdistan) in order to understand whether there is a universal or location-dependent explanation for...where the PKK was “ideologically remote from large segments of the public it sought to represent” and is seen as having failed. The examination of

  9. Effective Selection: A Study of First-Line Supervisor Selection Processes in the Department of Homeland Security

    Science.gov (United States)

    2011-03-01

    survive in a free market economy. Unlike the private sector, the federal government is not concerned about profits and loss and worries less about...all DHS agencies as a strategy to cut down costs associated with implementing best practices for first-line supervisor selection. Additionally, by...U.S. Coast Guard (CG) HSAD U.S. Secret Service (SS) HSBB Immigration and Customs Enforcement (ICE) HSBC Transportation Security Administration (TSA

  10. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  11. Analysis Models for Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Corin, Ricardo Javier

    2006-01-01

    In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model. Each extension considers a more realistic setting, closer to the real world, thus providing a stronger security guarantee. We provide examples both from the literature and from industrial case studies to show

  12. Homeland calling

    DEFF Research Database (Denmark)

    Juul, Kristine

    2007-01-01

    A great deal of those immigrants that settled in Denmark in the 1970s and 1980s have maintained strong bonds to their communities of origin. These bonds play an important role in shaping the identities and in maintaining relationships between migrants in the receiving communities. But while...... on the institutions and practices that act to transmit relations between country of origin and the new homeland. Focus is particularly on the efforts that the Yugoslav and Serbian states have made to maintain migrants political and economic loyalty and on the effects that this has had on migrants perceptions on key...

  13. Los Alamos Center for Computer Security formal computer security model

    Energy Technology Data Exchange (ETDEWEB)

    Dreicer, J.S.; Hunteman, W.J.; Markin, J.T.

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The need to test and verify DOE computer security policy implementation first motivated this effort. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present formal mathematical models for computer security. The fundamental objective of computer security is to prevent the unauthorized and unaccountable access to a system. The inherent vulnerabilities of computer systems result in various threats from unauthorized access. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The model is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell and LaPadula abstract sets of objects and subjects. 6 refs.

  14. A Process Model for Deployment Planning of Ground-based Air Defense System Against Asymmetric Homeland Threat

    Science.gov (United States)

    2009-01-01

    A Process Model for Deployment Planning of Ground-based Air Defense System Against Asymmetric Homeland Threat Ronald L. Cypert Scientific...units, along with coordination at the state and federal agency level, a dynamic process modeling capability was chosen to chart the myriad...COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE A Process Model for Deployment Planning of Ground-based Air Defense System Against

  15. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  16. Security Theorems via Model Theory

    Directory of Open Access Journals (Sweden)

    Joshua Guttman

    2009-11-01

    Full Text Available A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi. Models (interpretations for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. *Realized* skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1 If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2 A protocol enforces for all xs . (phi implies for some ys . psi iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007 to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds.

  17. Design Validation of a {sup 10}B{sub 4}C Coated RSP with Multi-layered structure for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Su Hyun; Kim, Jong Yul; Lee, Joo Hyun; Moon, Mung Kook [KAERI, Daejeon (Korea, Republic of); Lim, Chang Hwy [Korea Research Institute of Ships and Ocean Engineering, Daejeon (Korea, Republic of); Lim, Ki Seo [Myongji University, Yongin (Korea, Republic of)

    2016-05-15

    It is a national priority to prevent radiological threats including radiological terrorism and smuggling nuclear material and devices. For this purpose, many governments and relevant organizations have been exploiting radiation detection technology. Especially, radiation portal monitor (RPM) is a widely used type of radiation detectors when it comes to homeland security and commonly deployed at strategic sites like airports and ports. In the most cases, they could be divided into two types of primary screening and secondary screening. In the latter case, hand-held detectors are mainly used for a closer inspection. On the other hand, RPMs for the primary screening, our concern, are stationary mounted type and comprise gamma-ray detector and neutron detector in many cases. The expected performance of the design of a RSP(Radiation Sensor Panel) has been demonstrated. According to the results of the simulation, three RSPs should be needed to meet the criterion mentioned in subsection 2.1. The design still can be validated when taking into account that the geometrical acceptance will be increased since it has been planned that the RPM is going to installed with four RSPs.

  18. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  19. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  20. Security Communication Model of Wireless Trade System

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wen-kai; ZHANG Si-yu

    2005-01-01

    This paper proposes a C/S system model for K Java and PDA named Net-Wireless. It is a discussion and proposal on information security and solutions for K-Java handsets and PDAs in wireless network. It also explains the scheme which between client security module and server security module. Also, We have developed a Security Server and a K-Java encryption module for e-commerce system and other trade systems.

  1. Security Management Model in Cloud Computing Environment

    OpenAIRE

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  2. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  3. The U.S. Coast Guard’s Ports, Waterways and Coastal Security Strategy Deployment Plan: An Operational Design for Maritime Homeland Security

    Science.gov (United States)

    2006-05-31

    operational plan. Then, through the lens of Milan Vego’s Operational Design Schematic model found in Operational Warfare, vi it will show that the PWCS, while...the territorial waters of the U.S. In keeping with Milan Vego’s advice to “. . . operate along relatively short, multiple, and interior lines...smartly accomplishes Vego’s edict , “Favorable lines of operations and communications facilitate protection of one’s own forces’ operational center of

  4. The One Laptop per Child Security Model

    OpenAIRE

    Kristic, Ivan; Garfinkel, Simson L.

    2007-01-01

    Symposium on Usable Security and Privacy, Pittsburgh, PA, July 2007. ACM Press. Refereed Conference Paper We present an integrated security model for a low-cost laptop that will be widely deployed throughout the developing world. Implemented on top of Linux operating system, the model is designed to restrict the laptop's software without restricting the laptop's user.

  5. Whistleblowing in a Wikileaks World: A Model for Responsible Disclosure in Homeland Security

    Science.gov (United States)

    2012-03-01

    Historically, significant support for whistleblowers has occurred within Congress and the public. Popular culture has seen the success of films , such as...SOPA, Reddit users aim to build a new, censorship -free internet. Retrieved from Forbes website: http://www.forbes.com/sites/andygreenberg/2011/11...23/wary-of-sopa-reddit- users-aim-to-build-a-new- censorship -free-internet/ Greenwald, G. (2010, April 16). What the whistleblower prosecution says

  6. Employing the Intelligence Cycle Process Model Within the Homeland Security Enterprise

    Science.gov (United States)

    2013-12-01

    http:// ipv6 .dhs.gov/journal/leadership/labels/Intelligence%20and%20Analysis%20Directorate.html. 73 The DHS also supports formal degree granting...institutions, there are far more intelligence focused training opportunities presented to state and local officials through on-site mobile training events...Institute of Intergovernmental Research delivers on-site mobile training opportunities to the National Network, as well as the state and local members of

  7. The Integration of Network-Based Models for Spill Response and Homeland Security

    Directory of Open Access Journals (Sweden)

    David E. Amstutz

    2008-01-01

    Full Text Available The integration of three hydraulic GIS (Geographic Information System applications is presented which represent the water infrastructures of cities and urban areas and US streams and rivers. The water infrastructures include drinking water distribution systems, wastewater collection systems and source water. The National Research Council[1] states that problems dealing with the collective behavior of networks such as river systems, water distribution systems and waste water collection systems are complex because they include feedback loops, produce counter-intuitive behaviors and exhibit behaviors that cannot be predicted from the attributes of individual components. A complex system includes all of the above individual components, yet also exhibits emergent collective behavior caused by the interactions among its features. The integration of these applications have been developed for use in planning, response, training and development of monitoring strategies to address potential deliberate or accidental toxic contamination events.

  8. The Joint Task Force Structure as a Model for Homeland Security

    Science.gov (United States)

    2013-05-20

    MNCC, however it has popular support. 67 A fourth organization on the Akwesasne Territory claims to speak for the residents, the Warrior Society ...times. The Warrior Society will at times arrive at the site of law enforcement actions in an attempt to intimidate or incite the officers. 69 With...please see Annex A. The U.S. portion of the territory is the Saint Regis Mohawk Reservation while the Canadian portion is the Akwesasne Mohawk

  9. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  10. 76 FR 67751 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND... Border Protection, DHS/CBP-009--Electronic System for Travel Authorization (ESTA) System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance...

  11. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  12. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  13. A reference model for database security proxy

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST's firewall reference model by adding a transmission unit modification function and an attribute value mapping function, describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.

  14. A reference model for database security proxy

    Institute of Scientific and Technical Information of China (English)

    蔡亮; 杨小虎; 董金祥

    2002-01-01

    How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.

  15. New Models for Protocol Security

    Science.gov (United States)

    2015-06-18

    protocols and primitives (e.g., Schnorrs identification scheme, commitment schemes secure against selective openings, Chaum Blind Signatures , etc...Theory 156: 246-268 (2015) 5 3. Samantha Leung, Edward Lui, Rafael Pass: Voting with Coarse Beliefs. ITCS 2015: 61 4. Jing Chen, Silvio Micali, Rafael...Schneider: Multi-Verifier Signatures . J. Cryptology 25(2): 310-348 (2012) 7 37. Rafael Pass, Muthuramakrishnan Venkitasubramaniam: A Parallel Repetition

  16. Intelligent Model for Video Survillance Security System

    Directory of Open Access Journals (Sweden)

    J. Vidhya

    2013-12-01

    Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.

  17. Keystone Business Models for Network Security Processors

    Directory of Open Access Journals (Sweden)

    Arthur Low

    2013-07-01

    Full Text Available Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing” models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies.

  18. A Formal Model for the Security of Proxy Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    GU Chun-xiang; ZHU Yue-fei; ZHANG Ya-juan

    2005-01-01

    This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean for a proxy signature scheme to be secure. Then, we present an example of proxy signature scheme that can be proven secure in the standard model.

  19. Research on Assessment Model of Information System Security Based on Various Security Factors

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM.

  20. Adaptive Modeling for Security Infrastructure Fault Response

    Institute of Scientific and Technical Information of China (English)

    CUI Zhong-jie; YAO Shu-ping; HU Chang-zhen

    2008-01-01

    Based on the analysis of inherent limitations in existing security response decision-making systems, a dynamic adaptive model of fault response is presented. Several security fault levels were founded, which comprise the basic level, equipment level and mechanism level. Fault damage cost is calculated using the analytic hierarchy process. Meanwhile, the model evaluates the impact of different responses upon fault repair and normal operation. Response operation cost and response negative cost are introduced through quantitative calculation. This model adopts a comprehensive response decision of security fault in three principles-the maximum and minimum principle, timeliness principle, acquiescence principle, which assure optimal response countermeasure is selected for different situations. Experimental results show that the proposed model has good self-adaptation ability, timeliness and cost-sensitiveness.

  1. Security Modeling on the Supply Chain Networks

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will try to collect the related information about other suppliers so he/she can offer the best bid to the purchaser. Therefore, confidentiality becomes an important consideration for the design of a supply chain network. Chen et al. have proposed the application of the Bell-LaPadula model in the design of a secured supply chain network. In the Bell-LaPadula model, a subject can be in one of different security clearances and an object can be in one of various security classifications. All the possible combinations of (Security Clearance, Classification pair in the Bell-LaPadula model can be thought as different states in the Markov Chain model. This paper extends the work done by Chen et al., provides more details on the Markov Chain model and illustrates how to use it to monitor the security state transition in the supply chain network.

  2. Modeling behavioral considerations related to information security.

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F. (Decision and Information Sciences); (SNL); (Univ. at Albany)

    2011-01-01

    The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral study of upcoming threats.

  3. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  4. Cyberspace Forensics Readiness and Security Awareness Model

    Directory of Open Access Journals (Sweden)

    Aadil Al-Mahrouqi

    2015-06-01

    Full Text Available The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs. However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1 Forensics Readiness, 2 Active Forensics, and 3 Forensics Awareness.

  5. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  6. A Model of Social Security?

    DEFF Research Database (Denmark)

    Rom-Jensen, Byron Zachary

    2017-01-01

    This essay provides historical perspective to Senator Bernie Sanders’ appropriation of elements of the Nordic model in the 2016 campaign by studying how Scandinavia was used as a political image in 1930s United States. Departing from previous scholarship, this essay argues that accounts of Scandi...... and its 1939 amendments. The surprising plasticity of the Scandinavian image amongst policymakers ultimately reveals the fluid nature of both New Deal-era politics and the Scandinavian images it appropriated....

  7. E-Learning Security Models

    Directory of Open Access Journals (Sweden)

    Vladimir I. Zuev

    2012-06-01

    Full Text Available The article looks into methods and models that are useful when analyzing the risks and vulnerabilities of complex e-learning systems in an emergency management context. Definitions of vulnerability and emergency response capabilities, such as "VLE/PLE attack surface", are suggested.The article provides insight into some of the issues related to analysis of risks and vulnerabilities of e-learning systems, but more research is needed to address this difficult and comprehensive task.

  8. Homeland Security and Homeland Defense: The Seam of Uncertainty Unstitched?

    Science.gov (United States)

    2012-03-22

    problem still exists with the over-classification of intelligence. The Interagency lacks an overarching policy on Sensitive but Unclassified ( SBU ...documents, which doubled since 2001, and procedures that deal with the designation of these documents.61 The SBU documents are of “particular importance... SBU designations and applied them on information that did not warrant classification.63 This misuse of classification denies state and local fusion

  9. A improved Network Security Situation Awareness Model

    Directory of Open Access Journals (Sweden)

    Li Fangwei

    2015-08-01

    Full Text Available In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network security situation is the result of fusion three aspects evaluation. In terms of attack, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed. In terms of vulnerability, a improved Common Vulnerability Scoring System (CVSS was raised and maked the assessment more comprehensive. In terms of node weights, the method of calculating the combined weights and optimizing the result by Sequence Quadratic Program (SQP algorithm which reduced the uncertainty of fusion was raised. To verify the validity and necessity of the method, a testing platform was built and used to test through evaluating 2000 DAPRA data sets. Experiments show that the method can improve the accuracy of evaluation results.

  10. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    Science.gov (United States)

    2008-12-01

    file), November 5, 1987, ProQuest Historical Newspapers (1851 - 2004), A1. 22 Roberto Suro , Special to The New York Times, “False Migrant Claims...and Border Security: The 9/11 Commission Staff Report on Terrorist Travel. March 14, 2005. Suro . Roberto. Special to The New York Times. “False

  11. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    .... Social Security Numbers (as volunteered by sole proprietors as their tax identification number); Internal... of lading; audits--internal & external; proof of background checks; contractual obligations; via a... 44 U.S.C. 2904 and 2906. D. To an agency or organization for the purpose of performing audit...

  12. A Policy Model for Secure Information Flow

    Science.gov (United States)

    Adetoye, Adedayo O.; Badii, Atta

    When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows various representations of information to be used in the enforcement of secure information flow in deterministic or nondeterministic systems. A flexible semantics-based analysis technique is presented, which uses the input-output relational model induced by an attacker’s observational power, to compute the information released by the computational system. An illustrative attacker model demonstrates the use of the technique to develop a termination-sensitive analysis. The technique allows the development of various information flow analyses, parametrised by the attacker’s observational power, which can be used to enforce what declassification policies.

  13. A Multilevel Secure Relation-Hierarchical Data Model for a Secure DBMS

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A multilevel secure relation-hierarchical data model formultilevel secure database is extended from the relation-hierarchical data model in single level environment in this paper. Based on the model, an upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system based on the multilevel secure relation-hierarchical data model is capable of integratively storing and manipulating complicated objects (e.g., multilevel spatial data) and conventional data (e.g., integer, real number and character string) in multilevel secure database.

  14. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    The increasing usage of computer-based systems in almost every aspects of our daily life makes more and more dangerous the threat posed by potential attackers, and more and more rewarding a successful attack. Moreover, the complexity of these systems is also increasing, including physical devices......, software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...

  15. Homeland security planning: what victory gardens and Fidel Castro can teach us in preparing for food crises in the United States.

    Science.gov (United States)

    Endres, A Bryan; Endres, Jody M

    2009-01-01

    Two historical examples provide important insight into how federal government policies can integrate regional and local food systems to achieve food security during a time of acute crisis. During World War II, American home gardeners, through the federal government's Victory Garden program, supplied 40 percent of the nation's fresh produce, while simultaneously maintaining pre-war commodity production policies favoring large agricultural interests. The recent food crisis in Cuba, precipitated by the collapse of Soviet-bloc trade in the early 1990s, is another historical example that could inform U.S. policymakers on how to achieve food self-sufficiency through reemphasis on small farmers using sustainable practices supplemented with urban gardening. This article aims to ignite government action to strengthen and integrate regional and local food systems into federal food security planning so that citizens can be best prepared for a food emergency. The article first examines laws, regulations and policies put in place during World War II that employed regional and local food networks to satisfy a significant amount of civilian food supply needs. The article also looks at more recent Cuban efforts to achieve forced food self-reliance when, after the end of the Cold War, Soviet subsidies and preferential trading of energy and food supplies ceased almost overnight.

  16. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    Cleeff, van A.

    2008-01-01

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  17. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  18. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    2008-01-01

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  19. CRISP. Information Security Models and Their Economics

    Energy Technology Data Exchange (ETDEWEB)

    Gustavsson, R.; Mellstrand, P.; Tornqvist, B. [Blekinge Institute of Technology BTH, Karlskrona (Sweden)

    2005-03-15

    The deliverable D1.6 includes background material and specifications of a CRISP Framework on protection of information assets related to power net management and management of business operations related to energy services. During the project it was discovered by the CRISP consortium that the original description of WP 1.6 was not adequate for the project as such. The main insight was that the original emphasis on cost-benefit analysis of security protection measures was to early to address in the project. This issue is of course crucial in itself but requires new models of consequence analysis that still remains to be developed, especially for the new business models we are investigated in the CRISP project. The updated and approved version of the WP1.6 description, together with the also updated WP2.4 focus on Dependable ICT support of Power Grid Operations constitutes an integrated approach towards dependable and secure future utilities and their business processes. This document (D1.6) is a background to deliverable D2.4. Together they provide a dependability and security framework to the three CRISP experiments in WP3.

  20. A secure operational model for mobile payments.

    Science.gov (United States)

    Chang, Tao-Ku

    2014-01-01

    Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  1. A Secure Operational Model for Mobile Payments

    Directory of Open Access Journals (Sweden)

    Tao-Ku Chang

    2014-01-01

    Full Text Available Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers’ security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  2. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  3. Secure State UML: Modeling and Testing Security Concerns of Software Systems Using UML State Machines

    Directory of Open Access Journals (Sweden)

    S. Batool

    2014-05-01

    Full Text Available In this research we present a technique by using which, extended UML models can be converted to standard UML models so that existing MBT techniques can be applied directly on these models. Existing Model Based Testing (MBT Techniques cannot be directly applied to extended UML models due to the difference of modeling notation and new model elements. Verification of these models is also very important. Realizing and testing non functional requirements such as efficiency, portability and security, at model level strengthens the ability of model to turn down risk, cost and probability of system failure in cost effective way. Access control is most widely used technique for implementing security in software systems. Existing approaches for security modeling focus on representation of access control policies such as authentication, role based access control by introducing security oriented model elements through extension in Unified Modelling Language (UML. But doing so hinders the potential and application of MBT techniques to verify these models and test access control policies. In this research we introduce a technique secure State UML to formally design security models with secure UML and then transform it to UML state machine diagrams so that it can be tested, verified by existing MBT techniques. By applying proposed technique on case studies, we found the results that MBT techniques can be applied on resulting state machine diagrams and generated test paths have potential to identify the risks associated with security constraints violation.

  4. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  5. Modeling and Security in Cloud Ecosystems

    Directory of Open Access Journals (Sweden)

    Eduardo B. Fernandez

    2016-04-01

    Full Text Available Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been developed to coexist and evolve together. The stakeholders of such a system need a variety of models to give them a perspective of the possibilities of the system, to evaluate specific quality attributes, and to extend the system. A powerful representation when building or using software ecosystems is the use of architectural models, which describe the structural aspects of such a system. These models have value for security and compliance, are useful to build new systems, can be used to define service contracts, find where quality factors can be monitored, and to plan further expansion. We have described a cloud ecosystem in the form of a pattern diagram where its components are patterns and reference architectures. A pattern is an encapsulated solution to a recurrent problem. We have recently expanded these models to cover fog systems and containers. Fog Computing is a highly-virtualized platform that provides compute, storage, and networking services between end devices and Cloud Computing Data Centers; a Software Container provides an execution environment for applications sharing a host operating system, binaries, and libraries with other containers. We intend to use this architecture to answer a variety of questions about the security of this system as well as a reference to design interacting combinations of heterogeneous components. We defined a metamodel to relate security concepts which is being expanded.

  6. SECURE MATHEMATICALLY- ASSURED COMPOSITION OF CONTROL MODELS

    Science.gov (United States)

    2017-09-27

    that is provably secure against many classes of cyber -attack. The goal of the project is to provide verifiable security ; that is, system designs which...architecture of the secure SMACCMcopter, illustrating the attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 46 Failed cyber -attack...approach for building secure software. DARPA initiated the High Assurance Cyber Military Systems (HACMS) program to develop the technologies needed to

  7. Increasing security through public health: a practical model.

    Science.gov (United States)

    Parker, R David

    2011-01-01

    As political and social changes sweep the globe, there are opportunities to increase national security through innovative approaches. While traditional security methods such as defense forces and homeland security provide both pre-emptive and defensive protection, new methods could meet emerging challenges by responding to the political, financial, and social trends. One method is the integration of defense, medicine and public health. By assisting a nation by providing basic services, such as healthcare, collaborative efforts can increase stabilization in areas of unrest. Improved health outcomes leads to increased domestic security, which can create a ripple effect across a region. Assessment, uptake and sustainability by the host nation are critical for program success. The proposed methodology focuses on the use of primarily extant resources, such as programs used by Special Operations Forces and other health and defense programs. Additional components include evaluation, set objectives and mission collaborations. As the nexus between foreign affairs, security, and public health is increasingly validated through research and practice, standardized interventions should be developed to minimize overlapping expenditures, promote security and strengthen international relations.

  8. Adaptable Authentication Model: Exploring Security with Weaker Attacker Models

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    suffer because of the identified vulnerabilities. Therefore, we may need to analyze a protocol for weaker notions of security. In this paper, we present a security model that supports such weaker notions. In this model, the overall goals of an authentication protocol are broken into a finer granularity......; for each fine level authentication goal, we determine the “least strongest-attacker” for which the authentication goal can be satisfied. We demonstrate that this model can be used to reason about the security of supposedly insecure protocols. Such adaptability is particularly useful in those applications......Most methods for protocol analysis classify protocols as “broken” if they are vulnerable to attacks from a strong attacker, e.g., assuming the Dolev-Yao attacker model. In many cases, however, exploitation of existing vulnerabilities may not be practical and, moreover, not all applications may...

  9. Towards a Model of the Costs of Security

    OpenAIRE

    Larochelle, David; Rosasco, Nicholas

    2003-01-01

    We present a simple information security model to determine why, historically, the level of security has not increased despite numerous technical advances. In our model, the software design process involves trade-offs between security and functionality. Developers choose points in the design space corresponding to certain levels of security and functionality. If development resources, such as number of developers, time for completion, etc., are fixed, there is an implicit trade-off between se...

  10. Los Alamos CCS (Center for Computer Security) formal computer security model

    Energy Technology Data Exchange (ETDEWEB)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  11. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  12. Instilling a Culture of Accountability at the Department of Homeland Security (DHS): Leveraging the Government Performance and Results Modernization Act (GPRA-MA) of 2010

    Science.gov (United States)

    2013-09-01

    He presages major cultural changes, even a seismic shift in mindset pertaining to government performance and results that will be much more far...holistic and seismic shift within both of these arenas.54 Their model nicely summarizes the bi-furcated philosophical approach to leadership and...responsibility to change, offering a few “government-proof” (i.e., safe) techniques for change. Much like performing acrobatics in a straight jacket , almost

  13. On the Need for Relaxed Security Models

    DEFF Research Database (Denmark)

    Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008.......Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008....

  14. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  15. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  16. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  17. Model-based security engineering for the internet of things

    OpenAIRE

    NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; Baldini, Gianmarco; VAN HOESEL Lodewijk

    2015-01-01

    We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...

  18. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  19. Norms, standards, models and recommendations for information security management

    Directory of Open Access Journals (Sweden)

    Karol Kreft

    2010-12-01

    Full Text Available Information is the factor which can decide about the potential and market value of a company. An increase in the value of intellectual capital of an information-driven company requires development of an effective security management system. More and more often companies develop information security management systems (ISMS based on already verified models. In the article, the main problems with management of information security were discussed. Security models were described, as well as the risk analysis in information security management.

  20. A Novel Model for Security Evaluation for Compliance

    DEFF Research Database (Denmark)

    Hald, Sara Ligaard; Pedersen, Jens Myrup; Prasad, Neeli R.

    2011-01-01

    for Compliance (SEC) model offers a lightweight alternative for use by decision makers to get a quick overview of the security attributes of different technologies for easy comparison and requirement compliance evaluation. The scientific contribution is this new approach to security modelling as well......With the increasing focus on security in information systems, it is becoming necessary to be able to describe and compare security attributes for different technologies. Existing are well-described and comprehensive, but expensive and resource demanding to apply. The Security Evaluation...

  1. A Novel Model for Security Evaluation for Compliance

    DEFF Research Database (Denmark)

    Hald, Sara Ligaard; Pedersen, Jens Myrup; Prasad, Neeli R.

    2011-01-01

    With the increasing focus on security in information systems, it is becoming necessary to be able to describe and compare security attributes for different technologies. Existing are well-described and comprehensive, but expensive and resource demanding to apply. The Security Evaluation...... for Compliance (SEC) model offers a lightweight alternative for use by decision makers to get a quick overview of the security attributes of different technologies for easy comparison and requirement compliance evaluation. The scientific contribution is this new approach to security modelling as well...

  2. A Novel Trusted Computing Model for Network Security Authentication

    Directory of Open Access Journals (Sweden)

    Ling Xing

    2014-02-01

    Full Text Available Network information poses great threats from malicious attacks due to the openness and virtuality of network structure. Traditional methods to ensure infor- mation security may fail when both integrity and source authentication for information are required. Based on the security of data broadcast channel, a novel Trusted Com- puting Model (TCM of network security authentication is proposed to enhance the security of network information. In this model, a method of Uniform content locator security Digital Certificate (UDC, which is capable of fully and uniquely index network information, is developed. Standard of MPEG-2 Transport Streams (TS is adopted to pack UDC data. Additionally, a UDC hashing algorithm (UHA512 is designed to compute the integrity and security of data infor- mation . Experimental results show that the proposed model is feasible and effective to network security authentication. 

  3. A new security model for collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lorch, Markus [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Perry, Marcia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2003-06-06

    Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supports the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.

  4. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    CERN Document Server

    Ling, Amy Poh Ai

    2011-01-01

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  5. Complacency: A Threat to Homeland Security

    Science.gov (United States)

    2014-06-01

    fascination with understanding how memes are passed on within cultures and become accepted as “common wisdom.” For the purpose of this thesis, the...terms their meaning. According to folk psychology, terms, such as “complacency,” develop and evolve within cultures, are passed on as memes , and...mind that ordinary people are inclined to endorse. It is the theory that mental state terms develop and evolve within cultures, are passed on as memes

  6. Intelligence Sharing, Fusion Centers, and Homeland Security

    Science.gov (United States)

    2008-06-01

    accurate and timely dissemination of crucial information. LCDR Christopher C. Thornlow in his Master’s Thesis , Fusing Intelligence with Law...networks. FCW, from http://www.fcw.com/print/13_16/news/102730-1.html Waterman, S (2008). Analysis: Einstein and U.S. Cybersecurity . UPI, from http...undergraduate studies at the University of Tennessee in Martin, Tennessee where he graduated with a Bachelor of Science degree in Criminal Justice

  7. European Approaches to Homeland Security and Counterterrorism

    Science.gov (United States)

    2006-07-24

    actual terrorist incident, a Cabinet-level emergency crisis management body — known as COBR (for the Cabinet Office briefing room in which it meets...is convened to coordinate the government’s immediate emergency response; COBR brings together the Prime Minister and other Cabinet ministers and... COBR , and the armed forces would have no jurisdiction outside of supporting the civil powers. The Ministry of Defense and the armed forces are also

  8. ETV - HOMELAND SECURITY EVALUATION OF CYANIDE DETECTORS

    Science.gov (United States)

    EPA's Environmental Technology Verification (ETV) Program was established in 1995 to objectively verify the performance of technologies that measure / monitor the quality of our environment, both for background or at suspected contamination site. The ETV program has established...

  9. Measuring the Foundation of Homeland Security

    Science.gov (United States)

    2007-03-01

    Force (also referred to as humanistic psychology) was a body of knowledge and theories separate from the behaviorist and Freudian movements...Eduardo Salas and Carolyn Prince, Team Performance Assessment and Measurement: Theory , Methods, and Applications (Mahwah, NJ: Lawrence Erlbaum Associates...Team Theory in a Unified Command Environment at Catastrophic Incidents” (Naval Postgraduate School, Monterey, CA, 2005). 18 Andrea Saveri, Howard

  10. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    1947 by George Kennan that argued for a policy of containment of the Soviet Union. The strong emphasis on values in the Narrative underscores the...Service, Excellence  Kent , WA Fire Department: Be Safe, Do Your Best, Serve With Integrity, Take Care of Each Other  Hazardville, CT Fire

  11. A Balanced Approach to Funding Homeland Security

    Science.gov (United States)

    2014-12-01

    Behavior ........................................68 2. Myth 2: Attitude Changes Behavior ..........................................69 3. Myth 3: People...verses another. Because DHS is assessing risk as a means to allocating resources to buy down risk, it is imperative, according to DHS, that its risk...economically healthy impulse .201 Crowdfunding is more than just money; it is facilitation, dedication, team building, and valuation. These are the

  12. The Submersible Threat to Maritime Homeland Security

    Science.gov (United States)

    2013-09-01

    this vessel was $490 million USD at the time of the incident and the parent company, Carnival Corporation, has insurance coverage in the amount of $510...million USD for the vessel with a deductable of approximately $30 million USD (Reuters UK Edition, 2012). The Carnival Corporation self-insures for...declined in the days and weeks after the incident (Reuters U.S. Edition, 2012). After this incident occurred, the stock price for Carnival

  13. Homeland Security Department: FY2007 Appropriations

    Science.gov (United States)

    2006-07-05

    Explosive Detection Systems; ETD: Explosive Trace Detection equipment; IT: Information Technology; FFDO: Federal Flight Deck Officer program; TWIC...willing to place back under warranty should be refurbished. The committee, however, emphasized that it does not believe that explosive trace detection (ETD

  14. 76 FR 34088 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-06-10

    ... participate in this HSAC teleconference via afore mentioned procedures. Each individual must provide his or... during the teleconference, contact Erika Nixon at the afore mentioned number (202) 447-3135. Dated:...

  15. An Interagency Command for Homeland Security

    Science.gov (United States)

    2002-04-01

    rule for many citizens during the initial hours of a large-scale CRBN [chemical, radiological, biological, or nuclear] incident” yet the “lack of an...official source of information on CRBN incidents has left the average citizen much less prepared, both intellectually and emotionally, than the

  16. 2009 Homeland Security Symposium and Exhibition

    Science.gov (United States)

    2009-09-10

    benchmark in 2007. Page 46 http://charlestonharbourresort.com – Legitimate javascript applet used to detect flash player and has been injected with...transactions. • They install backdoors that " beacon " periodically to their command and control servers, allowing surreptitious access to the

  17. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    Philip Zimbardo (New York: Oxford Press, 2007), 241. 58 Ibid., 228. 26 The attacks on 9/11 killed 3,063 people. Although there were multiple... Zimbardo purports that we are not born with tendencies towards good or evil but with mental templates to do either.76 Arie Kruglanski and Shire Fishman...they able to commit such heinous acts? Zimbardo claims that few people will engage in an “end game” final solution without first being prepared

  18. Homeland Security Behind the Redwood Curtain

    Science.gov (United States)

    2007-09-01

    drink, then put it firmly down on the porch railing and turned toward me. “You wouldn’t believe how they talk to their mama ,” he said angrily. “They...a little boy who has cancer . Keep in touch!” she said with a friendly wave good-bye. Rugged is an appropriate adjective to describe this county

  19. Homeland Security Department: FY2008 Appropriations

    Science.gov (United States)

    2007-07-17

    for carry-on bags; whole body imaging; explosive trace detection portal machines; cast and prosthetic device scanners; and bottled liquid scanners. The...transferred from the Science and Technology Directorate (S&T), and the National Biosurveillance Integration System (NBIS), which will be transferred from...transfer of the Biosurveillance program/project activity (PPA) to the new Office of Health Affairs. In addition, funding for the new Office of Emergency

  20. The State of Homeland Security 2007

    Science.gov (United States)

    2007-01-01

    divisions. • The State of Biosecurity. The Department’s grade in this area is a B-. A robust biointelligence and biosurveillance capability must...critical DNDO methods to conduct Advanced Spectroscopic Portal Monitors (ASP) cost-benefit analysis. The Department must improve upon the...methodologies applied toward radiation portal monitors. The Department should also examine the possibilities and implications of aggressive deployment of

  1. Homeland Security Department: FY2010 Appropriations

    Science.gov (United States)

    2009-12-14

    technology. While the TSA has abandoned the acquisition and operational utilization of trace detection portal (puffer) machines in favor WBI devices... Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.160 Dr. Alexander G. Garza, President Obama’s...and $98 million is for biosurveillance , BioWatch, medical readiness planning, chemical response, and other activities

  2. 2006 Homeland Security Symposium and Exposition

    Science.gov (United States)

    2006-03-31

    Geoeconomic Studies • Paul A. Volker Chair in International Economics, Council on Foreign Relations; most recently Director, Congressional Budget...its recommendations •Re-engineer ESF-8 capabilities and responsibilities in partnership with DHS and other strategic partners • Brand the HHS Mission in

  3. Data Mining and Homeland Security: An Overview

    Science.gov (United States)

    2008-08-27

    Senator Patrick Leahy, “Letter of Attorney General Alberto Gonzales to the Chairman and Ranking Member of the Senate Judiciary Committee ordered...documents/nsa_myth_v_ reality.pdf]. 107 The Honorable Alberto Gonzalez, Testimony before the Senate Committee on the Judiciary, Wartime Executive Power

  4. Security Issues in Distributed Database System Model

    OpenAIRE

    MD.TABREZ QUASIM

    2013-01-01

    This paper reviews the most common as well as emerging security mechanism used in distributed database system. As distributed database became more popular, the need for improvement in distributed database management system become even more important. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system. In this paper, we propose some solution for some security aspects such as multi-level access control, ...

  5. Aspect-oriented security hardening of UML design models

    CERN Document Server

    Mouheb, Djedjiga; Pourzandi, Makan; Wang, Lingyu; Nouh, Mariam; Ziarati, Raha; Alhadidi, Dima; Talhi, Chamseddine; Lima, Vitor

    2015-01-01

    This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The

  6. Pricing Asset-backed Securities: A Revised Model

    OpenAIRE

    Bradka, Lukas

    2008-01-01

    This paper deals with asset backed securities and the pricing thereof. First, an overview of debt markets is provided with a particular focus on the recent crisis in the sub prime markets. Second, literature surrounding securitization, asset backed securities and related types of debt is analysed and discussed. A revised pricing model for asset backed securities based on two existing models (Ebrahim, 2000; Ebrahim & Ahmed, 2007) is successively developed and implemented in Maple programming l...

  7. Re-designing the PhEDEx Security Model

    Science.gov (United States)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  8. The help of formal models for healthcare security policies.

    Science.gov (United States)

    Trouessin, G; Barber, B

    1997-01-01

    This article is a personal contribution (i.e., from a strict security expert point of view) towards the help for specification, validation and/or evaluation of reliable, but also secure, healthcare security policies (HSP). The first part is dedicated to show, according to the various aspects of the security policy concept, that healthcare information systems (HIS) offer such a diversity of particularities and potential security needs, that it is necessary for healthcare security policies to be defined as flexible, but also as robust, as possible. Then the formal modelling approach, a wide area of solutions providing both flexibility (by means of modelling) and robustness (by means of formalization), is presented. The most well-known examples of security models are recalled. All of them try to use formal models as a security policy specification/validation tool, but none of them can be helpfully used in the very demanding context of HIS. Lastly, a new approach for the modelling of healthcare security policies, based on modal logic (i.e., epistemic and/or deontic logic) is proposed. It permits to take into account the flexibility (by means of high expressiveness due to modality) and the robustness (by means of high provability due to modelling) needs.

  9. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  10. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  11. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... previous approaches to the problem. Starting from an open point-to-point network there is a long way to general secure multiparty computation. The dissertation contains contributions at several points along the way. In particular we investigate how to realize secure channels. We also show how threshold...... you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...

  12. Multilevel security model for ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Wang Changda; Ju Shiguang

    2008-01-01

    Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations.As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.

  13. Hierarchical Policy Model for Managing Heterogeneous Security Systems

    Science.gov (United States)

    Lee, Dong-Young; Kim, Minsoo

    2007-12-01

    The integrated security management becomes increasingly complex as security manager must take heterogeneous security systems, different networking technologies, and distributed applications into consideration. The task of managing these security systems and applications depends on various systems and vender specific issues. In this paper, we present a hierarchical policy model which are derived from the conceptual policy, and specify means to enforce this behavior. The hierarchical policy model consist of five levels which are conceptual policy level, goal-oriented policy level, target policy level, process policy level and low-level policy.

  14. Improving the All-Hazards Homeland Security Enterprise Through the Use of an Emergency Management Intelligence Model

    Science.gov (United States)

    2013-09-01

    as the inability of the EM community to swing the pendulum to the preparedness and mitigation phases. Intelligence, and the use of, is critical to...swing the EM pendulum from the reactive to the proactive. Borrowed from best practices in the current IC, and adapted to ensure a process that better...their Reverse 911 calling system; the software fails and none of the calls go through. Messages are pushed out to the public through various methods

  15. Security Model For Service-Oriented Architecture

    CERN Document Server

    Karimi, Oldooz

    2011-01-01

    In this article, we examine how security applies to Service Oriented Architecture (SOA). Before we discuss security for SOA, lets take a step back and examine what SOA is. SOA is an architectural approach which involves applications being exposed as "services". Originally, services in SOA were associated with a stack of technologies which included SOAP, WSDL, and UDDI. This article addresses the defects of traditional enterprise application integration by combining service oriented-architecture and web service technology. Application integration is then simplified to development and integration of services to tackle connectivity of isomerous enterprise application integration, security, loose coupling between systems and process refactoring and optimization.

  16. Security Issues in Distributed Database System Model

    Directory of Open Access Journals (Sweden)

    MD.TABREZ QUASIM

    2013-12-01

    Full Text Available This paper reviews the most common as well as emerging security mechanism used in distributed database system. As distributed database became more popular, the need for improvement in distributed database management system become even more important. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system. In this paper, we propose some solution for some security aspects such as multi-level access control, confidentiality, reliability, integrity and recovery that pertain to a distributed database system.

  17. A risk management model for securing virtual healthcare communities.

    Science.gov (United States)

    Chryssanthou, Anargyros; Varlamis, Iraklis; Latsiou, Charikleia

    2011-01-01

    Virtual healthcare communities aim to bring together healthcare professionals and patients, improve the quality of healthcare services and assist healthcare professionals and researchers in their everyday activities. In a secure and reliable environment, patients share their medical data with doctors, expect confidentiality and demand reliable medical consultation. Apart from a concrete policy framework, several ethical, legal and technical issues must be considered in order to build a trustful community. This research emphasises on security issues, which can arise inside a virtual healthcare community and relate to the communication and storage of data. It capitalises on a standardised risk management methodology and a prototype architecture for healthcare community portals and justifies a security model that allows the identification, estimation and evaluation of potential security risks for the community. A hypothetical virtual healthcare community is employed in order to portray security risks and the solutions that the security model provides.

  18. An Access Control Model of Virtual Machine Security

    Directory of Open Access Journals (Sweden)

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  19. A model-driven approach to information security compliance

    Science.gov (United States)

    Correia, Anacleto; Gonçalves, António; Teodoro, M. Filomena

    2017-06-01

    The availability, integrity and confidentiality of information are fundamental to the long-term survival of any organization. Information security is a complex issue that must be holistically approached, combining assets that support corporate systems, in an extended network of business partners, vendors, customers and other stakeholders. This paper addresses the conception and implementation of information security systems, conform the ISO/IEC 27000 set of standards, using the model-driven approach. The process begins with the conception of a domain level model (computation independent model) based on information security vocabulary present in the ISO/IEC 27001 standard. Based on this model, after embedding in the model mandatory rules for attaining ISO/IEC 27001 conformance, a platform independent model is derived. Finally, a platform specific model serves the base for testing the compliance of information security systems with the ISO/IEC 27000 set of standards.

  20. ONTOLOGICAL MODEL OF STRATEGIC ECONOMIC SECURITY OF ENTERPRISE

    Directory of Open Access Journals (Sweden)

    L. A. Zaporozhtseva

    2014-01-01

    Full Text Available Article explains the necessity the application of the ontological approach to modeling the strategic economic security in the formalization of the basic categories of domain company recognized its benefits. Among the advantages of the model distinguishes its versatility and ability to describe various aspects of strategic security - the system strategies and goals of the organization and business processes; possibility of its use at different levels of detail - from the top-level description of the basic categories of management, to design-level analytic applications; as well as the adaptability of the model, with depth on particular aspects determined by practical necessity and not regulated methodology. The model integrates various aspects of the concept of enterprise architecture and organizes conceptual apparatus. Ontological model easy to understand and adjust as business architects and specialists in designing systems of economic security and offers many categories of verbal representation of the domain of the enterprise. Proved the feasibility of using process-functional approach in providing strategic economic security, according to which the components of such a security company proposed as business processes, finance, staff and contractors. The article presents the author's ontological model of strategic economic security, including endangered sites, the presence of factors that threaten the security of the object and the subject of providing security. Further, it is proved that in the subjects of security impact on the object using the tools, measures and activities within the strategy formed the mechanism is implemented managerial decisions to strengthen the strategic economic security. The process of diagnosis, detection, identification of threats of economic security, and the development of enterprise development strategies, taking into account its level of economic security must be under the constant supervision of the process of

  1. The Common Risk Model for Dams: A Portfolio Approach to Security Risk Assessments

    Science.gov (United States)

    2013-06-01

    Portfolio Approach to Security Risk Assessments Yev Kirpichevsky Yazmin Seda -Sanabria, U.S. Army Corps of Engineers Enrique E. Matheu, U.S...Yev Kirpichevsky Yazmin Seda -Sanabria, U.S. Army Corps of Engineers Enrique E. Matheu, U.S. Department of Homeland Security Jason A. Dechant M...adaptive threats across a large portfolio [ Seda -Sanabria et al., 20111]. At the most basic level, risk is estimated for an attack scenario, defined as

  2. Critical Homeland Infrastructure Protection

    Science.gov (United States)

    2007-01-01

    CIP Mr. Dan Mathis DPO-MA The National Innovative Technology and Ms. Elizabeth NITMAC Mission Assurance Center D’Andrea Current and Developing Issues...Vulnerabilities and COL Jeff Brown JTF-CNO Countermeasures Telecommunications Security and NSTAC Mr. Karl Rauscher NSTAC Anti-Terrorism/Force Protection LTC(P

  3. A Novel Computer Virus Propagation Model under Security Classification

    Directory of Open Access Journals (Sweden)

    Qingyi Zhu

    2017-01-01

    Full Text Available In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.

  4. 77 FR 26641 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2012-05-04

    ... 4, 2012 Part III Department of Homeland Security Transportation Security Administration Aviation... Aviation Security Advisory Committee (ASAC) Meeting AGENCY: Transportation Security Administration, DHS... Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) on May...

  5. Self Managed Security Cell, a security model for the Internet of Things and Services

    CERN Document Server

    de Leusse, Pierre; Dimitrakos, Theo; Nair, Srijith K; 10.1109/AFIN.2009.15

    2012-01-01

    The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase of their usage make for an augmentation in the number of the security threats and violation attempts that existing security systems do not appear robust enough to address. In this paper, the authors underline this increase in risk and identify the requirements for resources to be more resilient in this type of environment while keeping an important level of flexibility. In addition, the authors propose an architectural model of Self Managed Security Cell, which leverages on current knowledge in large scale security systems, information management and autonomous systems.

  6. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... Transportation Worker Identification Credential or Hazardous Materials Endorsement programs. (3) A...

  7. Using a Prediction Model to Manage Cyber Security Threats

    National Research Council Canada - National Science Library

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    .... The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security...

  8. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  9. Secure Model for Virtualization Layer in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Sina Manavi

    2015-05-01

    Full Text Available cloud security is one of the buzz words in cloud computing. Since virtualization is the fundamental of the cloud computing, needs to study it more deeply to avoid attacks and system failure. In this research is focused on virtualization vulnerabilities. In addition it is attempted to propose a model to secure and proper mechanism to react reasonable against the detected attack by intrusion detection system. With the secured model (SVM, virtual machines will be resist more efficiency against the attacks in cloud computing.

  10. Optimizing ZigBee Security using Stochastic Model Checking

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report......, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic...

  11. Optimizing ZigBee Security using Stochastic Model Checking

    CERN Document Server

    Yüksel, Ender; Nielson, Flemming; Fruth, Matthias; Kwiatkowska, Marta

    2012-01-01

    ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic application scenarios.

  12. Formal Specifications and Verification of a Secure Communication Protocol Model

    Institute of Scientific and Technical Information of China (English)

    夏阳; 陆余良; 蒋凡

    2003-01-01

    This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.

  13. How to Be a Better Consumer of Security Maturity Models

    Science.gov (United States)

    2014-10-21

    2014 Carnegie Mellon University How to Be a Better Consumer of Security Maturity Models October 21, 2014 Julia Allen & Dr. Nader Mehravari...A 3. DATES COVERED 4. TITLE AND SUBTITLE How to Be a Better Consumer of Security Maturity Models 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...REACTIVE AND TAKEN UNAWARE BY SOCIAL MEDIA broadcasting • FACEBOOK AND TWITTER PRESENCE • BROADCAST STANDARD MARKETING VIA SOCIAL MEDIA • TARGETED

  14. Enhanced Authentication Mechanism Using Multilevel Security Model

    Directory of Open Access Journals (Sweden)

    Abdulameer Hussain

    2009-06-01

    Full Text Available This paper presents a proposed multilevel authentication method which is implemented especially in sensitive applications where they contain multilevel secure and confidential data. The proposed method divides the system into multiple sensitive levels and tests users against different authentication methods for each level. Most levels are subdivided further into secure sublevels. Each sublevel contains its own privileges and data types which are managed by an Identity Manager (IM whose responsibility is to transit users to other higher sublevels. The transition’s decision is done by assigning different weights to each authentication method .After a series of tests, the IM must generate a status report describing the results and the decision made to each user’s activity. This technique permits granting only the required privileges for a selected group of users and limits the configuration functions of those that users in a particular user group can perform.

  15. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  16. Enhancing Information Systems Security in Educational Organizations in KSA through proposing security model

    Directory of Open Access Journals (Sweden)

    Hussain A.H. Awad

    2011-09-01

    Full Text Available It is well known that technology utilization is not restricted for one sector than the other anymore, Educational organizations share many parts of their information systems with commercial organizations. In this paper we will try to identify the main characteristics of information systems in educational organizations, then we will propose a model of two parts to enhance the information systems security, the first part of the model will handle the policy and laws of the information system, the second part will provide a technical approach on how to audit and subsequently maintain the security of information system.

  17. Security Optimization of VTP Model in an Enterprise VLAN

    Directory of Open Access Journals (Sweden)

    Rajiv O. Verma

    2013-05-01

    Full Text Available VLANs are extensively used in enterprise network to ease management of hosts to improve scalability and flexibility. Despite their wide usage in enterprise network, VLAN security is a greater concern for the network administrator due to very little attention has been paid on error prone, unsystematic, high risk of misconfiguration in the design and management of enterprise VLAN network. Our paper demonstrates the security optimization techniques in designing VLAN both for Inter-VLAN communication and addressing VTP issues. We proposed various security aspects like access-lists based layer 3 securities in Inter-VLAN routing, deactivating native VLAN 1 to secure Layer 2 traffic in VTP model, Application of authentication on VTP server and non-negotiating Dynamic Trunking Protocol mode to counter the effect of inserting a rogue switch/trunk with higher config revision number. Unless otherwise stated this paper is based upon configuration {&} hardware implementation in a Cisco environment

  18. Transnationalism: Diaspora-Homeland Development

    Science.gov (United States)

    Patterson, Rubin

    2006-01-01

    Based on detected correlations between the strategic collaboration of U.S.-based diasporas and their respective ancestral homelands on the one hand and the socioeconomic and technological development of those homelands on the other, this paper, which provides a conceptual foundation of the correlation, attempts to ignite a new area of research on…

  19. Information Governance: A Model for Security in Medical Practice

    Directory of Open Access Journals (Sweden)

    Patricia A.H. Williams

    2007-03-01

    Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data. 

  20. MULTILEVEL RECURRENT MODEL FOR HIERARCHICAL CONTROL OF COMPLEX REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Andrey V. Masloboev

    2014-11-01

    Full Text Available Subject of research. The research goal and scope are development of methods and software for mathematical and computer modeling of the regional security information support systems as multilevel hierarchical systems. Such systems are characterized by loosely formalization, multiple-aspect of descendent system processes and their interconnectivity, high level dynamics and uncertainty. The research methodology is based on functional-target approach and principles of multilevel hierarchical system theory. The work considers analysis and structural-algorithmic synthesis problem-solving of the multilevel computer-aided systems intended for management and decision-making information support in the field of regional security. Main results. A hierarchical control multilevel model of regional socio-economic system complex security has been developed. The model is based on functional-target approach and provides both formal statement and solving, and practical implementation of the automated information system structure and control algorithms synthesis problems of regional security management optimal in terms of specified criteria. An approach for intralevel and interlevel coordination problem-solving in the multilevel hierarchical systems has been proposed on the basis of model application. The coordination is provided at the expense of interconnection requirements satisfaction between the functioning quality indexes (objective functions, which are optimized by the different elements of multilevel systems. That gives the possibility for sufficient coherence reaching of the local decisions, being made on the different control levels, under decentralized decision-making and external environment high dynamics. Recurrent model application provides security control mathematical models formation of regional socioeconomic systems, functioning under uncertainty. Practical relevance. The model implementation makes it possible to automate synthesis realization of

  1. Architecting Secure Web Services using Model Driven Agile Modeling

    Directory of Open Access Journals (Sweden)

    Dr.B.Padmaja Rani,

    2010-09-01

    Full Text Available The importance of the software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Design flaws account for fifty percent of security problems and risk analysis plays essential role in solid security problems. Service Web Services are an integral part of next generation Web applications. The development and use of these services is growing at an incredible rate, and so too security issues surrounding them. If the history of inter-application communication repeats itself, the ease with which web services architectures publish information about applications across thenetwork is only going to result in more application hacking. At the very least, it’s going to put an even greater burden on web architects and developers to design and write secure code. Developing specification like WS-Security should be leveraged as secure maturity happens over firewalls. In this paper, we want to discuss security architectures design patterns for Service Oriented Web Services. Finally, we validated this by implementing a case study of a Service Oriented Web Services application StockTrader Security using WS-Security and WS-Secure Conversation.

  2. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  3. Optimizing ZigBee Security using Stochastic Model Checking

    OpenAIRE

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming; Fruth, Matthias; Kwiatkowska, Marta

    2012-01-01

    ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checki...

  4. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  5. Changing Homeland Security: What Should Homeland Security Leaders Be Talking About?

    Science.gov (United States)

    2006-07-01

    top of the nation’s policy agenda. The discussions will be based on a mix of research , experience, opinion, ideology, and bias. Participants in the... constructionism , middle-of-the-road moderation, and radical reconstructionism.14 BELLA VIT A, CH A NGI NG HOMELA ND SECU R ITY 6...nation by paying more attention to the social and economic conditions that give rise to and support “premeditated, politically motivated violence

  6. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    Science.gov (United States)

    2015-06-01

    FIGURES Figure 1.  Atlanta Police Department Organizational Chart ............................................32  Figure 2.  Atlanta Police Overall...40  Figure 4.  Hall County Fire Department Organizational Chart ........................................46...55  Figure 7.  Dekalb County Police Department Organizational Chart ................................62

  7. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    Science.gov (United States)

    2013-12-01

    pile eventually collapses. What interested Bak, was how big 73 Benjamin Franklin, Memoirs of the Life and Writings of Benjamin Franklin, Google ebook ...Google ebook ed. Vol. I. London: A.J. Valphy, 1818. Frontline, Money, Power and Wall Street, directed by Michael Kirk, Season 30, episode 10

  8. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  9. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  10. A Layered Decision Model for Cost-Effective System Security

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Huaqiang; Alves-Foss, James; Soule, Terry; Pforsich, Hugh; Zhang, Du; Frincke, Deborah A.

    2008-10-01

    System security involves decisions in at least three areas: identification of well-defined security policies, selection of cost-effective defence strategies, and implementation of real-time defence tactics. Although choices made in each of these areas affect the others, existing decision models typically handle these three decision areas in isolation. There is no comprehensive tool that can integrate them to provide a single efficient model for safeguarding a network. In addition, there is no clear way to determine which particular combinations of defence decisions result in cost-effective solutions. To address these problems, this paper introduces a Layered Decision Model (LDM) for use in deciding how to address defence decisions based on their cost-effectiveness. To validate the LDM and illustrate how it is used, we used simulation to test model rationality and applied the LDM to the design of system security for an e-commercial business case.

  11. A Role- Based PMI Security Model for E- Government

    Institute of Scientific and Technical Information of China (English)

    WU Li-jun; SU Kai-le; YANG Zhi-hua

    2005-01-01

    We introduce the general AC( attribute certificate ), the role specification AC and the role assignment AC.We discuss the role-based PMI (Privilege Management Infrastructure) architecture. The role-based PMI(Public-Key Infrastructure) secure model for E-government is researched by combining the role-based PMI with PKI architecture (Public Key Infrastructure). The model has advantages of flexibility,convenience, less storage space and less network consumption etc. We are going to use the secure model in the E-government system.

  12. International Conference on Computational Intelligence, Cyber Security, and Computational Models

    CERN Document Server

    Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn

    2016-01-01

    This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

  13. An intruder model for verifying liveness in security protocols

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi

    2006-01-01

    We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equivalent to a Dolev-Yao intruder that does not delay indefinitely the delivery of messages. In order to prove the equivalenc

  14. Re-designing the PhEDEx security model

    CERN Document Server

    Wildish, Anthony

    2013-01-01

    PhEDEx. the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model was designed to provide a safe working environment for site agents and operators, but provided little more protection than that. CMS data was not sufficiently protected against accidental loss caused by operator error or software bugs or from loss of data caused by deliberate manipulation of the database. Operations staff were given high levels of access to the database, beyond what should have been needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time.In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and r...

  15. A secured e-tendering modeling using misuse case approach

    Science.gov (United States)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.

  16. Model Checking Electronic Commerce Security Protocols Based on CTL

    Institute of Scientific and Technical Information of China (English)

    XIAO De-qin; ZHANG Huan-guo

    2005-01-01

    We present a model based on Computational Temporal Logic (CTL) methods for verifying security requirements of electronic commerce protocols. The model describes formally the authentication, confidentiality integrity,non-repudiation, denial of service and access control of the electronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocol proposed by Lu-Smolka.Moreover, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user. And also, we compared our work with relative research works and found that the formal way of this paper is more general to specify security protocols for E-Commerce.

  17. Using a Prediction Model to Manage Cyber Security Threats

    Directory of Open Access Journals (Sweden)

    Venkatesh Jaganathan

    2015-01-01

    Full Text Available Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  18. Using a Prediction Model to Manage Cyber Security Threats.

    Science.gov (United States)

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  19. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  20. Adaptable Authentication Model - for Exploring the Weaker Notions of Security

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    . The approach considers correct protocols, i.e., protocols that achieve their objectives when there exist no effective attacker. All correct protocols are assumed to be secure and the challenge we pose for a security analyst is to derive the least strongest attacker (LSA) model for which the, so...... of communication security. One potent argument often presented is we keep designing new protocols due the demand of new type of applications and due to the discovery of flaws in existing protocols. While designing new protocols for new type of applications, such as RFID, is definitely an important driving factor...... operational environment. In past, this often caused increasing the power of attacker model, for instance, now a days we also consider privacy concerns and side channel leakage beside the classic Dolev-Yao attacker. A protocol is labeled as insecure protocol once an effective attack or flaw is found in it...

  1. Portfolio Selection Model with Derivative Securities

    Institute of Scientific and Technical Information of China (English)

    王春峰; 杨建林; 蒋祥林

    2003-01-01

    Traditional portfolio theory assumes that the return rate of portfolio follows normality. However, this assumption is not true when derivative assets are incorporated. In this paper a portfolio selection model is developed based on utility function which can capture asymmetries in random variable distributions. Other realistic conditions are also considered, such as liabilities and integer decision variables. Since the resulting model is a complex mixed-integer nonlinear programming problem, simulated annealing algorithm is applied for its solution. A numerical example is given and sensitivity analysis is conducted for the model.

  2. Organizational information assets classification model and security architecture methodology

    Directory of Open Access Journals (Sweden)

    Mostafa Tamtaji

    2015-12-01

    Full Text Available Today's, Organizations are exposed with huge and diversity of information and information assets that are produced in different systems shuch as KMS, financial and accounting systems, official and industrial automation sysytems and so on and protection of these information is necessary. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released.several benefits of this model cuses that organization has a great trend to implementing Cloud computing. Maintaining and management of information security is the main challenges in developing and accepting of this model. In this paper, at first, according to "design science research methodology" and compatible with "design process at information systems research", a complete categorization of organizational assets, including 355 different types of information assets in 7 groups and 3 level, is presented to managers be able to plan corresponding security controls according to importance of each groups. Then, for directing of organization to architect it’s information security in cloud computing environment, appropriate methodology is presented. Presented cloud computing security architecture , resulted proposed methodology, and presented classification model according to Delphi method and expers comments discussed and verified.

  3. Food Security Information Platform Model Based on Internet of Things

    Directory of Open Access Journals (Sweden)

    Lei Zhang

    2015-06-01

    Full Text Available According to the tracking and tracing requirements of food supply chain management and quality and safety, this study built food security information platform using the Internet of things technology, with reference to the EPC standard, the use of RFID technology, adopting the model of SOA, based on SCOR core processes, researches the food security information platform which can set up the whole process from the source to the consumption of the traceability information, provides food information, strengthens the food identity verification, prevents food identification and information of error identification to the consumer and government food safety regulators, provides good practices for food safety traceability.

  4. South African Homelands as Frontiers

    DEFF Research Database (Denmark)

    This book explores what happened to the homelands – in many ways the ultimate apartheid disgrace – after the fall of apartheid. The nine chapters contribute to understanding the multiple configurations that currently exist in areas formerly declared "homelands" or "Bantustans". Using the concept...... of frontier zones, the homelands emerge as areas in which the future of the South African postcolony is being renegotiated, contested and remade with hyper-real intensity. This is so because the many fault lines left over from apartheid (its loose ends, so to speak) – between white and black; between...... in these settings that the postcolonial promise of liberation and freedom must face its test. As such, the book offers highly nuanced and richly detailed analyses that go to the heart of the diverse dilemmas of post-apartheid South Africa as a whole, but simultaneously also provides in condensed form an extended...

  5. Immune-Inspired Self-Protection Model for Securing Grid

    Directory of Open Access Journals (Sweden)

    Inderpreet Chopra

    2016-03-01

    Full Text Available —The application of human immunology in solving security problems in Grid Computing seems to be a thought-provoking research area. Grid involves large number of dynamic heterogeneous resources. Manually managing the security for such dynamic system is always fault prone. This paper presents the simple immune based model for self-protection (SIMS of grid environment from various attacks like DoS, DDoS, Probing, etc. Like human body helps to identify and respond to harmful pathogens that it doesn't recognize as “self”, in the same manner SIMS incorporates the immunological concepts and principles for safeguarding the grid from various security breaches.

  6. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  7. The Haptic Lines of Homeland

    Science.gov (United States)

    Dawson, P.; Takatsuka, M.

    2013-02-01

    This paper discusses the conceptual underpinnings, working processes and the tools used for preparing the scene files of a holographic art work which offers a subjective view point on the idea of homeland. The art work, Homeland, an optically formed fringe digital hologram, which is contextualized by the holographic maps used in situational awareness, indicates its subjectivity by strongly referencing the human body, particularly the lines of the palm of the hand. ... because the body belongs to the order of things as the world is universal flesh. Maurice Merleau-Ponty

  8. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the security identification display... (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA)....

  9. What Price Security?

    Directory of Open Access Journals (Sweden)

    Donald C. Masters

    2009-01-01

    Full Text Available This article presents a critique of the Copenhagen Consensus Center's(CCC exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive procurement practices will also result in lower costs and higher returns on security investments.

  10. Generic Model to Send Secure Alerts for Utility Companies

    Directory of Open Access Journals (Sweden)

    Perez–Díaz J.A.

    2010-04-01

    Full Text Available In some industries such as logistics services, bank services, and others, the use of automated systems that deliver critical business information anytime and anywhere play an important role in the decision making process. This paper introduces a "Generic model to send secure alerts and notifications", which operates as a middleware between enterprise data sources and its mobile users. This model uses Short Message Service (SMS as its main mobile messaging technology, however is open to use new types of messaging technologies. Our model is interoperable with existing information systems, it can store any kind of information about alerts or notifications at different levels of granularity, it offers different types of notifications (as analert when critical business problems occur,asanotificationina periodical basis or as 2 way query. Notification rules can be customized by final users according to their preferences. The model provides a security framework in the cases where information requires confidentiality, it is extensible to existing and new messaging technologies (like e–mail, MMS, etc. It is a platform, mobile operator and hardware independent. Currently, our solution is being used at the Comisión Federal de Electricidad (Mexico's utility company to deliver secure alerts related to critical events registered in the main power generation plants of our country.

  11. Holistic Security Model for Mobile Database in Nigeria

    Directory of Open Access Journals (Sweden)

    Fidelis C. Obodoeze

    2016-07-01

    Full Text Available Due to proliferation on the usage of mobile computing devices such as mobile phones, smart phones, Tablet PCs and Portable Digital Assistant (PDA in Nigeria and world over, it is expected that these light-weight, powerful, low-cost computing devices will pave way for data-driven applications in mobile environments. These portal mobile devices can be connected to corporate database and application servers so that application processing can take place at any time and from anywhere. This can throw up a lot of security challenges. Hackers, malicious programs and rival firms can penetrate the corporate servers through various security holes or vulnerabilities. This paper examines these security holes that can emanate from three major windows- the mobile device, the mobile network and the corporate database server and critically x-rays various solutions that can ward them off in order to protect critical data from attack, eavesdropping, disruption, destruction and modification. This paper finally proposes a holistic security model to protect corporate mobile database in Nigeria

  12. 76 FR 10528 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Isolation or...

    Science.gov (United States)

    2011-02-25

    ... airplane models. This may allow the exploitation of network security vulnerabilities and increase ] risks... Federal Aviation Administration 14 CFR Part 25 Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Isolation or Protection From Unauthorized Passenger Systems Access AGENCY...

  13. 76 FR 36861 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Isolation or...

    Science.gov (United States)

    2011-06-23

    ... airplane models. This may allow the exploitation of network security vulnerabilities and increase risks... Federal Aviation Administration 14 CFR Part 25 Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Isolation or Protection From Unauthorized Passenger Systems Access AGENCY...

  14. Physical security and vulnerability modeling for infrasturcture facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen; Jones, Dean A.; Davis, Chad Edward; Turnquist, Mark Alan

    2006-07-01

    A model of malicious intrusions in infrastructure facilities is developed, using a network representation of the system structure together with Markov models of intruder progress and strategy. This structure provides an explicit mechanism to estimate the probability of successful breaches of physical security, and to evaluate potential improvements. Simulation is used to analyze varying levels of imperfect information on the part of the intruders in planning their attacks. An example of an intruder attempting to place an explosive device on an airplane at an airport gate illustrates the structure and potential application of the model.

  15. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  16. Modeling, simulation and analysis of a securities settlement system: the case of Central Securities Depository of Mexico

    Directory of Open Access Journals (Sweden)

    David F. Muñoz

    2012-12-01

    Full Text Available The Instituto para el Depósito de Valores (INDEVAL is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient operating system. The main objective of this research was to use reduced amounts of cash and securities, within reasonable periods of time, for the settlement of securities of the Mexican market. A linear programming model for the netting and clearing of operations was used. The performance of the new SSS was evaluated by performing experiments using a deterministic simulation model under different operation parameters, such as the number and monetary value of transactions, the time between clearing cycles and also under a new set of rules for pre-settlement operations. The results presented may be used by other Central Securities Depositories to make decisions related to the efficient and safer use of their resources. The implementation of the model took more than three years. Now many transactions that would remain pending if processed individually are settled together, thus reducing liquidity requirements dramatically -by 52% in cash and 26% in securities.

  17. Future consumer mobile phone security: a case study using the data centric security model

    NARCIS (Netherlands)

    Cleeff, van Andre

    2008-01-01

    In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested, most

  18. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control and data acquisition (SCADA) security...software assurance, critical infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control

  19. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  20. Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security

    Directory of Open Access Journals (Sweden)

    Geetha Mariappan

    2014-06-01

    Full Text Available The objective of the research work is to propose a policy aware privacy enhancement model using dynamic trust and security management techniques. The different polices of the stakeholders incorporating device manufacturer, service provider, Mobile agents and mobile users are considered to achieve an enhanced privacy for on-demand request. The entities involving direct and indirect trust establishment with all forms of uncertainties like DDoS attacks are considered along with multiple layers of security management operations across varying trusted entities. The focus is to enhance the existing privacy through an efficient, preventive, detective, response mechanisms for those attacks, which will address the problem of DDoS before, during and after an actual attack. The session time and access time are controlled by the privileges and rights for disclosure of information in pervasive environment.

  1. Resilience to leaking--dynamic systems modeling of information security.

    Science.gov (United States)

    Hamacher, Kay

    2012-01-01

    Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.

  2. Resilience to Leaking — Dynamic Systems Modeling of Information Security

    Science.gov (United States)

    Hamacher, Kay

    2012-01-01

    Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack ‘unjust’ systems or ‘conspiracies’. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for ‘just’ and ‘unjust’ entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the ‘conspiracy’). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean’ in direct adversary relations, but do not necessarily increase public benefit and societal immunization to ‘conspiracies’. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here. PMID:23227151

  3. Resilience to leaking--dynamic systems modeling of information security.

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    Full Text Available Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'. In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.

  4. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  5. A Secured Hybrid Architecture Model for Internet Banking (e - Banking

    Directory of Open Access Journals (Sweden)

    Ganesan R

    2009-05-01

    Full Text Available Internet banking has made it easy to carry out the personal or business financial trans action without going to bank and at any suitable time. This facility enables to transfer money to other accounts and checking current balance alongside the status of any financial transaction made in the account. However, in order to maintain privacy and t o avoid any misuse of transactions, it is necessary to follow a secured architecture model which ensures the privacy and integrity of the transactions and provides confidence on internet banking is stable. In this research paper, a secured hybrid architect ure model for the internet banking using Hyperelliptic curve cryptosystem and MD5 is described. This hybrid model is implemented with the hyperelliptic curve cryptosystem and it performs the encryption and decryption processes in an efficient way merely wi th an 80 - bit key size. The various screen shots given in this contribution shows that the hybrid model which encompasses HECC and MD5 can be considered in the internet banking environment to enrich the privacy and integrity of the sensitive data transmitte d between the clients and the application server

  6. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    Science.gov (United States)

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  7. A data-driven model for estimating industry average numbers of hospital security staff.

    Science.gov (United States)

    Vellani, Karim H; Emery, Robert J; Reingle Gonzalez, Jennifer M

    2015-01-01

    In this article the authors report the results of an expanded survey, financed by the International Healthcare Security and Safety Foundation (IHSSF), applied to the development of a model for determining the number of security officers required by a hospital.

  8. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Federal Aviation Administration 14 CFR Part 25 Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From Unauthorized External Access AGENCY: Federal Aviation... systems and networks may result in security vulnerabilities to the airplane's systems. The applicable...

  9. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... TRANSPORTATION Federal Aviation Administration 14 CFR Part 25 Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From Unauthorized External Access AGENCY: Federal Aviation... result in security vulnerabilities to the airplane's systems. The applicable airworthiness regulations do...

  10. Cooperative Monitoring Center Occasional Paper/7: A Generic Model for Cooperative Border Security

    Energy Technology Data Exchange (ETDEWEB)

    Netzer, Colonel Gideon

    1999-03-01

    This paper presents a generic model for dealing with security problems along borders between countries. It presents descriptions and characteristics of various borders and identifies the threats to border security, while emphasizing cooperative monitoring solutions.

  11. Delegation Management Modeling in a Security Policy based Environment

    Directory of Open Access Journals (Sweden)

    Sihem Guemara El Fatmi

    2013-07-01

    Full Text Available Security Policies (SP constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover, in today's technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. This collaboration must be governed by security mechanisms according to the established permissions and privileges. Delegation is a common practice that is used to simplify the sharing of responsibilities and privileges. The delegation process in a SP environment can be implanted through the use of adequate formalisms and modeling. The main contribution of this paper is then, the proposition of a generic and formal modeling of delegation process. This modeling is based on three steps composing the delegation life cycle: negotiation used for delegation initiation, verification of the SP respect while delegating and revocation of an established delegation. Hence, we propose to deal with each step according to the main delegation characteristics and extend them by some new specificities.

  12. Algebra model and security analysis for cryptographic protocols

    Institute of Scientific and Technical Information of China (English)

    HUAI Jinpeng; LI Xianxian

    2004-01-01

    More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participant's knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met.

  13. A model to secure a stable iodine concentration in milk

    Directory of Open Access Journals (Sweden)

    Gisken Trøan

    2015-12-01

    Full Text Available Background: Dairy products account for approximately 60% of the iodine intake in the Norwegian population. The iodine concentration in cow's milk varies considerably, depending on feeding practices, season, and amount of iodine and rapeseed products in cow fodder. The variation in iodine in milk affects the risk of iodine deficiency or excess in the population. Objective: The first goal of this study was to develop a model to predict the iodine concentration in milk based on the concentration of iodine and rapeseed or glucosinolate in feed, as a tool to securing stable iodine concentration in milk. A second aim was to estimate the impact of different iodine levels in milk on iodine nutrition in the Norwegian population. Design: Two models were developed on the basis of results from eight published and two unpublished studies from the past 20 years. The models were based on different iodine concentrations in the fodder combined with either glucosinolate (Model 1 or rapeseed cake/meal (Model 2. To illustrate the impact of different iodine concentrations in milk on iodine intake, we simulated the iodine contribution from dairy products in different population groups based on food intake data in the most recent dietary surveys in Norway. Results: The models developed could predict iodine concentration in milk. Cross-validation showed good fit and confirmed the explanatory power of the models. Our calculations showed that dairy products with current iodine level in milk (200 µg/kg cover 68, 49, 108 and 56% of the daily iodine requirements for men, women, 2-year-old children, and pregnant women, respectively. Conclusions: Securing a stable level of iodine in milk by adjusting iodine concentration in different cow feeds is thus important for preventing excess intake in small children and iodine deficiency in pregnant and non-pregnant women.

  14. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...... a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology. © 2009 IEEE....

  15. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology....... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...

  16. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  17. Characterization and modeling of uncertainty intended for a secured MANET

    Directory of Open Access Journals (Sweden)

    Md. Amir Khusru Akhtar

    2013-08-01

    Full Text Available Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be associated with countable or noncountable assumptions such as the weights of acceptance calculated by the members of the MANET. This paper presents “Certainty Intended Model (CIM” for a secured MANET by introducing one or more expert nodes together with the inclusion of various theories (such as monotone measure, belief, plausibility, evidence. These theories can be used for the characterization and modeling various forms of uncertainty. Further, these characterizations help in quantifying the uncertainty spectrum because, as much information about the problem is available we can transform from one theory to another. In this work we have shown how these theories and expert opinion helps to identify the setback associated with the MANET in respect of trust management and finally, enhances the security, reliability and performance of the MANET.

  18. Business models and business model innovation in a “Secure and Distributed Cloud Clustering (DISC) Society”

    DEFF Research Database (Denmark)

    Lindgren, Peter; Taran, Yariv

    2011-01-01

    of secure business models and how business models can be operated and innovated in a secure context have intensified tremendously. The development of new mobile and wireless security technologies gives hopes to really realize a secure cloud clustering society where business models can act and be innovated......The development and innovation of business models to a secure distributed cloud clustering society (DISC)—is indeed still a complex venture and has not been widely researched yet. Numerous types of security technologies are in these years proposed and in the “slip stream” of these the study...... secure—but we still have some steps to go before we reach the final destination. The paper gives a conceptual futuristic outlook on behalf of the input from SW2010 and state of the art business model research to what we can expect of business Model and business model innovation in a future secure cloud...

  19. Open information security management maturity model (O-ISM3)

    CERN Document Server

    2011-01-01

    The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. In addition it supports common frameworks such as ISO 9000, ISO 27000, COBIT and ITIL. Covers: risk management, security controls, security management and how to translate business drivers into security objectives and targets

  20. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    Science.gov (United States)

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…

  1. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    Science.gov (United States)

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…

  2. A Qualitative Study of Domain Specific Languages for Model Driven Security

    Directory of Open Access Journals (Sweden)

    Muhammad Qaiser Saleem

    2014-05-01

    Full Text Available In Model-Driven development, software system design is represented through models which are created using general purpose modeling languages e.g., UML. Later on system artifacts are automatically generated from these models. Model-Driven Security is a specialization of Model-Driven paradigm towards the domain of security, where security objectives are modeled along the system models and security infrastructures are directly generated from these models. Currently available general purpose modeling languages like UML do not have capability to model the security objectives along the system models. Over the past decade, many researchers are trying to address these limitations of the general purpose modeling languages and come up with several Domain Specific Modeling Languages for Model Driven Security. In this study, a comparative study is presented regarding the security Domain Specific Modeling Languages presented by the most prominent researchers for the development of secure system. A success criteria has been defined and these DSLs are critically analyzed based on it to obtain the qualitative results.

  3. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  4. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    OpenAIRE

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is a new model for creating and implementing information technology procedures. This model was validated by two different methods: the first being int...

  5. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  6. Neural evidence for a multifaceted model of attachment security.

    Science.gov (United States)

    Canterberry, Melanie; Gillath, Omri

    2013-06-01

    The sense of attachment security has been linked with a host of beneficial outcomes related to personal and relational well-being. Moreover, research has demonstrated that the sense of attachment security can be enhanced via cognitive priming techniques. Studies using such techniques have shown that security priming results with similar outcomes as dispositional attachment security. The way security priming leads to these effects, however, is yet to be unveiled. Using fMRI we took one step in that direction and examined the neural mechanisms underlying enhanced attachment security. Participants were exposed to explicit and implicit security- and insecurity-related words. Security priming led to co-occurring activation in brain areas reflective of cognitive, affective, and behavioral processes (e.g., medial frontal cortex, parahippocampus, BA 6). There were activation differences based on attachment style. This research serves as an important step in mapping out the security process and supports a conceptualization of security as part of a behavioral system with multiple components. Copyright © 2012 Elsevier B.V. All rights reserved.

  7. Threats at Our Threshold: Homeland Defense and Homeland Security in the New Century

    Science.gov (United States)

    2006-10-21

    what items were needed for collection. No one, for example, foresaw the immense need for diapers and baby formula. The diverse set of actors and...and large, is not. It does not do me any good to begin with a slide that talks about 9/11. I have quit talking about the global war on terrorism...modern world could unwrap —costing us friends, markets , and national power. Eventually what we could see is the loss of the character of the modern

  8. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities §...

  9. 49 CFR 1542.107 - Changed conditions affecting security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Changed conditions affecting security. 1542.107... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the...

  10. Aspects and Class-based Security: A Survey of Interactions between Advice Weaving and the Java 2 Security Model.

    NARCIS (Netherlands)

    Sewe, Andreas; Bockisch, Christoph; Mezini, Mira

    2008-01-01

    Various aspect-oriented languages, e.g., AspectJ, Aspect-Werkz, and JAsCo, have been proposed as extensions to one particular object-oriented base language, namely Java. But these extensions do not fully take the interactions with the Java 2 security model into account. In particular, the implementa

  11. Security Policy Development: Towards a Life-Cycle and Logic-Based Verification Model

    Directory of Open Access Journals (Sweden)

    Luay A. Wahsheh

    2008-01-01

    Full Text Available Although security plays a major role in the design of software systems, security requirements and policies are usually added to an already existing system, not created in conjunction with the product. As a result, there are often numerous problems with the overall design. In this paper, we discuss the relationship between software engineering, security engineering, and policy engineering and present a security policy life-cycle; an engineering methodology to policy development in high assurance computer systems. The model provides system security managers with a procedural engineering process to develop security policies. We also present an executable Prolog-based model as a formal specification and knowledge representation method using a theorem prover to verify system correctness with respect to security policies in their life-cycle stages.

  12. [Ecological security early-warning in Zhoushan Islands based on variable weight model].

    Science.gov (United States)

    Zhou, Bin; Zhong, Lin-sheng; Chen, Tian; Zhou, Rui

    2015-06-01

    Ecological security early warning, as an important content of ecological security research, is of indicating significance in maintaining regional ecological security. Based on driving force, pressure, state, impact and response (D-P-S-I-R) framework model, this paper took Zhoushan Islands in Zhejiang Province as an example to construct the ecological security early warning index system, test degrees of ecological security early warning of Zhoushan Islands from 2000 to 2012 by using the method of variable weight model, and forecast ecological security state of 2013-2018 by Markov prediction method. The results showed that the variable weight model could meet the study needs of ecological security early warning of Zhoushan Islands. There was a fluctuant rising ecological security early warning index from 0.286 to 0.484 in Zhoushan Islands between year 2000 and 2012, in which the security grade turned from "serious alert" into " medium alert" and the indicator light turned from "orange" to "yellow". The degree of ecological security warning was "medium alert" with the light of "yellow" for Zhoushan Islands from 2013 to 2018. These findings could provide a reference for ecological security maintenance of Zhoushan Islands.

  13. Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard

    Directory of Open Access Journals (Sweden)

    M. Azuwa

    2015-05-01

    Full Text Available Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and inefficient implementation. This paper proposes a model of technical security metrics to measure the effectiveness of network security management. The measurement is based on the security performance for (1 network security controls such as firewall, Intrusion Detection Prevention System (IDPS, switch, wireless access point and network architecture; and (2 network services such as Hypertext Transfer Protocol Secure (HTTPS and virtual private network (VPN. The methodology used is Plan-Do-Check-Act process model. The proposed technical security metrics provide guidance for organizations in complying with requirements of ISO/IEC 27001 Information Security Management System (ISMS standard. The proposed model should also be able to provide a comprehensive measurement and guide to use ISO/IEC 27004 ISMS Measurement standard.

  14. APPLICATION OF FUZZY OPTIMIZATION MODEL IN ECOLOGICAL SECURITY PRE-WARNING

    Institute of Scientific and Technical Information of China (English)

    WU Kai-ya; HU Shu-heng; SUN Shi-qun

    2005-01-01

    Ecological security is a vital problem that people all over the world today have to face and solve, and the situation of ecological security is getting more and more severe and has begun to impede heavily the sustainable development of social economy. Ecological environment pre-warning has become a hotspot for the modern environment science. This paper introduces the theories of ecological security pre-warning and tries to constitute a pre-warning model of ecological security. In terms of pressure-state-response model, the pre-warning guide line of ecological security is constructed while the pre-warning degree judging model of ecological security is established based on fuzzy optimization. As a case, the model is used to assess the present condition pre-warning of the ecological security of Anhui Province. The result is in correspondence with the real condition: the ecological security situations of 8 cities are dangerous and 9 cities are secure. The result shows that this model is scientific and effective for regional ecological security pre-warning.

  15. 78 FR 28237 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-14

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory... Telecommunications Advisory Committee, National Protection and Programs Directorate, Department of Homeland...

  16. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  17. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  18. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  19. Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy

    Science.gov (United States)

    Xue, Mingfu; Hu, Aiqun; He, Chunlong

    We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

  20. A Transport Model of Mobile Agent Based on Secure Hybrid Encryption

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; CHENZhixian; WANGRuchuan

    2005-01-01

    The solution of security problems of mobile agents is a key issue, which will decide whether mobile agents can be widely used. The paper analyzes main security problems, which currently are confronted with mobile agent systems and existing protection solutions. And then the paper presents a Security Transport model of mobile agents based on a hybrid encryption algorithm (TMSHE).Meanwhile, it expatiates on implementation of the algorithm. The algorithm of TMSHE model mainly consists of two parts, i.e., employing a hybrid encryption algorithm to encrypt mobile agents and using Transport layer security (TLS) to encrypt communication channel. Mobile agents by hybrid encryption move through communication channels, which are encrypted by TLS. The simulation results indicate that the model can protect mobile agents' security effectively, and consequently the security and steadiness of the whole mobile agent system are also improved. The model has succeeded in getting application in a prototypesystem- Intrusion detection system based on mobile agents.

  1. VBMP Digital Terrain Models - 2006/2007 (VA State Plane South)

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — These files contain Digital Elevation Model (DTM) file data for the Commonwealth of Virginia developed from imagery acquired in spring 2006 and 2007. In the spring...

  2. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  3. OPNET Modeler Simulation Testing of the New Model Used to Cooperation Between QoS and Security Mechanisms

    Directory of Open Access Journals (Sweden)

    Jan Papaj

    2012-01-01

    Full Text Available In this article the performance analysis of the new model, used to integration between QoS and Security, is introduced. OPNET modeler simulation testing of the new model with comparation with the standard model is presented. This new model enables the process of cooperation between QoS and Security in MANET. The introduction how the model is implemented to the simulation OPNET modeler is also showed. Model provides possibilities to integration and cooperation of QoS and security by the cross layer design (CLD with modified security service vector (SSV. An overview of the simulation tested of the new model, comparative study in mobile ad-hoc networks, describe requirements and directions for adapted solutions are presented. Main idea of the testing is to show how QoS and Security related services could be provided simultaneously with using minimal interfering with each service.

  4. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  5. 78 FR 73993 - Special Conditions: Cessna Model 680 Series Airplanes; Aircraft Electronic System Security...

    Science.gov (United States)

    2013-12-10

    ... part of the type certification basis for Cessna Model 680 Series airplanes. System Security Protection... Federal Aviation Administration 14 CFR Part 25 Special Conditions: Cessna Model 680 Series Airplanes; Aircraft Electronic System Security Protection From Unauthorized External Access AGENCY: Federal Aviation...

  6. A developmental approach to learning causal models for cyber security

    Science.gov (United States)

    Mugan, Jonathan

    2013-05-01

    To keep pace with our adversaries, we must expand the scope of machine learning and reasoning to address the breadth of possible attacks. One approach is to employ an algorithm to learn a set of causal models that describes the entire cyber network and each host end node. Such a learning algorithm would run continuously on the system and monitor activity in real time. With a set of causal models, the algorithm could anticipate novel attacks, take actions to thwart them, and predict the second-order effects flood of information, and the algorithm would have to determine which streams of that flood were relevant in which situations. This paper will present the results of efforts toward the application of a developmental learning algorithm to the problem of cyber security. The algorithm is modeled on the principles of human developmental learning and is designed to allow an agent to learn about the computer system in which it resides through active exploration. Children are flexible learners who acquire knowledge by actively exploring their environment and making predictions about what they will find,1, 2 and our algorithm is inspired by the work of the developmental psychologist Jean Piaget.3 Piaget described how children construct knowledge in stages and learn new concepts on top of those they already know. Developmental learning allows our algorithm to focus on subsets of the environment that are most helpful for learning given its current knowledge. In experiments, the algorithm was able to learn the conditions for file exfiltration and use that knowledge to protect sensitive files.

  7. Revising Working Models Across Time: Relationship Situations That Enhance Attachment Security.

    Science.gov (United States)

    Arriaga, Ximena B; Kumashiro, Madoka; Simpson, Jeffry A; Overall, Nickola C

    2017-06-01

    We propose the Attachment Security Enhancement Model (ASEM) to suggest how romantic relationships can promote chronic attachment security. One part of the ASEM examines partner responses that protect relationships from the erosive effects of immediate insecurity, but such responses may not necessarily address underlying insecurities in a person's mental models. Therefore, a second part of the ASEM examines relationship situations that foster more secure mental models. Both parts may work in tandem. We posit that attachment anxiety should decline most in situations that foster greater personal confidence and more secure mental models of the self. In contrast, attachment avoidance should decline most in situations that involve positive dependence and foster more secure models of close others. The ASEM integrates research and theory, suggests novel directions for future research, and has practical implications, all of which center on the idea that adult attachment orientations are an emergent property of close relationships.

  8. Formal Models and Techniques for Analyzing Security Protocols

    CERN Document Server

    Cortier, V

    2011-01-01

    Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro

  9. A Metadata Based Storage Model for Securing Data in Cloud Environment

    Directory of Open Access Journals (Sweden)

    S. Subashini

    2012-01-01

    Full Text Available Problem statement: Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring of data through the wires but also during its storage phase where data stays most of the time. Approach: In order to keep the data secure during its storage phase, a preventive, robust security model is required. Instead of developing a robust security module to prevent hackers from intruding into data centers, a model which will prevent intruders from getting the required information even at the event of intrusion, will be of utmost use. Conventional security models secure data by encryption or by fragmentation. A security model developed using a fragmentation technique that is based on the sensitivity, criticality and value of the data provides better security by means of disintegration of value of the data and also a good technique for prevention of information leaks. The proposed method also provides solutions to access the fragmented data. Results: The proposed model provides a efficient security solution for data stored in cloud. When compared to conventional methods, the speed of data queries are less for small databases, but prove to be very efficient for huge databases. Conclusion: This model provides an efficient solution for data storage security in cloud environment. This technique coupled with standard encryption techniques will make this model more robust.

  10. Deciding Who Lives: Considered Risk Casualty Decisions in Homeland Security

    Science.gov (United States)

    2008-12-01

    into a burning inferno . Where to draw the line between role-related professional responsibilities and undue risk is a question [we] ... did not...doing so in infernos and, therefore, failed to realize that the time for further rescue efforts had passed. This dichotomy of experience created at

  11. Department of Homeland Security: Assessments of Selected Complex Acquisitions

    Science.gov (United States)

    2010-06-01

    known as Tucson-1 and Ajo -1. The program plans to complete testing before DHS approves deployment at additional Block 1 sites. Tucson-1, the...acceptance of the initial Block 1 systems at the Tucson-1 and Ajo -1 sites by March 2011. The Block 1 program baseline currently requires the

  12. Strengthening Homeland Security through Improved Foreign Language Capability

    Science.gov (United States)

    2011-12-01

    sports, medicine, or poetry , for example. DTRA interpreters are sometimes assigned to support a ―civilian Executive Interpreter.‖ Defense Threat...about two pounds.‖ In addition, RACSPC students participate in memory -enhancing drills and games.172 In addition to completing RACSPC, linguists...original order from memory . Once the reversal is complete, students then translate the words, and again proceed in both orders. According to the

  13. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... HSAR 3002.101 and usage conventions. Add a new HSAR subpart 3003.10, Contractor Code of Business Ethics... follows: Subpart 3003.10--Contractor Code of Business Ethics and Conduct Sec. 3003.1003 Requirements. 3003.1004 Contract clauses. Subpart 3003.10--Contractor Code of Business Ethics and Conduct 3003.1003...

  14. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Kimberly A. [Georgia Inst. of Technology, Atlanta, GA (United States)

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

  15. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    Science.gov (United States)

    2012-12-01

    many sick, elderly , and bed-ridden people in hospitals and nursing homes who suffered a horrific fate as staff members chose not to evacuate patients...Plot,” International Centre For Political Violence and Terrorism Research, http://www.pvtr.org/pdf/GlobalAnalysis...due to either the lack of capability or the means to acquire it. This was the case at the St. Rita’s nursing home, where 40 of the 60 residents died

  16. Changing Homeland Security: The Year in Review - 2008

    Science.gov (United States)

    2009-01-01

    Pirates and their small boats have moved from Disney amusement to global menace. Thomas Jefferson wrote that a politician looks forward only to...firebombing attacks in Santa Cruz. Members of an animal rights group were the suspected perpetrators. This was a significant event for the area

  17. U.S. Biodefense & Homeland Security: Toward Detection & Attribution

    Science.gov (United States)

    2006-12-01

    None of these contained the bacteria. A common source eluded investigators even though every item was traced back to its origin. The lettuce and...possessed or worked with Ames. As a result, efforts were taken to identify the different genomes linked to its use in these laboratories.192 Dugway...of events and to facilitate coordinated response.”301 The goal is to “collect, assemble , and analyze a wide range of relevant information and make

  18. Securing Nuclear and Radiological Material in the Homeland

    Science.gov (United States)

    2007-03-01

    John Walker Lindh allegedly told interrogators that battlefield rumors suggested that a biological attack was expected to be a “second wave...al- Qa`ida attack. 10/3/2002 “American Taliban” John Walker Lindh , citing “battlefield rumors” “US biological attack imminent -- Taliban...iafrica.com, 12 December 2001; “Walker Lindh : Al Qaeda Planned More Attacks,” CNN, 3 October 2002 post-2001 Chemical/ Biological French Interior

  19. Quantitative Risk Analysis for Homeland Security Resource Allocation

    Science.gov (United States)

    2006-12-01

    156 A. Papoulis , Probability, Random Variables and Stochastic Processes, (New York: McGraw-Hill, 1965), chapters 5-7. 44 max ( ) D R D...Report. New York: W.W. Norton. Papoulis , A. 1965. Probability, Random Variables and Stochastic Processes. New York: McGraw-Hill. Pate-Cornell

  20. Nuclear and Solar Energy: Implications for Homeland Security

    Science.gov (United States)

    2008-12-01

    Hirschman Index HVDC High-Voltage Direct Current IPCC Intergovernmental Panel on Climate change NCEP National Commission on Energy Policy NRC...transmission lines will carry the load to the customers along high voltage direct current ( HVDC ) lines. HVDC lines lose 3% of

  1. Southwest Hispanic Community -- The Absence of Homeland Security Threats

    Science.gov (United States)

    2012-12-01

    150 U.S. Navy, “9 - Foreign Language,” Navy Equal Opportunity (EO) Policy, OPNAVINST 5354.1F, 2007. 151 “Yo No Hablo Espanol : BUT I AM STILL LATINO...DAMN IT!!!!” Yahoo! Contributor Network, accessed September 27, 2012, http://voices.yahoo.com/yo-no-hablo- espanol -but-am-still-latino-damn-it- 73855

  2. Unmanned Aircraft Systems: A Logical Choice for Homeland Security Support

    Science.gov (United States)

    2011-12-01

    AIRSPACE Some have likened the airspace above the U.S. to a soap opera plot due to its complexity and elaborate structure.59 However, understanding its...applicable to define an ELOS for UAS.” 23 Fourth, there is a public education aspect to UAS integration that analysts claim requires attention. The

  3. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    Science.gov (United States)

    2007-11-02

    Number Author(s) Project Number Task Number Work Unit Number Performing Organization Name(s) and Address(es) General Accouting Office, PO Box 37050...budget. As GAO’s long term budget simulation notes, known demographic trends and rising health care costs will place unprecedented pressures on our...non-partisan, and non-ideological audits, investigations and evaluations. We currently have over 60 congressional requests to conduct reviews in

  4. Leveraging Social Media to Engage the Public in Homeland Security

    Science.gov (United States)

    2009-09-01

    date information. “Our team knew where we could buy gas, we knew what roads were open and most importantly, we knew who needed help and where they were...more complete warning messages and how the public utilizes social media as an emergency moves into an extended length of time—do their habits ...so that they can define their needs.  You need to get to “Robust Statement of Needs” 84 Enablers  New Generation (The Millennials ) are

  5. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-03-04

    ...). The HSAAC provides advice and recommendations to the Secretary and senior leadership on matters... Management Institute and the higher education community to support Presidential Policy Directive 8...

  6. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    organizations. Similar to the previous discussion of conflict biguity in public policy implementation, these factors are the degree of agreement ree of...4. Networking and Collaboration Laurence O’Toole has written of the growing need for and the emergence of networks and collaboration in public...there is no unifying theory about networking in the public sector, Nancy Roberts c 242 Laurence O’Toole, Jr., “Treating Networks Seriously: Practical

  7. 7 CFR 2.32 - Director, Office of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ..., disseminate and store USDA intelligence requirements and convey information to the intelligence community. (3...). (8) Administer a competitive grant program to support the development and expansion of advanced... veterinarians; administer a competitive grant and low-interest loan assistance program to assist States...

  8. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    elevated insulin levels are a telltale sign of insulin resistance. Insulin resistance creates significant fat accumulation around the abdomen . This...THE POLICIES AND POLITICS OF OBESITY: WHO MADE U.S. FAT ? .....45  A.  FRITZ HABER AND THE HABER BOSCH PROCESS .........................46  B...Compared to Percent Calories from Fat Among U.S. Adults. Screen shot provided by a Dr. Robert Lustig lecture ..................83  Figure 11.  Loss and

  9. War in the Atlantic: A Historical Case of Homeland Security

    Science.gov (United States)

    2015-09-01

    costs . The staggering toll of the “unrestricted” campaign, amplified by rising numbers of neutral vessels that ceased to operate, given the risk, far...outweighed the expense of convoys. As shipping attrition began to foreclose Britain’s ability to fight the war, the costs of the convoy system became...sighting to attack.33 Initially, convoys were arranged for ships inbound to Great Britain only, as the most pressing need was for supplies from abroad

  10. Congressional Oversight of Homeland Security: Help or Hinderance?

    Science.gov (United States)

    2012-12-01

    gather the information required to conduct effective oversight many intelligence abuses ensued. The 1972 Watergate scandal was the event that...Political Science 28, no. 1 (1984): 166. 6 scandals or failures for its 65-year history. Although there have been instances where fire alarm...their findings. The Iran-Contra scandal occurred less than ten years later. Furthermore, the intelligence community’s slow adaptation to the post

  11. Department of Homeland Security Cyber Resilience Review (Case Study)

    Science.gov (United States)

    2014-01-23

    results CERT® Operational Resilience: Manage, Protect, and Sustain Twitter #CERTopRES © 2013 Carnegie Mellon University CRR Benefits Participating...Management CTRL Controls Management VM Vulnerability Management IM Incident Management SCM Service Continuity Management EXD External...established in Asset Management benefits the organization as it manages changes. CERT® Operational Resilience: Manage, Protect, and Sustain

  12. Expanding the Role of Emergency Medical Services in Homeland Security

    Science.gov (United States)

    2013-03-01

    Medical Services FEMA Federal Emergency Management Agency FBI Federal Bureau of Investigation H1N1 Influenza a Virus HIPAA Health Information...Smyth, William G. Manley, Daniel E. Summers, Nels D. Sanddal, Teri L. Sanddal, et al. “Realities of Rural Emergency Medical Services Disaster

  13. Will Climate Change the Future of Homeland Security

    Science.gov (United States)

    2016-09-01

    Brookings-Bern Project on Internal Displacement, 2013), 9–18, http://www.brookings.edu/~/media/ research /files/ papers /2013/1/30-arctic-alaska-bronen...nuclear sources, and renewable energy resources (hydro, wind, biomass, geothermal , and solar power) are also used in the generation of... Research Program, 2014), 119, http://nca2014.globalchange.gov/ report/sectors/ energy . 57 According to Climate Change Impacts in the United States

  14. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    hard way and his lack of crisis communication skills was a career ender for him during Hurricane Katrina (MSNBC, 2005). In contrast, former New...disruptions,” that is those game -changing events where your messages may no longer work. That leads into the final recommendation of having a contingency...Winning in the no-spin era by someone who knows the game . New York: Free Press. CNN. (2007, May 7). Greensburg focuses on rebuilding. Retrieved January

  15. Public Health Specializations and Education Needs to Support Homeland Security

    Science.gov (United States)

    2006-03-01

    Hazmat 1/1 100 4 Health Consultant Interface with Law Enforcement 1/1 100 4 Hematology 1/1 100 4 Hospital Administrators 3/7 43 30 Hospital Safety...Forensics Experts 0/1 0 4 Grants Oversight 0/2 0 9 Hazmat 1/1 100 4 Health Consultant Interface with Law Enforcement 0/1 0 4 Hematology 0/1 0 4...Specializations Required Workforce Gaps (yes/no) Other Comments Veterinarians Yes Epidemiologists Yes Physicians No Plenty of physicians available but

  16. The National Guard: A Future Homeland Security Paradigm?

    Science.gov (United States)

    2007-11-02

    Arabia (1995); bombing of a U.S. military complex “Khobar Towers” in Saudi Arabia (1996); U.S. Embassy bombings in Nairobi, Kenya and Dar Ex Salaam...on the U.S, its forces, and allies. The Triad continues to be the foundation of America’s national strategy of deterrence. The Triad consists of...ballistic missile submarines, land- based intercontinental ballistic missiles and long-range bombers. Each component, or leg, of the Triad provides a

  17. Homeland Security Organizations: Design Contingencies in Complex Environments

    Science.gov (United States)

    2011-09-01

    in Charge Cell OMT Organization and Management Theory OPERATIONS Section Los Angeles County Operational Area Unified Command- Operations Section...and management theory” ( OMT ). The OMT literature suggests that no single organizational design is optimal in all situations, nor do all designs...referred to as Organization and Management Theory ( OMT )—have been extensively examined in the literature, using at various times and by different

  18. Homeland Security: Federal Assistance Funding and Business Opportunities

    Science.gov (United States)

    2003-08-14

    for many states under the State Single Point of Contact ( SPOCs ) section available at [http://www.whitehouse.gov/omb/grants/spoc.html]. A similar...government, employees and students at U.S. educational institutions, and other eligible members of the general public. Background information on the RaDiUS

  19. Japan as a Paradigm for U.S. Homeland Security

    Science.gov (United States)

    2006-12-01

    the dead cause the everyday problems of the living and emphasizes liberation from stress through meditation .118 In 1984, he and his wife started...www.jijigaho.or.jp/ app /0404/eng/iraq01.html (accessed December 6, 2005). 196 Prime Minister of Japan and His Cabinet, Japan’s Assistance for the...Defense Forces to assist in Reconstruction.” http://www.jijigaho.or.jp/ app /0404/eng/iraq01.html (accessed December 6, 2005). Kaplan, David E. and

  20. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-10-09

    ..., student veterans, and recent graduates to jobs at DHS; how to use social media and other means of..., and other Minority Serving Institutions know of and take advantage of DHS internship and job...

  1. Developing the Bench: Building An Effective Homeland Security Undergraduate Program

    Science.gov (United States)

    2008-03-01

    University Savannah State University Jacksonville State University AMERICAN PUBLIC UNIVERSITY University of Maryland University College...DATA University Courses American Public University - Charles Town, WV Emergency Planning Emergency Response to Terrorism Chemical...0195095707 AMERICAN PUBLIC UNIVERSITY 0195142632 University of Central Missouri 0195158342 Empire State College 0195332474 Virginia Commonwealth

  2. The Strategic Value of Humanitarian Immigration Policy Toward Homeland Security

    Science.gov (United States)

    2008-03-01

    E. Beutler, James N. Breckenridge, and Philip Zimbardo (New York, NY: Oxford University Press, 2007), 14-15. 6 Ibid., 16-17. 11 that is worth...ed. Bruce Bongar, Lisa M. Brown, Larry E. Beutler, James N. Breckenridge, and Philip Zimbardo . New York, NY: Oxford University Press, 2007...the United States. In his recent book Winning the Right War, Philip Gordon writes: It is difficult today to imagine a world without the Islamist

  3. Homeland Security Department: FY2008 Request for Appropriations

    Science.gov (United States)

    2007-05-17

    body imaging; explosive trace detection portal machines; cast and prosthetic device scanners; and bottled liquid scanners. The effectiveness of these...BioWatch programs, which will be transferred from the Science and Technology Directorate (S&T), and the National Biosurveillance Integration System (NBIS...left in place following the reorganizations mentioned above. One notable exception was the transfer of the Biosurveillance sub-program to the new Office

  4. 78 FR 39301 - Committee name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-07-01

    ... recommendations to the Secretary and senior leadership on matters relating to student and recent graduate... Centers of Academic Excellence cybersecurity programs to the higher education community; how to define...

  5. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Coast of the United States in 2005. In January 2013, U.S. Senator Harry Reid compared Hurricane Sandy to Hurricane Katrina. His comments indicated...163 Bruce Alpert , “Reid Says Hurricane Katrina was ‘Nothing in Comparison’ to Sandy,” The Times- Picayne...PAGE INTENTIONALLY LEFT BLANK 79 LIST OF REFERENCES Alpert , Bruce. “Reid Says Hurricane Katrina was ‘Nothing in Comparison’ to Sandy.” The Times

  6. Overview of Infrastructure Science and Analysis for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-07-21

    This presentation offers an analysis of infrastructure science with goals to provide third-party independent science based input into complex problems of national concern and to use scientific analysis to "turn down the noise" around complex problems.

  7. The Affordable Care Act: A Prescription for Homeland Security Preparedness?

    Science.gov (United States)

    2014-09-01

    Eddie Reed, Eduardo J. Simoes, and M. M. Engel . “When Chronic Conditions Become Acute: Prevention and Control of Chronic Diseases and Adverse...Fewer Insured and $8.4 Billion Less in Federal Payments.” Health Affairs 32, no. 6 (2013): 1030–1036. Ringel, Jeanne S., Federico Girosi, Amado

  8. Does Homeland Security Constitute an Emerging Academic Discipline?

    Science.gov (United States)

    2013-03-01

    disciplines that make it easy for them to find a job and receive good pay. 7. Entrepreneurs will enter and firms will expand in sectors that promise to be...publication 12. Percent female students 3. Percent faculty with grants 13. Percent international students 4. Awards per allocated faculty member 14...time to degree 7. Percent female faculty 17. Percent students with academic plans 8. Average GRE scores 18. Student work space 9. Percent 1st-yr

  9. Legislating Civil Service Reform: The Homeland Security Act of 2002

    Science.gov (United States)

    2006-06-22

    stage for future agency-specific chapters for NASA , the SEC, DOD and DHS. 4. The George W. Bush Administration The George W. Bush administration came...they are going to follow your line because you control their pay, their determination at will, their layoff .”97 There were also questions about whether

  10. U.S. Army Special Forces and Homeland Security Operations

    Science.gov (United States)

    2008-03-01

    This force helped rescue people on the coast, but was soon diverted to help search for victims in New Orleans.96 Governor Arnold Schwarzenegger ...Governor, Arnold Schwarzenegger . September 1, 2005. 98 “Guard Adding 18 to Katrina Effort,” Deseret News (Salt Lake City, UT) September 14, 2005. 99...Governor, Arnold Schwarzenegger . September 1, 2005. 75 McGillis, Gay. “Organizing NORTHCOM for Success: A Theater Special Operations Command

  11. The Italian Army’s Role in Homeland Security

    Science.gov (United States)

    2003-04-07

    Roma: Stato Maggiore dell’Esercito – Reparto Impiego delle Forze, Ottobre 2000), B/1-2. 6 Norme di principio sulla disciplina militare, Legge 382, art...contrastare la criminalita` organizzata in Sicilia. Decreto-legge 349 (25 Luglio 1992). Norme di principio sulla disciplina militare. Legge 382 (11 Luglio

  12. The Development and Recognition of Homeland Security Law

    Science.gov (United States)

    2007-03-01

    and I owe them a continuing debt of gratitude. Finally, and most importantly, I am eternally grateful to my wife, Annie; son, Jim; and daughter...at the state or federal level, is familiar with the requirements of Freedom of Information Acts or state sunshine laws. Judge Advocates have the

  13. Enhancing Public Helicopter Safety as a Component of Homeland Security

    Science.gov (United States)

    2016-12-01

    the area to assist with neutralizing the threat, and they can also extract injured people for immediate medical care. Search and rescue is another...on scene reported the weather conditions as “very bad with strong winds, cold temperatures, snow or sleet, and...responders who run toward an active shooting scene while others are running away. This type of training cannot be applied to aviation since there is usually

  14. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    Science.gov (United States)

    2012-03-01

    James Monroe in 1823 ( Martin , n.d.). There is also political doctrine, such as egalitarianism a “political doctrine that holds that all people...be able to engage a larger stakeholder community and avoid the need for a huge new bureaucracy (Linde, O’Brien, Lindstrom , Spiegeleire, Vayrynen...Presentation, Osan Air Force Base, South Korea. 74 Linde, E., O’Brien, K., Lindstrom , G., Spiegeleire, S., Vayrynen, M., & de Vries, H. (2002

  15. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    ... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment... will serve as an ex officio member of the Compensation Committee. DHS will provide technical staff to...

  16. Improved Security Models & Protocols in Online Mobile Business Financial Transactions

    OpenAIRE

    Sreeramana Aithal

    2017-01-01

    Chapter I : Introduction to Mobile Business and Mobile Banking Chapter II : Review of Literature on Mobile Business Technology, Mobile Banking Services & Security Chapter III : Research Objectives and Methodology Chapter IV : Results and Discussion Chapter V : Summary and Conclusions Bibliography

  17. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  18. DEVELOPING OF THE SYSTEM INFORMATION SECURITY MODEL FOR COMPUTER TRAINING COMPLEX

    Directory of Open Access Journals (Sweden)

    Viktoriia N. Kovalchuk

    2010-08-01

    Full Text Available The regulatory documents regarding the computer training rooms and information communication technologies in respect to the information safety are being analyzed in the given paper. The model of information security system of the computer training complex is developed. In particular there are considered the requirements to the security system construction, its functioning and the stages of the lifecycle. The analysis of typical risks for the information resources is conducted, the main methods of their information security are offered.

  19. Information Governance: A Model for Security in Medical Practice

    OpenAIRE

    Patricia A.H. Williams

    2007-01-01

    Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the r...

  20. Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models

    Energy Technology Data Exchange (ETDEWEB)

    Droppo, James G.

    2006-07-01

    The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and