WorldWideScience

Sample records for national defense

  1. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  2. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  3. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  4. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  5. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  6. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  7. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  8. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  9. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  10. Defense.gov Special Report: A Nation's Gratitude

    Science.gov (United States)

    Department of Defense Submit Search 'A Nation's Gratitude' White House hosts dinner to honor veterans of nation's gratitude to the men and women who served in Operations Iraqi Freedom and New Dawn. Top Stories , First Lady Host Iraq War Veterans Iraq War Veterans Attend Reception More Photos A Nation's Gratitude

  11. Assessment of Ukranian National Defense Policy

    Science.gov (United States)

    2012-03-09

    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  12. 77 FR 16651 - National Defense Resources Preparedness

    Science.gov (United States)

    2012-03-22

    ... commercial sectors for research and development and for acquisition of materials, services, components, and... by a small business supplier or subcontractor in accordance with section 108(b)(2) of the Act, 50 U.S... the National Labor Relations Board, the Federal Labor Relations Authority, the National Mediation...

  13. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  14. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  15. Needed: Reincarnation of National Defense Education Act of 1958

    Science.gov (United States)

    Harris, Mary M.; Miller, James R.

    2005-01-01

    This paper reviews the historical and current response of the United States to threats to its world leadership in scientific endeavors, with particular attention to the National Defense Education Act of 1958. The current status of the United States in mathematics, science, and engineering education is reviewed with respect to K-12 student…

  16. REKONSTRUKSI PEMBENTUKAN NATIONAL CYBER DEFENSE SEBAGAI UPAYA MEMPERTAHANKAN KEDAULATAN NEGARA

    Directory of Open Access Journals (Sweden)

    Nur Khalimatus Sa'diyah

    2016-09-01

    Full Text Available Anxiety against cybercrime has become the world’s attention, but not all countries in the world is giving greater attention to the problem of cybercrime by having the rule and unless the developed countries and some developing countries. The purpose of this research is in order to find, examine and analyze the efforts of the Indonesia Government in the protection of State secrets information and data, also to research the forms of Indonesia Government resistance against cyber war. Find a reconstruction of national cyber defense formation or cyber army in an attempt to defend the sovereignty of the country. In Act No. 3 of 2002 on State Defense, it has been established that the threat in the country’s defense system consists of a military threat and non-military threat, which is including cyber threats. One of the negative effects of the cyber world development via the internet among other things is a crime in violation of the law cybercrime, where when the escalation widely spread, it could have threatened the country’s sovereignty, territorial integrity or the safety of the nation. In an effort to combat against the attacks in this virtual world, will require an agency that is in charge of being the world’s bulwark cyber or cyber defense.

  17. Malpractice liability and defensive medicine: a national survey of neurosurgeons.

    Directory of Open Access Journals (Sweden)

    Brian V Nahed

    Full Text Available BACKGROUND: Concern over rising healthcare expenditures has led to increased scrutiny of medical practices. As medical liability and malpractice risk rise to crisis levels, the medical-legal environment has contributed to the practice of defensive medicine as practitioners attempt to mitigate liability risk. High-risk specialties, such as neurosurgery, are particularly affected and neurosurgeons have altered their practices to lessen medical-legal risk. We present the first national survey of American neurosurgeons' perceptions of malpractice liability and defensive medicine practices. METHODS: A validated, 51-question online-survey was sent to 3344 practicing U.S. neurosurgeon members of the American Association of Neurological Surgeons, which represents 76% of neurosurgeons in academic and private practices. RESULTS: A total of 1028 surveys were completed (31% response rate by neurosurgeons representing diverse sub-specialty practices. Respondents engaged in defensive medicine practices by ordering additional imaging studies (72%, laboratory tests (67%, referring patients to consultants (66%, or prescribing medications (40%. Malpractice premiums were considered a "major or extreme" burden by 64% of respondents which resulted in 45% of respondents eliminating high-risk procedures from their practice due to liability concerns. CONCLUSIONS: Concerns and perceptions about medical liability lead practitioners to practice defensive medicine. As a result, diagnostic testing, consultations and imaging studies are ordered to satisfy a perceived legal risk, resulting in higher healthcare expenditures. To minimize malpractice risk, some neurosurgeons have eliminated high-risk procedures. Left unchecked, concerns over medical liability will further defensive medicine practices, limit patient access to care, and increase the cost of healthcare delivery in the United States.

  18. Malpractice liability and defensive medicine: a national survey of neurosurgeons.

    Science.gov (United States)

    Nahed, Brian V; Babu, Maya A; Smith, Timothy R; Heary, Robert F

    2012-01-01

    Concern over rising healthcare expenditures has led to increased scrutiny of medical practices. As medical liability and malpractice risk rise to crisis levels, the medical-legal environment has contributed to the practice of defensive medicine as practitioners attempt to mitigate liability risk. High-risk specialties, such as neurosurgery, are particularly affected and neurosurgeons have altered their practices to lessen medical-legal risk. We present the first national survey of American neurosurgeons' perceptions of malpractice liability and defensive medicine practices. A validated, 51-question online-survey was sent to 3344 practicing U.S. neurosurgeon members of the American Association of Neurological Surgeons, which represents 76% of neurosurgeons in academic and private practices. A total of 1028 surveys were completed (31% response rate) by neurosurgeons representing diverse sub-specialty practices. Respondents engaged in defensive medicine practices by ordering additional imaging studies (72%), laboratory tests (67%), referring patients to consultants (66%), or prescribing medications (40%). Malpractice premiums were considered a "major or extreme" burden by 64% of respondents which resulted in 45% of respondents eliminating high-risk procedures from their practice due to liability concerns. Concerns and perceptions about medical liability lead practitioners to practice defensive medicine. As a result, diagnostic testing, consultations and imaging studies are ordered to satisfy a perceived legal risk, resulting in higher healthcare expenditures. To minimize malpractice risk, some neurosurgeons have eliminated high-risk procedures. Left unchecked, concerns over medical liability will further defensive medicine practices, limit patient access to care, and increase the cost of healthcare delivery in the United States.

  19. Militias: Exploring Alternative Force Structures for National Defense

    Science.gov (United States)

    2014-06-01

    development in the art of warfare and 15 Mario A. Fumerton, “Rondas Campesinas in the Peruvian Civil War: Peasant Self-defense Organizations in...tr ai ni ng N at io na l l ev el su pp or t N at io na l d riv en id eo lo gy Pr e- ex is tin g ci vi lia n sk ill s Primary category...national framework providing guidance for the militia groups to act. This variable varies within and across cases, and will be discussed further

  20. Measuring Changes in Service Costs to Meet the Requirements of the 2002 National Defense Authorization Act

    National Research Council Canada - National Science Library

    Shirley, Chad; Ausink, John; Baldwin, Laura H

    2004-01-01

    The National Defense Authorization Act for Fiscal Year 2002 sets forth a series of goals for the Department of Defense to reduce the cost of the services it buys over a ten-year period through changes...

  1. 77 FR 16205 - National Defense Stockpile Market Impact Committee Request for Public Comments on the Potential...

    Science.gov (United States)

    2012-03-20

    .... The Committee is seeking public comments on the potential market impact of the material research and... Defense Stockpile Market Impact Committee Request for Public Comments on the Potential Market Impact of... National Defense Stockpile Market Impact Committee, co-chaired by the Departments of Commerce and State, is...

  2. 77 FR 42271 - National Defense Stockpile Market Impact Committee Request for Public Comments on the Potential...

    Science.gov (United States)

    2012-07-18

    ... comments on the potential market impact associated with the two material research and development projects... Defense Stockpile Market Impact Committee Request for Public Comments on the Potential Market Impact of... National Defense Stockpile Market Impact Committee, co-chaired by the Departments of Commerce and State, is...

  3. The National Research Council study: "Making sense of ballistic missile defense"

    Science.gov (United States)

    Wilkening, Dean A.

    2014-05-01

    This chapter explains and summarizes the main findings of a recent National Research Council study entitled Making Sense of Ballistic Missile Defense: An Assessment of Concepts and Systems for U.S. Boost-Phase Missile Defense in Comparison to Other Alternatives.

  4. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  5. Defensive medicine among neurosurgeons in the Netherlands: a national survey.

    Science.gov (United States)

    Yan, Sandra C; Hulsbergen, Alexander F C; Muskens, Ivo S; van Dam, Marjel; Gormley, William B; Broekman, Marike L D; Smith, Timothy R

    2017-12-01

    In defensive medicine, practice is motivated by legal rather than medical reasons. Previous studies have analyzed the correlation between perceived medico-legal risk and defensive behavior among neurosurgeons in the United States, Canada, and South Africa, but not yet in Europe. The aim of this study is to explore perceived liability burdens and self-reported defensive behaviors among neurosurgeons in the Netherlands and compare their practices with their non-European counterparts. A survey was sent to 136 neurosurgeons. The survey included questions from several domains: surgeon characteristics, patient demographics, type of practice, surgeon liability profile, policy coverage, defensive practices, and perception of the liability environment. Survey responses were analyzed and summarized. Forty-five neurosurgeons filled out the questionnaire (response rate of 33.1%). Almost half (n = 20) reported paying less than 5% of their income to annual malpractice premiums. Nearly all respondents view their insurance premiums as a minor or no burden (n = 42) and are confident that in their coverage is sufficient (n = 41). Most neurosurgeons (n = 38) do not see patients as "potential lawsuits". Relative to their American peers, Dutch neurosurgeons view their insurance premiums as less burdensome, their patients as a smaller legal threat, and their practice as less risky in general. They are sued less often and engage in fewer defensive behaviors than their non-European counterparts. The medico-legal climate in the Netherlands may contribute to this difference.

  6. By Land or By Sea: An Analysis of National Missile Defense Options

    National Research Council Canada - National Science Library

    Altman, Bern J

    2000-01-01

    In conformance with the National Missile Defense (NMD) Act of 1999, the United States is pursuing the path to fielding a system capable of providing protection for all of the United States against a limited ballistic missile attack...

  7. The National Guard Ballistic Missile Defense Mission minutemen at the Orgital Plane

    OpenAIRE

    Trenary, Ralph Hiram

    2004-01-01

    Approved for public release; distribution is unlimited This thesis examines the decision to assign the Ballistic Missile Defense mission to units of the Colorado and Alaska National Guard. The history of the Nike Ajax, Nike Hercules, Sentinel and Safeguard programs are examined to identify the origins of support for this decision. First-hand sources provide evidence that the National Guard performance in the Nike air defense program is a record of parity and some superiority to equivalent ...

  8. National Security and the Industrial Policy Debate: Modernizing Defense Manufacturing

    Science.gov (United States)

    1991-05-01

    47. 49. Michael Schroeder and Walecia Konrad, " Nucor : Rolling Right Into Steel’s Big Time," Business Week 19 Nov. 1990: 76. 50. Clyde V. Prestowitz...Defense." The I Industrial Policy Debate. Ed. Chalmers Johnson. San Francisco: ICS Press, 1984. i 74I Schroeder, Michael and Walecia Konrad. " Nucor

  9. 75 FR 43944 - Defense Science Board; Task Force on Trends and Implications of Climate Change for National and...

    Science.gov (United States)

    2010-07-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...

  10. 75 FR 34438 - Defense Science Board Task Force on Trends and Implications of Climate Change for National and...

    Science.gov (United States)

    2010-06-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...

  11. National Defense Center of Excellence for Research in Ocean Sciences

    Science.gov (United States)

    1999-09-01

    aureas , vancomycin-resistant Enterococcus and other bacteria in in vitro tests. ATI contacted Tripler Army Medical Hospital in Honolulu and Walter...an HP 712/60 workstation and is mostly written in C+ except for the radar cross- section model, which is written in FORTRAN. The output of the model...Congressional Record, contained a section entitled Research, Development, Test, and Evaluation, Defense Agencies and provided for ".. .an additional amount

  12. National Security Issues and Defense Reform in Ukraine

    National Research Council Canada - National Science Library

    Maslovskyi, Sergiy

    2007-01-01

    .... As an important component of national development, military reforms have being initiated and aimed at the transformation of all levels of Ukraine's military organization, which includes the Armed...

  13. National Security Issues and Defense Reform in Ukraine

    National Research Council Canada - National Science Library

    Maslovskyi, Sergiy

    2007-01-01

    ...: is the Ukrainian nation able to build a modern, independent, and democratic state? Ukraine has created new opportunities for solving current problems, crafting an active foreign and domestic policy based on universal democratic values...

  14. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  15. White Book on National Defense (Republic of Argentina)

    Science.gov (United States)

    1999-01-01

    Geografico Militar. Military Geographic Institute. XXIV IM: Infanteria de Marina. Marine Corps. INA: Institute Nacional de Agua y Ambiente. National Water and...Brazil . Chile and the US) allowed to put an end to the confrontation and, through a regional peacekeeping force (the MOMEP), prevented an armed...democratic Nations’ shared interests, was taken in the // Summit of the Americas, held in April 1998 in Santiago de Chile . In this summit of heads of State

  16. Tendencies of development of defensive-industrial complex of lead nations of the world

    Directory of Open Access Journals (Sweden)

    O. F. Salnikova

    2014-11-01

    Full Text Available In the article the analysis of development of defensive-industrial complex of lead nations of the world is conducted , namely the United States of America and countries-participants of European Union and NATO. Also in the the article control system of the defensive-industrial policy of the USA is schematically represented. The analysed materials gave an opportunity to draw conclusion, that guidance of military industrial concerns of the USA managed clearly to define acceptable strategies of restructuring and successfully to realize them, integrating new enterprises with the use of front-rank methods of organizational management that became the basic engine of development of defensive industry of the USA. To the number of basic progress of defensive-industrial complex of lead nations-participants of NATO and EU trends it is possible to take the following: creation of the large defensive-industrial integrated structures on development and production of modern armament and military technique on national, transnational and transatlantic levels; rapprochement of military and civil sectors of economy; large corporations go across from mass to the «flexible» production, due to what it is possible to arrive at high efficiency of production of weapons and military equipment even at small series; through diminishing of volumes of assignations on the purchase of defensive products and considerable complication of the modern systems of armament, some leading defensive firms-contractors began to work from the production of armament and military technique to scientific research-and-developments.

  17. Divided by Loyalty: The Debate Regarding Loyalty Provisions in the National Defense Education Act of 1958

    Science.gov (United States)

    Maher, Brent D.

    2016-01-01

    The National Defense Education Act (NDEA) of 1958 was the first federal investment in low-interest student loans and became a precedent for expansion of student loans in the Higher Education Act of 1965. In its controversial loyalty provisions, the NDEA required loan recipients to affirm loyalty to the U.S. government. Between 1958 and 1962,…

  18. DOD Future Energy Resources. Proceedings of Workshops Held at the National Defense University

    National Research Council Canada - National Science Library

    2003-01-01

    .... In response to concerns about U.S. and global depletion of cheap petroleum resources and the particular impact of this on future DOD energy resource needs, a series of workshops were held during 2002 and 2003 at National Defense University...

  19. CONSTITUTIONAL ORDER, NATIONAL DEFENSE AND CI IL MILITARY RELATIONS

    Directory of Open Access Journals (Sweden)

    Miguel Navarro Meza

    2017-12-01

    Full Text Available Since the beginning of its independent life, the several constitutions of Chile have included concepts related ith defence, sovereignty and national security. At the same time, those constitutional texts have recognized the existence of the armed organizations of the State, under the generic name of Public Force and have addressed their relation ith the political authorities, both ith the Executive and Congress. his has not been a permanent process. n the contrary, it has suffered upheavals and bac steps, but the general path has been clear and progressive. For one thing, the norms related to the armed forces have been, in comparative terms, more thoroughly developed than those referring to defence, sovereignty and national security. hen, from the 1833 Constitution, the basic elements of the relations bet een the political authorities and the military have evolved so as to ensure a genuine civilian control over the military, in line ith contemporary theories of civilDmilitary relations. he ay in hich the 1980 Constitution addresses national security and defence and its provisions that recognize the existence of the armed forces, their missions and roles and that regulate the ay in hich they relate to the political authorities, are the result of a progressive development starting ith the Provisional Constitution of 1811 up to present times, and they are completely in line ith current theories about civilDmilitary relations in democracy.

  20. TOOLS OF KNOWLEDGE DISSEMINATION WITHIN A NATIONAL DEFENSE INSTITUTION FOR INNOVATION, TECHNOLOGY AND SCIENCE

    Directory of Open Access Journals (Sweden)

    Edson Aparecida de Araújo Querido Oliveira

    2006-11-01

    Full Text Available This paper describes and analyzes in a National Defense Institution for Innovation, Technology and Science its tools of knowledge dissemination. The methodology contemplates the period of 2004 and 2005. Qualitative and quantitative information orientate the research in order to understand focal aspects on knowledge dissemination, in comparison with theoretical references of renowned authors and other elaborated research searching for elements to perform an organizational diagnosis, focused on the knowledge dissemination as well as on the forces which promote or obstruct the organizational development. Conclusions are that the tools of knowledge dissemination must suitable to spread the tacit knowledge in such a way as the explicit ones and that, in a National Defense Institution, other important aspects must be considered, a time that, being the spread knowledge of wrong form can, besides bringing damages for the organization, to compromise the national sovereignty.

  1. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  2. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  3. A PROMISING MECHANISM FOR FINANCING THE NATIONAL ECONOMY, SECURITY AND DEFENSE OF UKRAINE

    OpenAIRE

    Dmitry Klinovoi, Peter Rogov

    2017-01-01

    The principles of the permanent financing of necessities of state development, national safety and defensive due to forming of legal institute of civil property on natural resources and mechanisms of the sovereign financing by receivabless from natural rent are grounded here. The description of sovereign fund and fund of civil dividends as institutes of accumulation of state facilities and management of assets is given here.

  4. Redefining The U.S.-Japan Alliance: Tokyo’s National Defense Program

    Science.gov (United States)

    1994-11-01

    affairs to a member of the National Diet , a Fulbright Fellow at Tokyo University, a reporter for Defense News and the Iwate Nippo, and Tokyo...process of introducing electoral reform in the Diet has already split the LDP and led to the recent series of coalitions. The process of implementing this...what Malaysian Prime Minister Mahathir Mohamad told Japanese Prime Minister Murayama in August 1994. See "Mahathir to Japan: ’Drop War Apologies, Join

  5. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  6. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  7. Internal Controls and Compliance with Laws and Regulations for the National Defense Stockpile Transaction Fund Financial Statements for FY 1996

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The Chief Financial Officers Act of 1990, as amended by the Federal Financial Management Act of 1994, requires an annual audit of revolving funds such as the National Defense Stockpile Transaction Fund...

  8. 32 CFR 621.1 - Loan of Army/Defense Logistics Agency (DLA) owned property for use at national and State...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Loan of Army/Defense Logistics Agency (DLA) owned... of Army/Defense Logistics Agency (DLA) owned property for use at national and State conventions. (a... and facilities on loan. (iv) Costs of packaging, packing, transportation and handling from source of...

  9. Economic Assessment of FMDv Releases from the National Bio and Agro Defense Facility

    Science.gov (United States)

    Pendell, Dustin L.; Marsh, Thomas L.; Coble, Keith H.; Lusk, Jayson L.; Szmania, Sara C.

    2015-01-01

    This study evaluates the economic consequences of hypothetical foot-and-mouth disease releases from the future National Bio and Agro Defense Facility in Manhattan, Kansas. Using an economic framework that estimates the impacts to agricultural firms and consumers, quantifies costs to non-agricultural activities in the epidemiologically impacted region, and assesses costs of response to the government, we find the distribution of economic impacts to be very significant. Furthermore, agricultural firms and consumers bear most of the impacts followed by the government and the regional non-agricultural firms. PMID:26114546

  10. 77 FR 29525 - National Defense Transportation Day and National Transportation Week, 2012

    Science.gov (United States)

    2012-05-18

    ... accelerate our economy in the years ahead. The need for strong and sustainable transportation networks has... remains strong, and our journey moves forward. In recognition of the importance of our Nation's transportation infrastructure, and of the men and women who build, maintain, and utilize it, the Congress has...

  11. 75 FR 28181 - National Defense Transportation Day and National Transportation Week, 2010

    Science.gov (United States)

    2010-05-20

    ... we thank the dedicated men and women who build and maintain it. In times of peace and national crisis... areas. Today, smart, sustainable development, coupled with quality public transportation, has created... bringing neighborhoods together, we can continue to increase access to good jobs, affordable housing, safe...

  12. Reconstituting National Defense: The New U.S. National Security Strategy

    Science.gov (United States)

    1991-09-30

    been indisposed to such monitoring; Americans have been ethnocentric , averse to "spying," and poorly suited to long-term development of a reli- able...reductions in CIA staffing .2 3 Shifting American intelligence from the Soviet threat toward other nations, and from military targets to heightened interest...also part of our ethnocentric psyche: Ameri- can technology is best, we ardently believe, and shall prevail. The cautionary note needed to be sounded

  13. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  14. "Music for a National Defense": Making Martial Music during the Anti-Japanese War

    Directory of Open Access Journals (Sweden)

    Joshua H. Howard

    2014-12-01

    Full Text Available This article examines the popularization of “mass songs” among Chinese Communist troops during the Anti-Japanese War by highlighting the urban origins of the National Salvation Song Movement and the key role it played in bringing songs to the war front. The diffusion of a new genre of march songs pioneered by Nie Er was facilitated by compositional devices that reinforced the ideological message of the lyrics, and by the National Salvation Song Movement. By the mid-1930s, this grassroots movement, led by Liu Liangmo, converged with the tail end of the proletarian arts movement that sought to popularize mass art and create a “music for national defense.” Once the war broke out, both Nationalists and Communists provided organizational support for the song movement by sponsoring war zone service corps and mobile theatrical troupes that served as conduits for musicians to propagate their art in the hinterland. By the late 1930s, as the United Front unraveled, a majority of musicians involved in the National Salvation Song Movement moved to the Communist base areas. Their work for the New Fourth Route and Eighth Route Armies, along with Communist propaganda organizations, enabled their songs to spread throughout the ranks.

  15. In Defense of the National Labs and Big-Budget Science

    Energy Technology Data Exchange (ETDEWEB)

    Goodwin, J R

    2008-07-29

    The purpose of this paper is to present the unofficial and unsanctioned opinions of a Visiting Scientist at Lawrence Livermore National Laboratory on the values of LLNL and the other National Labs. The basic founding value and goal of the National Labs is big-budget scientific research, along with smaller-budget scientific research that cannot easily be done elsewhere. The most important example in the latter category is classified defense-related research. The historical guiding light here is the Manhattan Project. This endeavor was unique in human history, and might remain so. The scientific expertise and wealth of an entire nation was tapped in a project that was huge beyond reckoning, with no advance guarantee of success. It was in many respects a clash of scientific titans, with a large supporting cast, collaborating toward a single well-defined goal. Never had scientists received so much respect, so much money, and so much intellectual freedom to pursue scientific progress. And never was the gap between theory and implementation so rapidly narrowed, with results that changed the world, completely. Enormous resources are spent at the national or international level on large-scale scientific projects. LLNL has the most powerful computer in the world, Blue Gene/L. (Oops, Los Alamos just seized the title with Roadrunner; such titles regularly change hands.) LLNL also has the largest laser in the world, the National Ignition Facility (NIF). Lawrence Berkeley National Lab (LBNL) has the most powerful microscope in the world. Not only is it beyond the resources of most large corporations to make such expenditures, but the risk exceeds the possible rewards for those corporations that could. Nor can most small countries afford to finance large scientific projects, and not even the richest can afford largess, especially if Congress is under major budget pressure. Some big-budget research efforts are funded by international consortiums, such as the Large Hadron Collider

  16. 77 FR 64311 - Potential Market Impact of the Proposed Fiscal Year 2014 Annual Materials Plan; National Defense...

    Science.gov (United States)

    2012-10-19

    ... actually be associated with the two material research and development projects will depend on the market... Market Impact of the Proposed Fiscal Year 2014 Annual Materials Plan; National Defense Stockpile Market... Stockpile Market Impact Committee, co-chaired by the Departments of Commerce and State, is seeking public...

  17. 'Defense-in-Depth' Laser Safety and the National Ignition Facility

    International Nuclear Information System (INIS)

    King, J.J.

    2010-01-01

    The National Ignition Facility (NIF) is the largest and most energetic laser in the world contained in a complex the size of a football stadium. From the initial laser pulse, provided by telecommunication style infrared nanoJoule pulsed lasers, to the final 192 laser beams (1.8 Mega Joules total energy in the ultraviolet) converging on a target the size of a pencil eraser, laser safety is of paramount concern. In addition to this, there are numerous high-powered (Class 3B and 4) diagnostic lasers in use that can potentially send their laser radiation travelling throughout the facility. With individual beam paths of up to 1500 meters and a workforce of more than one thousand, the potential for exposure is significant. Simple laser safety practices utilized in typical laser labs just don't apply. To mitigate these hazards, NIF incorporates a multi layered approach to laser safety or 'Defense in Depth.' Most typical high-powered laser operations are contained and controlled within a single room using relatively simplistic controls to protect both the worker and the public. Laser workers are trained, use a standard operating procedure, and are required to wear Personal Protective Equipment (PPE) such as Laser Protective Eyewear (LPE) if the system is not fully enclosed. Non-workers are protected by means of posting the room with a warning sign and a flashing light. In the best of cases, a Safety Interlock System (SIS) will be employed which will 'safe' the laser in the case of unauthorized access. This type of laser operation is relatively easy to employ and manage. As the operation becomes more complex, higher levels of control are required to ensure personnel safety. Examples requiring enhanced controls are outdoor and multi-room laser operations. At the NIF there are 192 beam lines and numerous other Class 4 diagnostic lasers that can potentially deliver their hazardous energy to locations far from the laser source. This presents a serious and complex potential

  18. Evolution of Both Host Nation Police Advisory Missions and the Support Provided by the Department of Defense

    Science.gov (United States)

    2012-05-17

    American forces to train throughout the nation, often in partnership with the Panamanian Defense Forces (PDF), until the rise in Manuel Noriega’s power and...Peace and Stability Operations". Annika Hansen, From Congo to Kosovo: Civilian Police in Peace Operations (New York, NY: Oxford University Press...Soldier Support for Operation Uphold Democracy." Armed Forces & Society 23, no. 1 (Fall 1996): 81-96. Hansen, Annika. From Congo to Kosovo: Civilian

  19. FOREIGN RELATIONS: Kwajalein Atoll Is the Key U.S. Defense Interest in Two Micronesian Nations

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Republic of the Marshall Islands (RMI). The Compact provided for the continuation of a defense arrangement that has connected the United States and these Pacific islands since the end of World War II...

  20. The Evolving Role of the Army National Guard in Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Rooney, Joseph

    2004-01-01

    .... To further unify the military effort U.S. Northern Command (NORTHCOM) has been created as a North American combatant command charged with the dual missions of homeland defense and civil support...

  1. Fact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals

    Science.gov (United States)

    2016-05-25

    ought to be adopted, in part stemming from differing views on the nature of the organizational challenges besetting the Department of Defense. The...House Armed Services Committee formally expresses its diagnosis of the defense reform challenge in H.Rept. 114-537, stating: The committee recognizes...this critical organizational framework, while still preserving its spirit and intent. For example, we can see in some areas how the pendulum between

  2. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  3. The Evolution of Missile Defense Plan from Bush to Obama. Implications for the National Security of Romania

    Directory of Open Access Journals (Sweden)

    Ruxandra-Laura BOSILCA

    2012-06-01

    Full Text Available In 2011 Romania officially became part of the Obama administration’s missile defense system in Europe which has significantly changed the strategic military relations both in Europe and worldwide. The Bush approach has been revised and progress in several sections has been achieved, both strategically and technically. For Romania, the participation in the missile defence plan, ensures more solid security guarantees, especially in an unpredictable and risk-prone international environment where the U.S. reconsiders its presence in Europe under the pressure of the economic crisis and of a relative decline in power; it has also become a more visible actor – alongside Bulgaria – which were initially excluded by the Bush missile defence plan. This paper’s purpose is to review the main evolutions of the missile defense plan from the Bush to the Obama administration and to outline its implications on the national security of Romania.

  4. Army National Guard Air Defense Artillery Modernization: A Vision for the Future

    Science.gov (United States)

    1994-05-15

    plan to replace Stinger Under Armor (SUA) for the ARNG, and no guarantee that the BSFV will be in the future ARNG force, divisional assets will remain...Ballistic Missile SUA Stinger Under Armor TAA Total Army Analysis TAAD Theater Area Air Defense TASM Tactical Air-to-Surface Missiles TBM Tactical

  5. U.S. National Defense Acquisition and Budgetary Policy in an International Perspective

    Science.gov (United States)

    2011-12-03

    arsenal. London, UK: Sphere. (Original work published 1981). Kalinina, N., & Kozyulin, V. (2010, Winter). Russian defense industry: Feet of clay ...Mirages over the Andes: Peru , France, the United States, and military jet procurement in the 1960s. The Pacific Historical Review, 71(2), 269–300

  6. International Dynamics of U.S. National Defense Acquisition and Budgetary Policy

    Science.gov (United States)

    2012-04-30

    2010, Winter). Russian defense industry: Feet of clay . Security Index, 1(90), 31–46. Kan, S. (2002). CRS report for Congress—Taiwan: Major U.S...military (pp. 1–44). Carlisle, PA: U.S. Army Strategic Studies Institute. Le Roy, F. (2002, May). Mirages over the Andes: Peru , France, the United States

  7. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  8. Results from a national survey of Crown prosecutors and defense counsel on impaired driving in Canada: a "System Improvements" perspective.

    Science.gov (United States)

    Robertson, Robyn; Vanlaar, Ward; Simpson, Herb; Boase, Paul

    2009-01-01

    This article summarizes the main findings from a study designed to examine the legal process in Canada as it applies to alcohol-impaired driving from the point of view of Crown prosecutors and defense counsel, and to identify evidentiary or procedural factors that may impact the legal process, the rights of the accused, and interactions of all parts in the legal process. The data in this study were collected by means of a survey that was mailed out to the population of Crown prosecutors and defense counsel in Canada. In total, 765 prosecutors and 270 defense lawyers or an estimated 33% of all Canadian prosecutors and 15% of defense lawyers completed and returned the questionnaire. The "systems improvement" paradigm was used to interpret the findings and draw conclusions. Such an approach acknowledges the importance of the context in which countermeasures are implemented and delivered and the structures or entities used to deliver countermeasures to a designated target group. Results on type of charges and breath alcohol concentration, caseload, case outcomes, case preparation time, conviction rate at trial and overall conviction rate, reasons for acquittals and time to resolve cases are described. The findings from this national survey suggest that there are important challenges within the criminal justice system that impede the effective and efficient processing of impaired driving cases. Some of these challenges occur as a function of practices and policies, while others occur as a function of legislation. This study illustrates that a "system improvements" approach that acknowledges the importance of all elements of the criminal justice system and the interaction between those elements, can be beneficial in overcoming the alcohol-impaired driving problem.

  9. Toward the Printed World: Additive Manufacturing and Implications for National Security (Defense Horizons, Number 73)

    Science.gov (United States)

    2012-09-01

    allowing it to dry or baking it in a kiln . A modern factory would take a block of raw material and then use machinery to pare away un- necessary...implication that has not yet been discussed with- in AM technology circles is personalized body enhance- ment. Inorganic hybrid materials ( electrical , optical...equipment eadS aircraft and defense company envisiontec dental equipment manufacturer fisher-Price toy company ford Car manufacturer general electric

  10. Summary of the 2018 National Defense Strategy of the United States of America

    Science.gov (United States)

    2018-01-01

    multilateral organizations, non-governmental organizations, corporations , and strategic influencers provide opportunities for collaboration and...competition requires the seamless integration of multiple elements of national power—diplomacy, information, economics, finance , intelligence, law...national power—diplomacy, information, economics, finance , intelligence, law enforcement, and military. More than any other nation, America can

  11. ROMANIAN NATIONAL DEFENSE PLANNING. ARGUMENTS IN FAVOR OF A MORE REALISTIC APPROACH

    Directory of Open Access Journals (Sweden)

    Mirel Alexandru TARIUC

    2013-01-01

    Full Text Available The whole Europe is undergoing a very difficult economic period. That has led in most cases to a decrease in defense spending. Romania is confronted with a similar situation and that makes it impossible for it to reduce the gap with the strong states, despite the facts provided by the speeches of politicians. Therefore, it is imperative to have a serious strategic analysis, balancing the political objectives with the real possibilities of a still precarious economy. A partial solution to resolving this situation can be the ‘smart defense’ concept, implemented wherever and as much possible.

  12. Internal Controls over the Department of Defense Transit Subsidy Program within the National Capital Region

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Pfeil, Lorin T; Gaich, Walter J; Lawrence, Demetria; Hart, Marcia T; Dickison, Ralph W; Varner, Pamela; Foth, Suellen

    2007-01-01

    DoD personnel with oversight responsibility and personnel working within the DoD transit subsidy program for the National Capital Region should read this report to obtain information about internal...

  13. Massively Parallel Computing at Sandia and Its Application to National Defense

    National Research Council Canada - National Science Library

    Dosanjh, Sudip

    1991-01-01

    Two years ago, researchers at Sandia National Laboratories showed that a massively parallel computer with 1024 processors could solve scientific problems more than 1000 times faster than a single processor...

  14. The US National Resources Defense Council/Soviet Academy of Sciences Nuclear Test Ban Verification Project

    International Nuclear Information System (INIS)

    Cochran, T.B.

    1989-01-01

    The first week in September 1987 was an extraordinary one for arms control verification. As part of the co-operative Test Ban Verification Project of the Natural Resources Defense Council (NRDC) and the Soviet Academy of Sciences, fourteen American scientists from the Scripps Institution of Oceanography (at the University of California- San Diego), University of Nevada-Reno and the University of Colorado went to the region of the Soviet's principal nuclear test site near Semipalatinsk. Together with their Soviet counterparts from the Institute of Physics of the Earth (IPE) in Moscow, they fired off three large chemical explosions. The purpose of these explosions was to demonstrate the sensitivity of the three seismic stations surrounding the test site, to study the efficiency with which high-frequency seismic waves propagate in the region, and to study differences between chemical explosions, nuclear explosions and earthquakes in order more firmly to establish procedures for verification of a nuclear test ban. This paper presents a review of the results of these experiments, an update on the status of the joint project, and a review of the significance of high frequency seismic data to test ban verification

  15. Defense Planning for National Security: Navigation Aids for the Mystery Tour

    Science.gov (United States)

    2014-03-01

    on the first game day of the regu- lar National Football League season, there is no reli- able and adequate substitute for the real thing. Actual...London, UK: Pimlico, 1999; Clifford J. Rogers, War Cruel and Sharp: English Strategy under Edward III, 1327-1360, Woodbridge, UK: The Boy- dell Press

  16. 76 FR 58204 - TRICARE; Changes Included in the National Defense Authorization Act for Fiscal Year 2010...

    Science.gov (United States)

    2011-09-20

    ... the period in which the beneficiary's disability determination is pending before the Social Security... purchase Medicare Part B to cover the retroactive period lost their TRICARE eligibility during that period... the national government and the States, or on the distribution of power and responsibilities among the...

  17. The Participation of Our Schools in the Defense and Diffusion of National Culture

    Science.gov (United States)

    Cassanova, Manuel Gonzales

    1977-01-01

    Recounts a paper presented to the 18th Congress of the Centre International De Liaison Des Ecoles De Cinema et Television (CILECT) in 1976. Contends that American interests are infiltrating countries which are unable to defend against such threats to their national identity and analyzes "Sesame Street" to illustrate this contention. (MH)

  18. Growing Defense Production in Newly Industrializing Countries: Impact on U.S. National Security.

    Science.gov (United States)

    1983-05-01

    other war reserves. Nations on the periphery of the region such as Thailand, Singapore, and Malaysia , all members of the Association of Southest Asian...Eastern Economic Review, October 23, 1981, p. 26. 14Isby, p. 61. 15" Samsung Group Set to Merge Three of its Subsidiaries," The Asian Wall Street Journal

  19. Environmental and social risks: defensive National Environmental Policy Act in the US Forest Service

    Science.gov (United States)

    Michael J. Mortimer; Marc J. Stern; Robert W. Malmsheimer; Dale J. Blahna; Lee K. Cerveny; David N. Seesholtz

    2011-01-01

    The National Environmental Policy Act (NEPA) and its accompanying regulations provide a spectrum of alternative analytical pathways for federal agencies proposing major actions that might significantly impact the human environment. Although guidance from the President's council on Environmental Quality suggests the decision to develop an environmental impact...

  20. OCP TECD Report - TARDEC Blast Mitigation Program (BMP) and National Defense Industrial Association (NDIA) Michigan (MI) Chapter Cooperative Research and Development Agreement (CRADA) Summary

    Science.gov (United States)

    2017-09-26

    Standard, MIL-STD-3058, Occupant-Centric Protection for Military Ground Vehicles. 15. SUBJECT TERMS Occupant Centric Platform Technology-Enabled...Capability Demonstration (OCP TECD), Occupant-centric, Occupant Protection , Underbody Blast, National Defense Industrial Association (NDIA...Cooperative Research and Development Agreement (CRADA) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF

  1. Return to Play and Decreased Performance After Anterior Cruciate Ligament Reconstruction in National Football League Defensive Players.

    Science.gov (United States)

    Read, Connor R; Aune, Kyle T; Cain, E Lyle; Fleisig, Glenn S

    2017-07-01

    Anterior cruciate ligament (ACL) injuries occur commonly in football. Recent work has reported ACL reconstruction (ACLR) as one of several orthopaedic procedures with unfavorable outcomes for professional athletes. The performance impact to defensive players after surgery has not been quantified. To quantify the effect of ACLR on the performance of defensive players by comparing them to a cohort of matched controls as well as to measure the effect of ACLR on athletes' career length in the National Football League (NFL). Case-control and cohort study; Level of evidence, 3. Thirty-eight NFL defensive players with a history of ACLR from 2006 to 2012 were identified. For each injured player, a matched control player was identified. Demographic and performance statistics were collected from the online NFL player database. Players who returned after ACLR (n = 23) were compared with players who did not return (n = 15) using t tests and chi-squared analyses. Similarly, players who returned after ACLR (n = 23) were compared with their matched controls with t tests and chi-squared analyses. Two-way repeated-measures analysis of variance was utilized to test for significant differences between performance before and after the season of the injury for the players in the ACLR group who returned (n = 23) and for their matched controls. Kaplan-Meier analysis was performed to test for differences in the rate of retirement between the groups. For all analyses, P values <.05 were considered significant. Approximately 74% (28/38) of athletes who underwent ACLR returned to play at least 1 NFL game, and 61% (23/38) successfully returned to play at least half a season (ie, 8 games). Athletes in the ACLR group who returned retired from the NFL significantly sooner and more often after surgery than their matched controls. In the seasons leading up to their injury, athletes who successfully returned to play started a greater percentage of their games (81%) and made more solo tackles per

  2. DOD Future Energy Resources. Proceedings of Workshops Held at the National Defense University

    Science.gov (United States)

    2003-05-01

    fermentation of the cellulosic and hemicellulosic sugars, lignin remains as a residue. ( Lignin does not contain any sulfur and is consequently called “clean...Patzek, “Ethanol From Corn : Clean Renewable Fuel for the Future, or Drain on Our Resources and Pockets?” Working paper , University of California...to DOD and national policy, nor did he address any of the concerns presented in the opening premise of this paper . Instead, he stated his views as

  3. Climate Change, National Security, and the Quadrennial Defense Review. Avoiding the Perfect Storm

    Science.gov (United States)

    2008-01-01

    consider political, military, and ethical implications of attempting to manage the world’s climate.” Advocates of such projects seldom consider the...national security threats.183 Second, the DoD must accomplish a holistic, futuristic, threat-based, causation-oriented, proactive, and ethical examination...human-made capital. Importantly, the eq- uitable, effective, and sustainable application of the Kantian principles represent the best hope for countering

  4. FY2013 National Defense Authorization Act: Selected Military Personnel Policy Issues

    Science.gov (United States)

    2013-01-16

    publicly support or condemn certain sexual practices on the grounds of conscience or religious tenets. Arguably, this is to protect the free speech ...Treatment is generally begun by age 3½ and consists of up to 40 hours per week of intensive therapy for two years or longer. It aims to teach social, motor ...outreach on mental health and substance use disorders and traumatic brain injury ( TBI ) in members of the National Guard and Reserves and their family

  5. Brazil’s National Defense Strategy: Prospects for the Twenty-First Century

    Science.gov (United States)

    1993-06-01

    also see Everardo Backheuser, Curso de Geopolitica Geral e do Brasil, (Rio de Janeiro: Biblioteca do ’Ex~rcito, 1952). 21 chance of dislocation of the...34, Latin American Weekly Report, 14 January 1993, WR-93-02, 14. 46 virtually irresistible, and the reality is that Brazil is stumbling with its national...cut off Brazil’s primary source of oil. Brazilian arms manufactures, such as EMBRAER, ENGESA, and AVIBRAS, went deep into debt, teetering on virtual

  6. The epidemiology of self-defense gun use: evidence from the National Crime Victimization Surveys 2007-2011.

    Science.gov (United States)

    Hemenway, David; Solnick, Sara J

    2015-10-01

    To describe the epidemiology of self-defense gun use (SDGU) and the relative effectiveness of SDGU in preventing injury and property loss. Data come from the National Crime Victimization Survey for 2007-2011, focusing on personal contact crimes. For property loss, we examined incidents where the intent was to steal property. Multivariate analyses controlled for age, gender of offender and victim, if offender had a gun, urbanicity, and thirteen types of self-protective action. Of over 14,000 incidents in which the victim was present, 127 (0.9%) involved a SDGU. SDGU was more common among males, in rural areas, away from home, against male offenders and against offenders with a gun. After any protective action, 4.2% of victims were injured; after SDGU, 4.1% of victims were injured. In property crimes, 55.9% of victims who took protective action lost property, 38.5 of SDGU victims lost property, and 34.9% of victims who used a weapon other than a gun lost property. Compared to other protective actions, the National Crime Victimization Surveys provide little evidence that SDGU is uniquely beneficial in reducing the likelihood of injury or property loss. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  8. SWOT Analysis of Alternative Development Strategies for Dealing in Defense of the Nation in Papua Disintegration

    Directory of Open Access Journals (Sweden)

    Vita Bayu Indah Yanti

    2013-05-01

    Full Text Available As one of Indonesia’s provinces located in the most eastern part of the country, Papua’s tumultuous history has resulted in the granting of a special autonomy under Law Number 21 Year 2001 on Special Autonomy for Papua Province. The special autonomy u is a social contract between the Republic of Indonesia (Republic of Indonesia to Papua since the 1960s. Conflict in Papua has existed at the time of Papua became part of the Republic of Indonesia in 1963. The conflict in Papua is an intrastate conflict and need to be resolved so that no large material losses and social cohesion. Good understanding of national security in particular to address the threat, in this case is also related to economic security is imperative.

  9. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  10. Evaluation of the Transfer of International Traffic in Arms Regulations-Controlled Missile Defense Technology to the National Aeronautics and Space Administration (NASA)

    Science.gov (United States)

    2015-07-13

    120.19) occurs. He said even where an export does occur, in many cases transfers between U.S. Government agencies are exempted under ITAR 126.4 from...services is not an export under the ITAR and, to the extent it is, that any exemptions to license requirements are properly applied. Importantly, the...National Defense Authorization Act for Fiscal Year 2015,” we conducted an evaluation of the transfer of specific International Traffic in Arms

  11. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  12. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

  13. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  14. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  15. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  16. Defense Horizons. No. 73. September 2012. Toward the Printed World: Additive Manufacturing and Implications for National Security

    Science.gov (United States)

    2012-09-01

    allowing it to dry or baking it in a kiln . A modern factory would take a block of raw material and then use machinery to pare away un- necessary...implication that has not yet been discussed with- in AM technology circles is personalized body enhance- ment. Inorganic hybrid materials ( electrical , optical...equipment eadS aircraft and defense company envisiontec dental equipment manufacturer fisher-Price toy company ford Car manufacturer general electric

  17. The ideology of nationalism – a solid foundation of a state or ethnic defensive reaction of the body?

    Directory of Open Access Journals (Sweden)

    K. V. Nastoyashha

    2016-04-01

    Full Text Available Traditionally peaceful, absolutely not militant, not an imperial nation is actively protected. In this sense, the Revolution of Dignity and further actions in Crimea and in the East, consolidated the country, has updated the matrix of national culture, which has demonstrated the ability to active resistance on the basis of the dominant features of our national character – cordocentrism, ontological optimism and community centrism. In this sense, the ideology of nationalism as a magnifying glass always reflects the main features of the national character, reinforces and legalizes them in a political context. Peculiar to Ukrainians individualism, introversion, community centrism, tolerance, aesthetics, cordocentrism, thrift and ontological optimism are fully duplicated by Ukrainian nationalism. Nationalism and conservatism are different from liberalism and socialism that always exist together. Their specific character, ideology, morality and politics are very different, depending on whose values of the nation are the basis of nationalism and which religion and culture are going to preserve. However, a challenge to build a nation-state may obtain a broad approval of the masses if there are not so many nationalist parties, but many patriotic political forces of central spectrum of the political field. This is due to the fact that nationalism as an ideology has inherent unresolvable contradiction. We also need to acknowledge the weakness and disunity of the nationalist movement, which could not affect the popularity of nationalist ideas among the masses.

  18. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  19. Sandia National Laboratories: Sandia National Laboratories: Missions:

    Science.gov (United States)

    Defense Systems & Assessments: About Us Sandia National Laboratories Exceptional service in ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology

  20. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  1. Cyberspace as a Theater of Conflict: Federal Law, National Strategy and the Departments of Defense and Homeland Security

    Science.gov (United States)

    2007-06-01

    short period of time. When web search organizations canvas the web looking for sites to catalog, they will discover your systems and create registry... Fingerprint & DNA Databases, INTERPOL & National Law Enforcement Communication Systems, Firearms Registration Records, Drivers License, Birth

  2. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  3. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  4. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  5. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  6. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  7. 论国防概念在信息化战争条件下的再认识%Reflection on the definition of national defense in the information-based war

    Institute of Scientific and Technical Information of China (English)

    赵岚

    2012-01-01

      The modernization of national defense has encountered many new issues in the information warfare. Therefore, a fresh recognition and comprehensive interpretation of the concept of national defense is required be it for its objectives or purposes. To enhance the dynamic adaptation of national defense concept to the diverse circumstances, it counts to focus on the subject of national defense and to highlight the idea of sovereignty.%  在信息化战争条件下,目前对国防定义的认识与我国现代国防建设的发展已经出现不相适应的情况,无论是从国防对象还是国防目的来看都有需要重新认识和全新解读的必要。为了适应不断发展的实际变化,回归国防主体,突出主权概念,有利于增强国防定义的动态适应性。

  8. 关于国防生专业知识学习的认知与思考%Cognition and Thinking about the Professional Knowledge Learning of National Defense Students

    Institute of Scientific and Technical Information of China (English)

    刘洋

    2016-01-01

    依托普通高等教育培养军队干部是我军为适应信息化战争对人才的需求做出的重要举措。然而现实中,国防生总体学习情况并不理想。解决国防生专业学习问题,进一步提高人才培养质量,对服务国防现代化建设具有重要意义。本文从分析现象产生原因出发,提出具体的解决方案,论述国防生在校期间学习问题。%Cultivating military cadres depending on higher education is an important measure. It fits in with the demand that our military needs talents in IT-based warfare. But in reality, the overall learning of national defense students is not ideal. This paper is aimed at solving learning problems of national defense students in their major, thus further improving the quality of talent development, which is of great significance to national defense modernization construction. Based on analyzing causes of the situation, the paper puts forward specific solutions and deals with the learning problems of national defense students in college.

  9. Law No.13.192 workers that execute radiological services it state included in the advantage of the laws 9.940 and 9744 to civil or militaries employers belonging to Ministry of National Defense

    International Nuclear Information System (INIS)

    1962-01-01

    The civil and military officials that lend services in dependences of the Ministry of National Defense in the tasks of radiological services were applied in the compute to be carried out the legal norms referred to effects of their retirement [es

  10. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  11. Cooperation between National Defense Medical College and Fukushima Medical University in thyroid ultrasound examination after the Fukushima Daiichi nuclear power plant disaster

    International Nuclear Information System (INIS)

    Yamamoto, Yoritsuna; Fujita, Masanori; Tachibana, Shoich; Morita, Koji; Hamano, Kunihisa; Hamada, Koji; Uchida, Kosuke; Tanaka, Yuji

    2013-01-01

    Fukushima Daiichi Nuclear Power Plant was utterly destroyed by The Great East Japan Earthquake which happened on March 11, 2011, and followed by radioactive contamination to the surrounding areas. Based on the known radioactive iodine ("1"3"1I) which led to thyroid cancer in children after the Chernobyl nuclear power plant disaster in 1986, children living in Fukushima should be carefully observed for the development of thyroid cancer. Fukushima Prefecture and Fukushima Medical University started ''Fukushima Health Management Survey'' in May 2011, which includes screening for thyroid cancer by ultrasonography (Thyroid Ultrasound Examination). Thyroid Ultrasound Examination would cover roughly 360,000 residents aged 0 to 18 years of age at the time of the nuclear disaster. The initial screening is to be performed within the first three years after the accident, followed by complete thyroid examinations from 2014 onwards, and the residents will be monitored regularly thereafter. As Thyroid Ultrasound Examination is being mainly performed by medical staff at Fukushima Medical University, there is insufficient manpower to handle the large number of potential examinees. Thus, specialists of thyroid diseases from all over Japan have begun to support this examination. Six endocrinologists including the authors belonging to the National Defense Medical College are cooperating in part of this examination. This paper briefly reports the outline of Thyroid Ultrasound Examination and our cooperation. (author)

  12. Self-affirmation increases defensiveness toward health risk information among those experiencing negative emotions: Results from two national samples.

    Science.gov (United States)

    Ferrer, Rebecca A; Klein, William M P; Graff, Kaitlin A

    2017-04-01

    Self-affirmation can promote health behavior change and yield long-term improvements in health via its effect on receptiveness to risk information in behavior change interventions. Across 2 studies, we examined whether the emotional state of the person presented with health risk information moderates self-affirmation effectiveness. Data were collected from 2 U.S. national samples (n = 652, n = 448) via GfK, an Internet-based survey company. Female alcohol consumers completed an emotion induction (fear, anger, or neutral). They then completed a standard self-affirmation (or no-affirmation) essay-writing task, and subsequently received a health message linking alcohol to breast cancer. There was a significant interaction between emotion and self-affirmation conditions, such that self-affirmation reduced the specificity of health behavior change plans among those experiencing negative emotion (Study 1: B = -0.55, p emotion (or anger). Mediation analyses limited to the self-affirmation condition revealed an indirect effect of negative emotion condition on health behavior change plan specificity via self-affirmation ratings of essay content in Study 1: β = 0.04, p = .041. The salutary effect of self-affirmation on plan specificity was reversed with negative emotion. These findings may be attributed to disruption of the self-affirmation process. Individuals who enter interventions using self-affirmation in a negative emotion state may be less prepared to benefit from other intervention content, and may even be less likely to change health behaviors as a result of the intervention. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  13. The waste isolation pilot plant. Permanent isolation of defense transuranic waste in deep geologic salt. A national solution and international model

    International Nuclear Information System (INIS)

    Franco, Jose; Van Luik, Abraham

    2015-01-01

    The Waste Isolation Pilot Plant is located about 42 kilometers from the city of Carlsbad, New Mexico. It is an operating deep geologic repository in bedded salt 657 meters below the surface of the Chihuahuan desert. Since its opening in March of 1999, it has received about 12,000 shipments totaling about 91,000 cubic meters of defense related transuranic (TRU) wastes. Twenty-two sites have been cleaned up of their defense-legacy TRU waste. The WIPP's shipping program has an untarnished safety record and its trucks and trailers have safely traveled the equivalent of about 60 round-trips to the Moon. WIPP received, and deserved, a variety of safety accolades over its nearly 15 year working life. In February of 2014, however, two incidents resulted in a major operational suspension and reevaluation of its safety systems, processes and equipment. The first incident was an underground mining truck fire, followed nine days later by an airborne radiation release incident. Accident Investigation Board (AIB) reports on both incidents point to failures of plans, procedures and persons. The AIB recommendations for recovery from both these incidents are numerous and are being carefully implemented. One major recommendation is to no longer have different maintenance and safety requirements for nuclear handling equipment and mining equipment. Maintenance and cleanliness of mining equipment was cited as a contributing cause to the underground fire, and the idea that there can be lesser rigor in taking care of mining equipment, when it is being operated in the same underground space as the waste handling equipment, is not tenable. At some point in the future, the changes made in response to these two incidents will be seen as a valuable lesson learned on behalf of future repository programs. WIPP will once again be seen as a ''pilot'' in the nautical sense, in terms of 'showing the way' - the way to a national and international radioactive waste

  14. The waste isolation pilot plant. Permanent isolation of defense transuranic waste in deep geologic salt. A national solution and international model

    Energy Technology Data Exchange (ETDEWEB)

    Franco, Jose; Van Luik, Abraham [US Department of Energy, Carlsbad, NM (United States). Carlsbad Field Office

    2015-07-01

    The Waste Isolation Pilot Plant is located about 42 kilometers from the city of Carlsbad, New Mexico. It is an operating deep geologic repository in bedded salt 657 meters below the surface of the Chihuahuan desert. Since its opening in March of 1999, it has received about 12,000 shipments totaling about 91,000 cubic meters of defense related transuranic (TRU) wastes. Twenty-two sites have been cleaned up of their defense-legacy TRU waste. The WIPP's shipping program has an untarnished safety record and its trucks and trailers have safely traveled the equivalent of about 60 round-trips to the Moon. WIPP received, and deserved, a variety of safety accolades over its nearly 15 year working life. In February of 2014, however, two incidents resulted in a major operational suspension and reevaluation of its safety systems, processes and equipment. The first incident was an underground mining truck fire, followed nine days later by an airborne radiation release incident. Accident Investigation Board (AIB) reports on both incidents point to failures of plans, procedures and persons. The AIB recommendations for recovery from both these incidents are numerous and are being carefully implemented. One major recommendation is to no longer have different maintenance and safety requirements for nuclear handling equipment and mining equipment. Maintenance and cleanliness of mining equipment was cited as a contributing cause to the underground fire, and the idea that there can be lesser rigor in taking care of mining equipment, when it is being operated in the same underground space as the waste handling equipment, is not tenable. At some point in the future, the changes made in response to these two incidents will be seen as a valuable lesson learned on behalf of future repository programs. WIPP will once again be seen as a ''pilot'' in the nautical sense, in terms of 'showing the way' - the way to a national and international radioactive waste

  15. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  16. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  17. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  18. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  19. Discussion of the Necessity of Psychological Warfare Education in National Defense Education in Universities%试论普通高校国防教育中开展心理战教育的必要性

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2012-01-01

    现代心理战的战略地位对普通高校的国防教育提出了新的要求,必须将心理战教育纳入国防教育的内容体系之中,这是信息化时代的要求、国家心理安全的要求.也是大学生自身特性的要求,由此,才能使国防教育更好地为国家安全服务。%The strategic position of modern psychological warfare defense for college education put forward new demands, psychological warfare must be the content of education in national defense education system, is the requirement of the information age mental state security, and also the requirements of the students" characteristics, so that we can make education better serve the defense of national security.

  20. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  1. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  2. Challenges to Military Operations in Support of U.S. National Interests. Volume 1: Executive Summary (Defense Science Board 2007 Summer Study)

    Science.gov (United States)

    2008-12-09

    be an ideal " franchise model" across localities critical to DOD missions. RECOMMENDATION: DOMESTIC INTELLIGENCE • The Under Secretary of Defense...along with engaging capabilities of new philanthropy and social entrepreneurship (such as the Gates Foundation). Marketing and entertainment talent can

  3. Circular from January 26, 2004, taken for the enforcement of the by-law from January 26, 2004, relative to the national defense secrecy protection in the domain of nuclear materials protection and control; Circulaire du 26 janvier 2004 prise pour l'application de l'arrete du 26 janvier 2004 relatif a la protection du secret de la defense nationale dans le domaine de la protection et du controle des matieres nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-15

    The by-law of January 26, 2004 gives a regulatory foundation to the classification of sensible informations relative to the security and physical protection of nuclear materials. This circular recalls, in this framework, the conditions of implementation of the regulation relative to the protection of national defense secrecies in the domain of the protection of nuclear facilities and materials. (J.S.)

  4. Fortresses and Icebergs: The Evolution of the Transatlantic Defense Market and the Implications for U.S. National Security Policy. Volume 1: Study Findings and Recommendations

    Science.gov (United States)

    2009-01-01

    public data, World Wide Web research, and any reports and analysis developed by that nation’s government or by other defense experts and analysts...europe.org/Objects/2/Files/ WEB %20Common%20Indus- try%20Standards.pdf . 37 “Siemens settles bribery cases,” International Herald Tribune (Dec. 15, 2008...GD European Land Combat Systems to oversea GDLS’ European subsidiaries. Subsidiaries shown below. Santa Barbara Sistemas SA Spain Acquired from

  5. Developing a national food defense guideline based on a vulnerability assessment of intentional food contamination in Japanese food factories using the CARVER+Shock vulnerability assessment tool.

    Science.gov (United States)

    Kanagawa, Yoshiyuki; Akahane, Manabu; Hasegawa, Atsushi; Yamaguchi, Kentaro; Onitake, Kazuo; Takaya, Satoshi; Yamamoto, Shigeki; Imamura, Tomoaki

    2014-12-01

    The awareness of food terrorism has increased following the September 11, 2001 terrorist attacks in New York City, United States, and many measures and policies dealing with this issue have been established worldwide. Suspected deliberate food-poisoning crimes have occurred in Japan, although they are not regarded as acts of food terrorism. One area of concern is that the small- to medium-sized companies that dominate Japan's food industry are extremely vulnerable to deliberate food poisoning. We conducted a literature research on food defense measures undertaken by the World Health Organization and in the United States and Europe. Using the Carver+Shock vulnerability assessment tool, eight food factories and related facilities in Japan were evaluated and we found the level of awareness of food defense to be low and the measures inappropriate. On the basis of this evaluation, we developed a set of guidelines that Japanese food companies can use to help develop their food defense strategies and to serve as a reference in considering specific measures.

  6. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  7. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  8. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  9. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  10. Enhancing U.S. Defenses Against Terrorist Air Attacks

    National Research Council Canada - National Science Library

    2004-01-01

    .... Air Force, law enforcement authorities, the Federal Aviation Administration, airport security personnel, and many other agencies share responsibility for closing gaps in our national air defenses...

  11. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  12. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  13. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  14. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  15. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  16. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  17. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  19. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  20. 75 FR 20578 - Availability of the Fiscal Year 2008 Defense Threat Reduction Agency Services Contracts Inventory

    Science.gov (United States)

    2010-04-20

    ... DEPARTMENT OF DEFENSE Office of the Secretary Availability of the Fiscal Year 2008 Defense Threat... amended by the National Defense Authorization Act for Fiscal Year 2008 (NDAA 08) section 807, the Director of DTRA and the Office of the Director, Defense Procurement and Acquisition Policy, Office of...

  1. Nation

    DEFF Research Database (Denmark)

    Østergaard, Uffe

    2014-01-01

    Nation er et gammelt begreb, som kommer af det latinske ord for fødsel, natio. Nationalisme bygger på forestillingen om, at mennesker har én og kun én national identitet og har ret til deres egen nationalstat. Ordet og forestillingen er kun godt 200 år gammel, og i 1900-tallet har ideologien bredt...

  2. 32 CFR 1602.3 - Aliens and nationals.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Aliens and nationals. 1602.3 Section 1602.3 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM DEFINITIONS § 1602.3 Aliens and nationals. (a) The term alien means any person who is not a citizen or national of the...

  3. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

  4. Operation disturbance by wind turbines of fixed radars from civil aviation, national defense, Meteo-France, and maritime and fluvial harbors and navigation (PNM)

    International Nuclear Information System (INIS)

    2008-01-01

    Wind turbines and the movement of their blades can have penalizing effects on the processing of radars data. These disturbances can have a strong impact on the air, maritime and fluvial safety, on the protection of the territory and on the prevention of natural hazards. Reports made by the national agency of frequencies (ANFR) have established recommendations for the definition of protection areas (5 km) and coordination areas (5 to 30 km) which have to be taken into consideration prior to any project of wind turbine. (J.S.)

  5. 77 FR 52700 - Reestablishment of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-08-30

    ...), the Department of Defense gives notice that it is reestablishing the charter for the Board of Visitors... advice and recommendations on the overall management and governance of the National Defense University in...

  6. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  7. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  8. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  9. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  10. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  11. Particular intervention plan of the national defense nuclear facilities of Brest and Ile Longue as approved by order of the Prefect no. 2013205-0001 on July 24, 2013

    International Nuclear Information System (INIS)

    2013-01-01

    The Particular intervention plan (PPI in French) is an emergency plan which foresees the measures and means to be implemented to address the potential risks of the presence and operation of a nuclear facility. This plan is implemented and developed by the Prefect in case of nuclear accident (or incident leading to a potential accident), the impact of which extending beyond the facility perimeter. It represents a special section of the organisation plan for civil protection response (ORSEC plan). The PPI foresees the necessary measures and means for crisis management during the first hours following the accident and is triggered by the Department Prefect according to the information provided by the facility operator. Its aim is to protect the populations leaving within 10 km of the facility against a potential radiological hazard. The PPI describes: the facility, the intervention area, the protection measures for the population, the conditions of emergency plan triggering, the crisis organisation, the action forms of the different services, and the post-accident stage. This document is the public version of the Particular intervention plan of the national defense nuclear facilities of Brest and Ile Longue naval bases (Brittany, France). It comprises 2 parts: an operational part describing the actions to take in case of emergency, and a complementary part describing the facilities and the possible risks for the Brest and Crozon peninsula areas

  12. Environmental and other evaluations of alternatives for management of defense transuranic waste at the Idaho National Engineering Laboratory. Volume 1 of 2

    International Nuclear Information System (INIS)

    1982-04-01

    The US Department of Energy (DOE) is responsible for developing and implementing methods for the safe and environmentally acceptable disposal of radioactive wastes. In connection with this responsibility, the DOE is formulating a program for the long-term management of transuranic (TRU) waste buried and stored at the Idaho National Engineering Laboratory (INEL). This report has been prepared to document the results of environmental and other evaluations for three decisions that the DOE is considering: (1) the selection of a general method for the long-term management of the buried TRU waste; (2) the selection of a method for processing the stored waste and for processing the buried waste, if it is retrieved; (3) the selection of a location for the waste-processing facility. This document pertains only to the contact-handled TRU waste buried in pits and trenches and the contact-handled TRU waste held in aboveground storage at the INEL. A decision has previously been made on a method for the long-term management of the stored waste; it will be retrieved and shipped to the Waste Isolation Pilot Plant (WIPP) near Carlsbad, New Mexico. The WIPP is also used in this report as a reference repository for evaluation purposes for the buried waste. This report is contained in two volumes. Volume I is arranged as follows: the summary is an overview of the analyses contained in this document. Section 1 is a statement of the underlying purpose and need to which the report is responding. Section 2 describes the alterntives. Section 3 describes the affected environment at the INEL and the WIPP sites. Section 4 analyzes the environmental effects of each alternative. The appendices in Volume II contain data and discussions supporting the material presented in Volume I

  13. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  14. Defense.gov Special Report: Suicide Prevention and Awareness - 2013

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: Suicide Prevention and Awareness Updated July 23 , 2014 Suicide Prevention and Awareness Stand by Them Take a Stand Emotional strain can be the most nation's support the most. Top Stories Suicide Prevention Takes Courage, Communication, Official Says The

  15. Defense Contracting in Iraq: Issues and Options for Congress

    Science.gov (United States)

    2008-08-15

    9 Rapid Acquisition Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Audits, Investigations, and...01468/]. 5 LOGCAP contracts have been previously awarded for work in Rwanda, Haiti, Saudi Arabia, Kosovo, Ecuador, Q atar , Italy, southeastern Europe...Acquisition Methods . Section 811 of the FY2005 National Defense Authorization Act32 grants the Secretary of Defense limited rapid acquisition

  16. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  17. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  18. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  19. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  20. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  1. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  2. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  3. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  4. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  5. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  6. Study of the Department of Defense Student Testing Program

    National Research Council Canada - National Science Library

    Davidson, Lance G

    2005-01-01

    ...) Career Exploration Program (CEP) and its contributions to Navy recruiting. The ASVAB-CEP is a Department of Defense program created in 1968, operating in 12,598 high schools throughout the nation as of 2004...

  7. Defense Technology Journal, Vol. 16, No. 2, February 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-02-01

    ;Contents: VERTIGO Simulation; Education Reform of National Defense Academy; Artilleries and Ammunitions (4); Newly developed encryption algorithm (MISTY) that surpasses DES; CAS EXPO`95 in California USA; Underwater Weapons; Phaser Gun; and Japanese Missile.

  8. Defense Trade: Data Collection and Coordination on Offsets

    National Research Council Canada - National Science Library

    2000-01-01

    ... on the U.S. economy and national security. Defense offsets are the full range of industrial and commercial benefits that firms provide to foreign governments as inducements or conditions for the purchase of military goods and services...

  9. Defense Meteorological Satellite Program (DMSP) - Space Weather Sensors

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) maintains a constellation of sun-synchronous, near-polar orbiting satellites. The orbital period is 101 minutes...

  10. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  11. 32 CFR 724.120 - National Capital Region (NCR).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false National Capital Region (NCR). 724.120 Section 724.120 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Definitions § 724.120 National Capital Region (NCR). The District of Columbia; Prince...

  12. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  13. 75 FR 64710 - Availability of the Fiscal Year 2009 Department of Defense Services Contracts Inventory

    Science.gov (United States)

    2010-10-20

    ... DEPARTMENT OF DEFENSE Office of the Secretary Availability of the Fiscal Year 2009 Department of... National Defense Authorization Act for Fiscal Year 2008 (NDAA 08) section 807, the Office of the Director, Defense Procurement and Acquisition Policy, Office of Program Acquisition and Strategic Sourcing (DPAP...

  14. Department of Defense / General Services Administration / National...

    Science.gov (United States)

    2010-12-20

    ... ADMINISTRATION (FAR) Final Rule Stage 492. FAR CASE 2006-005, HUBZONE PROGRAM REVISIONS Legal Authority: 40 USC 121(c); 10 USC ch 137; 42 USC 2473(c) Abstract: The Civilian Agency Acquisition Council and the... REPORTING PROCEDURES Legal Authority: 40 USC 121(c); 10 USC ch 137; 42 USC 2473(c) Abstract: The Civilian...

  15. Laser Options for National Missile Defense

    National Research Council Canada - National Science Library

    Leonard, Steven

    1998-01-01

    The Cold War threat that was characterized by a USSR launch of a large number of ballistic missiles towards the United States has been replaced today by an even less stable ballistic missile security environment...

  16. Long shot: vaccines for national defense

    National Research Council Canada - National Science Library

    Hoyt, Kendall

    2012-01-01

    ... Medical Graduate School Army Specialized Training Units Biomedical Advanced Research and Development Authority Board for the Investigation and Control of Influenza and other Epidemic Diseases B...

  17. Ethics and National Defense: The Timeless Issues

    Science.gov (United States)

    1993-02-01

    recent times by Jeremy Bentham (as hedonistic act utilitari- anism) and by John Stuart Mill (whose writings leave unclear whether act or rule...School, Bentham , Jeremy , 177 151 Biological warfare research, 109 Aquino, Corazon, 67 Brewer,Justice, 28 Armed Forces Staff College, 154 Budgetary issues

  18. National Defense Budget Estimates for FY

    Science.gov (United States)

    1993-05-01

    funding" policy . Under full funding, Congress approves, in the year of the request, sufficient funds to complete a given quantity of items, even though...the proposed level of general transfer authority, and a technical outlay adjustment to properly reflect the Administration’s pay policies . 16 SCO...rg O) oo OO *-< coco •r-» CD cncD CD CM CO CD CD *4 in *•* o o f-t CM O r- CM CM O CM ao CM ^ in CO CM CD CM r-. co CM r- co

  19. Defense Against National Vulnerabilities in Public Data

    Science.gov (United States)

    2017-02-28

    ingestion of subscription based precision data sources ( Business Intelligence Databases, Monster, others).  Flexible data architecture that allows for...components of program execution from technical design to business and program management, to ensure timely and complete execution of contract...type. Satellite Imagery Adapters Planet and Carto Adapter Juno Services Vulnerability Assessment Framework Computer Model Facebook Graph API

  20. National Defense Budget Estimates for FY 2012

    Science.gov (United States)

    2011-03-01

    Net offsetting receipts (collections from the public that arise out of business-type or market -oriented activities of the government, and are...in various markets . Chapter 5 provides the standard economic factors, known as deflators, for calculating the effect of changes in price. 51...FO ERAL POSE RCES C3 & , INTEL SPACE MOBILITY FORCES GUARD & RESERVE FORCES RESEARC DEVLPM H & NT CE SU & M NTRAL PPLY AINT TRAINING MEDICAL & OTHER

  1. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  2. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  3. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  4. Sandia National Laboratories: Pathfinder Radar ISR and Synthetic Aperture

    Science.gov (United States)

    Radar (SAR) Systems Sandia National Laboratories Exceptional service in the national interest ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  5. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  6. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  7. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  8. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  9. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  10. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  11. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  12. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  13. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  14. A Risk Assessment Methodology for Divesting Military Capabilities to Allied Nations

    National Research Council Canada - National Science Library

    Gastelum, Jason A

    2006-01-01

    .... can sustain such a level of defense investment. One strategy to offset the increasing burden of defense spending is to divest the procurement and/or sustainment of individual defense capabilities to allied nations...

  15. National Coastal Mapping Program

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — The U. S. Army Corps of Engineers (USACE) National Coastal Mapping Program (NCMP) is designed to provide high-resolution elevation and imagery data along U.S....

  16. Cyber Professionals in the Military and Industry-Partnering in Defense of the Nation: A Conversation between Maj Gen Suzanne Vautrinot, Commander, Twenty-Fourth Air Force, and Mr. Charles Beard, Chief Information Officer, Science Applications International Corporation

    Science.gov (United States)

    2013-01-01

    what truly had to be protected and where we would establish trust. The results of that exercise materially changed our defense-in-depth strategy...vice president for Global Transportation and Industrial Markets at KPMG Consulting (later BearingPoint), leading the company’s strat- egy and

  17. 78 FR 65218 - Defense Federal Acquisition Regulation Supplement: Private Sector Notification Requirements of In...

    Science.gov (United States)

    2013-10-31

    ... Federal Acquisition Regulation Supplement: Private Sector Notification Requirements of In-Sourcing Actions... Supplement (DFARS) to implement a section of the National Defense Authorization Act regarding private sector... section 938 of the National Defense Authorization Act (NDAA) for Fiscal Year 2012 regarding private sector...

  18. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  19. Massachusetts Institute of Technology Defense & Arms Control Studies Program

    Science.gov (United States)

    1996-01-01

    security of the nation. The unicorn is the obvious symbol for this box. Even with a two percent of GDP or less defense budget, we will maintain our nuclear...systems is not going away. There are some unicorns in the defense herd and this would be a time to claim to be one. ACTIVITIES AND PERSONNEL Looking...macroeconomics and public finance is advisable. The subjects in the Forces and Force Analysis section will provide sufficient review of the technical

  20. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  1. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  2. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  3. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  4. Balancing the technical, administrative, and institutional forces in defense waste management

    International Nuclear Information System (INIS)

    Hindman, T.B.

    1988-01-01

    Defense radioactive waste results from the Department of Energy's (DOE) national defense and nuclear weapons production activities. In 1983, the President submitted to Congress the Defense Waste Management Plan (DWMP) for defense high-level and transuranic wastes. The Plan proposed a workable approach for the final disposition of these wastes. The Department is still following the path laid out in this Plan. The proper management of this waste requires that technical, administrative, and institutional forces which are often neither well understood nor well documented be properly balanced. This paper clarifies the role these three forces play in the Defense waste management programs and provides examples of their impacts on specific programs

  5. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  6. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  7. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  8. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  9. Defense waste processing facility startup progress report

    International Nuclear Information System (INIS)

    Iverson, D.C.; Elder, H.H.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950's to produce nuclear materials in support of the national defense effort. About 83 million gallons of high level waste produced since operation began have been consolidated into 33 million gallons by evaporation at the waste tank farm. The Department of Energy has authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters, prior to emplacement in a federal repository. The DWPF is now mechanically complete and undergoing commissioning and run-in activities. Cold startup testing using simulated non-radioactive feeds is scheduled to begin in November 1992 with radioactive operation scheduled to begin in May 1994. While technical issues have been identified which can potentially affect DWPF operation, they are not expected to negatively impact the start of non-radioactive startup testing

  10. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  11. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  12. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  13. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  14. The National Guard: Recommendations to Develop the Joint Future Force

    Science.gov (United States)

    2010-03-01

    Health, Sexual Assault Prevention and Response, and Warrior Support programs.109 This joint support concept is distinctive to the NG, and provides an...National Defense Strategy (Washington, DC: Department of Defense, June 2008), TOC . Available online at http://www.defense.gov/news/2008%20 National

  15. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  16. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  17. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  18. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  19. Demeter's Resilience: an International Food Defense exercise.

    Science.gov (United States)

    Hennessey, Morgan; Kennedy, Shaun; Busta, Frank

    2010-07-01

    The National Center for Food Protection and Defense (NCFPD), which is led by the University of Minnesota, hosted an international food defense exercise on 27 to 29 May 2008. Established in 2004, NCFPD is a Department of Homeland Security Center of Excellence with the mission of defending the food system through research and education. Tabletop exercises are practice-based scenarios intended to mimic real life experiences. The objective of the exercise discussed in this article was to facilitate discussion to increase awareness among exercise participants of both the threat that would be posed by an intentional attack on the food supply and the international impact of such an attack. Through facilitated discussion, exercise participants agreed on the following themes: (i) recognition of a foodborne disease outbreak is driven by the characteristics of the illness rather than the actual number of ill individuals; (ii) during the course of a foodborne outbreak there are generally multiple levels of communication; (iii) a common case definition for a foodborne disease is difficult to develop on a global scale; and (iv) the safety and health of all individuals is the number one priority of all parties involved. Several challenges were faced during the development of the exercise, but these were overcome to produce a more robust exercise. The following discussion will provide an overview of the challenges and the strategies used to overcome them. The lessons learned provide insight into how to plan, prepare, and host an international food defense exercise.

  20. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  1. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  2. Economic considerations/comparisons for the disposal of defense high-level waste

    International Nuclear Information System (INIS)

    Leclaire, D.B.; Lazur, E.G.

    1985-01-01

    This paper provides a summary, in a generic sense, of the economic considerations and comparisons of permanent isolation of defense high-level waste (DHLW) in a licensed geologic repository. Topics considered include underground disposal, economic analysis, comparative evaluations, national defense, radioactive waste facilities, and licensing

  3. 77 FR 11495 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-02-27

    ... management, curricula, and methods of instructions, facilities, and other matters of interest. The Secretary... more than 10 members, who are eminent authorities in the fields of academia, business, national defense and security, the defense industry, and research and analysis. Not less than 50 percent of Board...

  4. 75 FR 67632 - Defense Federal Acquisition Regulation Supplement; Prohibition on Interrogation of Detainees by...

    Science.gov (United States)

    2010-11-03

    ...-AG88 Defense Federal Acquisition Regulation Supplement; Prohibition on Interrogation of Detainees by... National Defense Authorization Act for Fiscal Year 2010 (Pub. L. 111-84) prohibits the interrogation of..., to add DFARS 237.173, Prohibition on Interrogation of Detainees by Contractor Personnel, adding a...

  5. Strategic Shift: Appraising Recent Changes in U.S. Defense Plans and Priorities

    Science.gov (United States)

    2013-04-29

    intensify defense cooperation with such friends and allies as the Philippines, Indonesia, Malaysia , Thailand, and Singapore as well as Vietnam and India...about both future economic growth and tax revenues. 40 “National Defense Consumption...operations. Its 2-MTW strategy for the 1990s was carried out principally with forces, weapons, and operational doctrines inherited from the Cold War

  6. 75 FR 17903 - Federal Advisory Committee; Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-04-08

    ..., VA 22204. The June 9 meeting will be held at the Industrial College of the Armed Forces, Fort McNair... to the Board: Department of Defense Task Force on the Prevention of Suicide by Members of the Armed.... 552b, as amended, and 41 CFR 102-3.155, in the interest of national security, the Department of Defense...

  7. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  8. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  9. Defense.gov Special Report: Feds Feed Families

    Science.gov (United States)

    defense for civilian personnel policy. Story Mark McCaffrey Featured at FFF Rally Capital Area Food Bank community. For more information visit the Capital Area Food Bank. The Corporation for National and Community Feds Feed Families Website Capital Area Food Bank What Others Are Doing FFF People, Pets and Paper

  10. Defense.gov Special Report: African American History Month

    Science.gov (United States)

    in Military and Business Tuskegee Airman Shares History Soldier's Life Provides Example for West Department of Defense Submit Search During National African-American History Month, we celebrate the rich In honor of African-American History Month, Fred Moore, the first African-American Tomb Guard

  11. 76 FR 2246 - Defense Support of Civil Authorities (DSCA)

    Science.gov (United States)

    2011-01-13

    ... Presidential nominating conventions, such as the United Nations General Assembly, Super Bowls, and the Group of..., direction, and control of the USD(P) shall: (1) Serve as the principal civilian advisor to the Secretary of... principal advisor to the Secretary of Defense for all DoD health policy shall: (1) Provide guidance and...

  12. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  13. Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems

    OpenAIRE

    Azab, Mohamed Mahmoud Mahmoud

    2013-01-01

    Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usabili...

  14. Ballistic Missile Defense FY95 Funding & Language Track

    Science.gov (United States)

    1994-10-01

    io o 0) "> SI Q) to a-, H~ TO CD TO - m fe o c ■Q </) Q> V) 0) TO JO "Js ^" ** 5<o c Q> E E o o 0) Tj Ü TO SSto ...Defense Act National SSTO National Test Facility Upper Lower Tier Risk Reduction Report ABM Treaty NMD TMD Early Warnin Pages: 00247 Cataloged Date: May

  15. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  16. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  17. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  18. Report of the Defense Science Board Task Force on Strategic Communication

    National Research Council Canada - National Science Library

    2008-01-01

    The 2007 Defense Science Board (DSB) Task Force on Strategic Communication has written this report within the context of a larger study, the DSB 2007 Summer Study on Challenges to Military Operations in Support of National Interests...

  19. 77 FR 2653 - Defense Federal Acquisition Regulation Supplement; Pilot Program for Acquisition of Military...

    Science.gov (United States)

    2012-01-19

    ... entity referred to in the interim rule is, in essence, the legal entity that signs the contract with the... contractors as defined within the rule and section 866 of the National Defense Authorization Act for Fiscal...

  20. 76 FR 70424 - Defense Policy Board; Federal Advisory Committee Meeting Notice

    Science.gov (United States)

    2011-11-14

    ... national security issues within the Pacific Rim, the Eastern Mediterranean, NATO, and nuclear deterrence... Advisory Committee Management Officer for the Department of Defense, pursuant to 41 CFR 102-3.150(b...

  1. Defense.gov - Special Report: Travels with Panetta - July-August 2012

    Science.gov (United States)

    Visits Tunisia, Egypt, Israel, and Jordan Tunis, Tunisia Cairo, Egypt Jerusalem Amman, Jordan About the locations and meeting with defense counterparts in allied and partner nations. Biography . Main Menu Home

  2. Supporting the Information-Centric 2001 Quadrennial Defense Review: The Case for an Information Service

    National Research Council Canada - National Science Library

    Costa, Robert

    2002-01-01

    Information Superiority is an overarching and integrating construct in both Joint Vision 2020 and the 2001 Quadrennial Defense Review and is codified in both the 2000 National Security Strategy (NSS...

  3. Global War on Terrorism: Reported Obligations for the Department of Defense

    National Research Council Canada - National Science Library

    Pickup, Sharon

    2008-01-01

    Section 1221 of the National Defense Authorization Act for Fiscal Year 20066 requires us to submit quarterly updates to Congress on the costs of Operation Iraqi Freedom and Operation Enduring Freedom...

  4. Global War on Terrorism: Reported Obligations for the Department of Defense

    National Research Council Canada - National Science Library

    Pickup, Sharon

    2008-01-01

    Section 1221 of the National Defense Authorization Act for Fiscal Year 2006 requires us to submit quarterly updates to Congress on the costs of Operation Iraqi Freedom and Operation Enduring Freedom...

  5. Defense Contractors SBIR/STTR Partnering Manual: A Primer on Technology Risk Management and Partnering Strategies

    National Research Council Canada - National Science Library

    Williams, John R

    2008-01-01

    As the world looks increasingly to technology innovation to meet the challenges of defense, security, disaster relief and increased health, many in industry have come to identify this nation's SBIR...

  6. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  7. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  8. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  9. Guard News - The National Guard

    Science.gov (United States)

    operations during chemical attack May 25, 2018 - SWANTON, Ohio - Maintenance is a critical component in Leaders discuss future of National Guard cyber warfare May 21, 2018 - CAMP ATTERBURY, Ind. - While National Guard teams from across the nation tested themselves on their cyber defensive capabilities at

  10. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  11. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  12. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  13. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  14. THE DEFENSE IN CHILE FROM 1960 TO 2010: AN ISSUE OF THE MILITARY OR AN ISSUE OF EVERY CHILEAN CITIZEN?

    Directory of Open Access Journals (Sweden)

    JULIO SOTO SILVA

    2018-01-01

    Full Text Available This essay presents a general vision of the national defense trough the last 50 years as well as a study of the National Defense System of Chile. The Decree 181 of 1960 that stated the organization of the system and structure of the National Defense is the starting point, a brief analysis of how it worked until 2010 when it was replaced by the new law of the MOD. The way it worked during the international crisis Chile faced during the 70s and 80s is also discussed. But this study does not stop there, it also tackles the way by which the defense policy evolved from an issue related only to the military, to become an issue of every Chilean citizen, through the widening of the knowledge of defense issues to the civilian and political elites, being the formulation of an explicit Defense Policy the cornerstone of the whole process, by means of the publishing of the three books of the national defense, along with other key public policies in defense issues whereas the contribution of the Defense Community, recognized as such in the Second Book of the Defense, was capital. This community has a representation of all the sectors of the civil society interested in defense issues as well as from the armed forces. This period ends with the law 20.424 “Organic Statute of the Ministry of Defense”, the most important change in defense issues, besides de DFL 181, since the creation of the Ministry of Defense back in 1932.

  15. National Science Resources Center Project to Improve Science Teaching in Elementary Schools with Special Emphasis on Department of Defense Dependents Schools and Other Schools Serving Children of Military Personnel

    Science.gov (United States)

    1992-10-01

    2555. NCTM to Publish Resource Directory ANNOUNCEMENTS The National Council of Teachers of Mathematics ’ ( NCTM ) Committee for a Coin- Coalition Launches...science and mathematics education: • DOD Apprenticeship Programs * DOD Teacher Internship Programs * DOD Partnership Programs * DOD Dependents Schools...elementary school teachers . The units also link science with other curriculum areas, including mathematics , language arts, social studies, and art. In

  16. Management of remote-handled defense transuranic wastes

    International Nuclear Information System (INIS)

    Ebra, M.A.; Pierce, G.D.; Carson, P.H.

    1988-01-01

    Transuranic (TRU) wastes generated by defense-related activities are scheduled for emplacement at the Waste Isolation Pilot Plant (WIPP) in New Mexico beginning in October 1988. After five years of operation as a research and development facility, the WIPP may be designated as a permanent repository for these wastes, if it has been demonstrated that this deep, geologically stable formation is a safe disposal option. Defense TRU wastes are currently stored at various Department of Energy (DOE) sites across the nation. Approximately 2% by volume of currently stored TRU wastes are defined, on the basis of dose rates, as remote-handled (RH). RH wastes continue to be generated at various locations operated by DOE contractors. They require special handling and processing prior to and during emplacement in the WIPP. This paper describes the strategy for managing defense RH TRU wastes

  17. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  18. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  19. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  20. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  1. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  2. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  3. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  4. Operation disturbance by wind turbines of fixed radars from civil aviation, national defense, Meteo-France, and maritime and fluvial harbors and navigation (PNM); Perturbations par les aerogenerateurs du fonctionnement des radars fixes de l'Aviation civile, de la Defense nationale, de Meteo-France et des ports et navigation maritime et fluviale (PNM)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    Wind turbines and the movement of their blades can have penalizing effects on the processing of radars data. These disturbances can have a strong impact on the air, maritime and fluvial safety, on the protection of the territory and on the prevention of natural hazards. Reports made by the national agency of frequencies (ANFR) have established recommendations for the definition of protection areas (5 km) and coordination areas (5 to 30 km) which have to be taken into consideration prior to any project of wind turbine. (J.S.)

  5. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  6. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  7. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  8. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  9. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  10. Defense Nuclear Enterprise: DOD Has Established Processes for Implementing and Tracking Recommendations to Improve Leadership, Morale, and Operations

    Science.gov (United States)

    2016-07-14

    Department of Defense (DOD) has identified nuclear deterrence as its highest priority mission. In 2014, in response to several incidents involving the...nation’s nuclear deterrent forces and their senior leadership, the Secretary of Defense directed two reviews of DOD’s nuclear enterprise. These two...adversely affecting the nuclear deterrence mission. The reviews also made recommendations to address these problems. The National Defense Authorization

  11. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  12. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  13. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  14. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  15. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  16. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  17. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  18. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  19. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  20. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  1. Climate Change and the Department of Defense: An Introduction

    Science.gov (United States)

    2016-10-24

    thus an increased chance of wildfires, flooding, and drought. In addition to compro- mising food production in Latin America , these natural disasters...Department of Defense (DOD) fully embraces the idea that global climate change is an actual risk to national security that must be taken into consider- Dr...Barack H. Obama in 2008 introduced seismic shifts in American foreign and domestic policies, which included a 180 degrees reversal of foreign and

  2. The defense waste processing facility: A status report

    International Nuclear Information System (INIS)

    Cowan, S.P.; Fulmer, D.C.

    1987-01-01

    The Defense Waste Processing Fascility (DWPF) will be the nation's first production scale facility for immobilizing high-level waste for disposal. It will also be the largest facility of its kind in the world. The technology, design, and construction efforts are on schedule for ''hot'' operation in fiscal year 1990. This paper provides a status report on the DWPF technology, design, and construction, and describes some of the challenges that have arisen during design and construction

  3. Defense AT and L. Volume 45, Issue 1

    Science.gov (United States)

    2016-02-01

    and failures that occur while pursuing an inter- national defense contract. Maritime Autonomy Reducing the Risk in a High-Risk Program David...technical, contractual or financial and administrative data. Driving Future Change With Army Research, Collaboration and Prototyping Jeffrey D. From...situations. The move toward more automation or autonomy in many systems requires that we pay even more attention to the user interface than ever to

  4. Defense Waste Processing Facility radioactive operations -- Part 2, Glass making

    International Nuclear Information System (INIS)

    Carter, J.T.; Rueter, K.J.; Ray, J.W.; Hodoh, O.

    1996-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, SC is the nation's first and world's largest vitrification facility. Following a ten year construction period and nearly 3 year non-radioactive test program, the DWPF began radioactive operations in March, 1996. The results of the first 8 months of radioactive operations are presented. Topics include facility production from waste preparation batching to canister filling

  5. Veiled Normalization: The Implications of Japanese Missile Defense

    Science.gov (United States)

    2008-09-01

    1 Mindy Kotler and Daisuke Okuyama. “Japan’s Global Ambivalence.” Foreign Policy, no. 130, (2002): 96-97. 19...risk in entering the arms market .93 (2006) Self Defense Law 82-2 : In 2006, a significant m ilestone was made in regards to the delegation of...Information Gathering Satellite (IGS) System." Intelligence and National Security 19, no. 3 (Autumn, 2004). Kotler , Mindy and Daisuke Okuyama

  6. Information Management Principles Applied to the Ballistic Missile Defense System

    Science.gov (United States)

    2007-03-01

    of a BMDS. From this, the Army produced the Nike -Zeus system comprised of four radars, the Zeus missile, and a computer fire control system (General...made the Nike -Zeus our first National Missile Defense (NMD) system named Sentinel. The architecture was to cover 14 locations, 10 of which were...1999). Additionally, there are cultural impacts (Gordon & Gordon, 1999). A company choosing an Apple OS may have to wage a big fight against the

  7. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  8. Analisis Teori Offense-Defense Pada Reformasi Kebijakan Pertahanan Jepang Dalam Dinamika Keamanan Di Asia Timur

    Directory of Open Access Journals (Sweden)

    Fadhil Alghifari

    2016-05-01

    Full Text Available This paper will seek to demonstrate how the use of Offense-Defense Theory can best explain the Japan’s new defense reform legislation that enables the country to play a more comprehensive global security role commensurate with its capabilities, resources, national interests, and international responsibilities. Through this offense-defense lens, it will be argued that Japan’s new defense reform legislation is a response to the growing dominance of ‘offensive’ behaviour by the neighbouring countries in East Asia. This paper will then elaborate more about the elements that are used in the offense-defense theory to analyze the ‘offense’ dominance that prompts East Asian states behave aggressively and defensively including Japan. Furthermore, this paper will explain why Japan is currently playing the ‘defensive’ role to counter the growing dominance of ‘offense’ in East Asia through the four variables of offense-defense balance; military doctrine and technology, geographical considerations, social and political order, and diplomatic arrangements. Thus, we will see that Japan holds the key to the offense-defense and security balance in the increasingly hostile environment in East Asia.

  9. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  10. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  11. Defense AT&L. Volume 40, Number 4, July-August 2011

    Science.gov (United States)

    2011-08-01

    program monitored by DCMA, KRCC, SAO-A, and ANA representatives. ANA and the new Afghanistan National Civil Order Police (ANCOP) personnel field-tested...or can’t meet a commitment, be up front about it. When you point out and explain your own lapses or potential roadblocks, it engen - ders trust in...senior military personnel, civil - ians, defense contractors, and defense industry professionals in pro- gram management and the acquisition

  12. Application of System and Integration Readiness Levels to Department of Defense Research and Development

    Science.gov (United States)

    2016-07-01

    prompting folding foot-pegs. The human-motorcycle interface maturity followed the technical maturity at the expense of safety. Early airplanes were...this paper shows matrix notation in both reduced tensor notation and matrix notation as a convenience for a multidisciplinary audience. SRLj, [SRL...index for managing the acquisition of defense systems. Paper presented at National Defense Industrial Association 13th Annual Systems Engineering

  13. Japan's shift to a proactive defense architecture: Challenges faced by industry, government, and society

    OpenAIRE

    Chung, Hoyoon

    2017-01-01

    Approved for public release; distribution is unlimited As a result of the changing security environment in the Asia-Pacific, Japan is shifting to a more proactive defense policy, as outlined in the National Defense Program Guidelines (NDPG). This thesis investigates the challenges faced by Japan's industry, government, and society in meeting the NDPG objectives. To do this, this thesis probes the following problem areas: difficulties with indigenous production of weapons systems, inability...

  14. The Impact of Civilian Control on Contemporary Defense Planning Systems: Challenges for South East Europe

    Science.gov (United States)

    2011-03-01

    Long-Term Defense Planning,” Information and Security: An International Journal 23, no. 1 (2009): 62-72; and Nicu Ionel Sava, Western (NATO/PfP...questionable relevance elsewhere in the world.” Huntington advanced his notions of “objective” and “subjective” control explicitly around the...chamber committees for defense: Public Order Committee and National Security Committee. These two discuss the proposals advanced by the government. Then

  15. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  16. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  17. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    National Research Council Canada - National Science Library

    Lee, Dae O

    2008-01-01

    ...) through competitiveness analysis is required. Thus, it is necessary to develop appropriate models for analyzing the Korean NDI and to conduct competitiveness analysis by using the developed model...

  18. Defense transuranic waste program strategy document

    International Nuclear Information System (INIS)

    1982-07-01

    This document summarizes the strategy for managing transuranic (TRU) wastes generated in defense and research activities regulated by the US Department of Energy. It supercedes a document issued in July 1980. In addition to showing how current strategies of the Defense Transuranic Waste Program (DTWP) are consistent with the national objective of isolating radioactive wastes from the biosphere, this document includes information about the activities of the Transuranic Lead Organization (TLO). To explain how the DTWP strategy is implemented, this document also discusses how the TLO coordinates and integrates the six separate elements of the DTWP: (1) Waste Generation Site Activities, (2) Storage Site Activities, (3) Burial Site Activities, (4) Technology Development, (5) Transportation Development, and (6) Permanent Disposal. Storage practices for TRU wastes do not pose short-term hazards to public health and safety or to the environment. Isolation of TRU wastes in a deep-mined geologic repository is considered the most promising of the waste disposal alternatives available. This assessment is supported by the DOE Record of Decision to proceed with research and development work at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico - a deep-mined geologic research and development project. In support of the WIPP research project and the permanent disposal of TRU waste, the DTWP strategy for the near term will concentrate on completion of procedures and the design and construction of all facilities necessary to certify newly-generated (NG) and stored TRU wastes for emplacement in the WIPP. In addition, the strategy involves evaluating alternatives for disposing of some transuranic wastes by methods which may allow for on-site disposal of these wastes and yet preserve adequate margins of safety to protect public health and the environment

  19. National Software Reference Library (NSRL)

    Science.gov (United States)

    National Software Reference Library (NSRL) (PC database for purchase)   A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.

  20. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  1. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  2. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  3. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  4. Materials evaluation programs at the Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    Gee, J.T.; Iverson, D.C.; Bickford, D.F.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided

  5. Quality Assurance Program description, Defense Waste Processing Facility (DWPF)

    International Nuclear Information System (INIS)

    Maslar, S.R.

    1992-01-01

    This document describes the Westinghouse Savannah River Company's (WSRC) Quality Assurance Program for Defense Waste Processing at the Savannah River Site (SRS). WSRC is the operating contractor for the US Department of Energy (DOE) at the SRS. The following objectives are achieved through developing and implementing the Quality Assurance Program: (1) Ensure that the attainment of quality (in accomplishing defense high-level waste processing objectives at the SRS) is at a level commensurate with the government's responsibility for protecting public health and safety, the environment, the public investment, and for efficiently and effectively using national resources. (2) Ensure that high-level waste from qualification and production activities conform to requirements defined by OCRWM. These activities include production processes, equipment, and services; and products that are planned, designed, procured, fabricated, installed, tested, operated, maintained, modified, or produced

  6. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  7. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  8. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  9. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  10. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  11. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  12. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  13. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  14. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  15. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  16. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  17. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  18. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  19. Department of Defense / General Services Administration / National Aeronautics and Space...

    Science.gov (United States)

    2010-04-26

    ..., SOCIOECONOMIC PROGRAM PARITY Legal Authority: 40 USC 121(c); 10 USC ch 137; 42 USC 2473(c) Abstract: The... Authority: 40 USC 121(c); 10 USC ch 137; 42 USC 2473(c) Abstract: The Civilian Agency Acquisition Council... REINVESTMENT ACT OF 2009 (THE RECOVERY ACT)--REPORTING REQUIREMENTS Legal Authority: 40 USC 121(c); 10 USC ch...

  20. FY2017 National Defense Authorization Act: Selected Military Personnel Issues

    Science.gov (United States)

    2017-01-23

    Service ........................................................................................................................... 28 *Military Sexual ...Assault and Sexual Harassment ......................................................................... 29 Child Abuse and Domestic Violence...requires most males between the ages of 18 and 26 who are citizens or residents of the United States to register with Selective Service. Women in the

  1. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  2. Perspectives on Defense Futures: National Developments in Europe

    Science.gov (United States)

    1986-04-01

    withdraw from the Alliance entirely. A nonaligned Greece remains the strategic goal of the Pan-Hellenic Socialist Movement ( PASOK ) government of Prime...Greek security (Turkey) that Greece considers uppermost. At the same time, however, pragmatists in the major parties, PASOK included, recognize...ideological yearnings of more radical elements within PASOK . Thus far, the Prime Minister has been able to posture as an orthodox PASOK ideologue on

  3. Macroeconomic Scenario Building for Strategic National Defense Planning

    Science.gov (United States)

    2001-12-01

    can be disastrous. The rapid destruction of the hedge fund Long Term Capital Management in the fall of 1998 is a case in point. This fund traded...extensively in derivatives and arbitrage with use of heavy leverage. Their use of computer models developed by the crème of academia, including Nobel...historical norms of arbitrage trading and bond yields broke down. In five weeks the Long Term Capital’s portfolio imploded under the weight of its leverage

  4. 2011 Women in Defense (WID) National Fall Conference

    Science.gov (United States)

    2011-10-19

    countless suicide bombings, military incursions and failed peace deals. She provided on site coverage of Israel’s withdrawal from Lebanon in 2000, its...ATTENDEE INFO u 17 LTC Steve M. Alexander, USA (Ret) MacAulay Brown, Inc. Mrs. Blossom B. Baker JB Technologies, Inc. Nada Bakos Glass Global Consulting...On Laws, Rules, Regs: Budget Deficit and Ceiling FAPIIS Reporting Conflicts of Interest Information Security and Export Technical Data and

  5. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  6. 2011 Annual Report (National Defense Center for Energy and Environment)

    Science.gov (United States)

    2011-01-01

    settings on an electrocoagulation unit, one of four treatment technologies evaluated to remove cadmium from wastewater at LEAD. 16 17 By reducing...Coating Equipment Verification Electronics Recycling UXO Detection, Neutralization, and Removal RangeSafe Environmental Cost Analysis...ultrasonic cleaning systems were installed at Anniston Army Depot: a small arms cleaning system in Building 129 and a plating wax removal system in

  7. National Defense Authorization Act for Fiscal Year 2014

    Science.gov (United States)

    2013-06-20

    centralized, automated mail redirection system to improve the delivery of absentee ballots to military per- sonnel serving outside the United States...GBI production line will remain oper- ational for at least the next decade, thus enabling the option of pro- curing additional GBIs in the future, if...direction system to improve the delivery of absentee ballots to military personnel serving outside the United States (sec. 352) The committee recommends

  8. FY2017 National Defense Authorization Act: Selected Military Personnel Issues

    Science.gov (United States)

    2016-07-29

    Section 631 of House bill and Section 661 of the Senate bill are similar provisions that would allow DeCA to set prices for merchandise sold in...cost of the merchandise plus any costs to replace damaged, deteriorated, or lost inventory. According to CBO, DeCA is expected to implement this...cloud based platform, and digital applications to collect data and monitor the progress of alcohol abuse prevention programs and to submit to the armed

  9. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  10. Combat Fitness a Concept Vital to National Defense

    Science.gov (United States)

    2010-06-18

    sedentary lifestyle or less physical activity, but the research does a poor job of isolating the most influential of those factors. However, it does show a... sedentary lifestyle , the lack of physical fitness classes in school and the rise of technology all contribute to this issue; however, each of these

  11. Next Steps for Transforming Education at National Defense University

    Science.gov (United States)

    2015-01-01

    on the Socratic method of open seminar discussion moderated by faculty has its advantages but falls short as a means of replicating complex...education that informs its graduate programs.29 The Socratic method alone does not constitute an optimum approach to adult education. A hybrid approach...ing methods , and pamper rather than challenge students (see table 2).3 Critics further contend that with a few excep- tions, war college classes are

  12. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  13. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  14. The defense of political prisoners in the early ‘70s: professional practice, law and politics

    Directory of Open Access Journals (Sweden)

    Mauricio Chama

    2010-12-01

    Full Text Available The work addresses the relationship between law and politics in the early 70s. More precisely aims to identify and reconstruct the main features that assumes the defense of political prisoners in this period. Rather than a specific work, means that the defense of political prisoners in those years represented a new configuration that was able to articulate a new association of legal professionals, renewed defense strategies, a vast and systematic effort of denunciation, a fluid network of lawyers national and a peculiar rhetoric aimed at the formation of a “new law”. Conceived in these terms, we believe that the defense of political prisoners in the early ‘70s redefined the conventional modes of understanding the relationship between professional practice, law and politics, encouraging the emergence of a new model of counsel in the public sphere.

  15. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  16. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  17. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  18. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  19. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  20. Internet Civil Defense: Feasibility Study

    National Research Council Canada - National Science Library

    LaPorte, Ron

    2002-01-01

    ... (and ultimately, international) system of information sharing, education and analysis via the Internet to connect the general public, community networked cells, emergency responders, local and national investigative authorities...

  1. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... of the National Security Education Board. This meeting was to be held on June 20, 2012, from 8:30 a.m. to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite...

  2. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... Department of Defense gives notice that it is renewing the charter for the National Security Education Board... awards that favors individuals expressing an interest in national security issues or pursuing a career in...

  3. Second Line of Defense Spares Program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  4. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  5. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  6. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  7. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  8. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  9. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  10. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  11. Evaluating the Impact of Unrestricted Operation of Unmanned Aircraft Systems in the National Airspace System

    Data.gov (United States)

    National Aeronautics and Space Administration — Unmanned aircraft systems (UAS) can be used for scientific, emergency management, and defense missions, among others. The existing federal air regulations,...

  12. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  13. Western Hemisphere Defense Policy Statement

    Science.gov (United States)

    2012-10-01

    El Salvador , Guatemala, Honduras, Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...critical support during the initial stages of the Haiti earthquake relief effort. As military forces often have a unique capability to respond

  14. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  15. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  16. Information report presented in application of article 145 of the regulation by the commission of national defense and armed forces about the propulsion system of the second aircraft carrier; Rapport d'information depose en application de l'article 145 du reglement par la commission de la defense nationale et des forces armees sur le mode de propulsion du second porte-avions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    In the framework of the project of launching of a sister-ship to the Charles de Gaulle aircraft carrier, this report makes an objective analysis of the different possible propulsion systems that can be considered for this battle ship according to different criteria: 1 - two possible energy sources and four possible configurations of aircraft carrier considered: alternative between nuclear propulsion and conventional propulsion, the two nuclear ships eventualities, the hypothesis of an entirely French-made classical propulsion ship, the opportunity of a French-British cooperation for a conventional aircraft carrier project; 2 - decision criteria: operational need, cost, industrial and technological stakes, constraints linked with daily ship and crew life; 3 - propulsion systems alternative: conventional propulsion and reinforcement of the European defense policy, nuclear propulsion for an operational superiority and for a complementarity with the Charles de Gaulle. (J.S.)

  17. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  18. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  19. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  20. Review of flat panel display programs and defense applications

    Science.gov (United States)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  1. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  2. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  3. Nationalism in Stateless Nations

    DEFF Research Database (Denmark)

    Thomsen, Robert Chr.

    "Nationalism in Stateless Nations" explores national identities and nationalist movements since 1967, using the examples of Scotland and Newfoundland. Adding to the debate about globalisation and the future of the nation-state, the book argues that ethnically rooted nationalism in modern liberal ...... - intellectuals, political parties and the media - the book combines historical, sociological, political and media studies analyses in an interdisciplinary investigation, providing a comprehensive account of the waxing and waning of nationalism....

  4. The Excessive Profits of Defense Contractors: Evidence and Determinants

    Science.gov (United States)

    2012-04-30

    UNILEVER NV $112,089,508 292 UL 2000 11 MOOG, INC. $111,608,841 293 MOG.A 3728 11 ALON USA L.P. $111,102,800 296 ALJ 2911 11 COCA - COLA ENTERPRISES...audits and investigations. As a national leader in the fight against procurement fraud, Miller participates in the U.S. Attorney General’s Financial Fraud...Excessive Profits of Defense Contractors: Evidence and Determinants1 Chong Wang—Wang is an assistant professor of financial management in the

  5. Processing and certification of defense transuranic waste at the INEL

    International Nuclear Information System (INIS)

    Clements, T.L. Jr.; Cargo, C.H.; McKinley, K.B.; Smith, T.H.; Anderson, B.C.

    1984-01-01

    Since 1970, defense-generated transuranic waste has been placed into 20-year retrievable storage at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory (INEL). A major objective of the US Department of Energy (DOE) Nuclear Waste Management Program is to remove all retrievably stored transuranic waste form the INEL. To support this objective, the Stored Waste Examination Pilot Plant (SWEPP) and the Process Experimental Pilot Plant (PREPP) are currently being constructed. SWEPP will certify waste, using nondestructive examination techniques, for shipment to the Waste Isolation Pilot Plant (WIPP). PREPP will process uncertifiable waste into a certifiable waste form. 3 references

  6. Defense Base Realignment and Closure Budget Data for the Realignment of Navy and Air Force Food Services Training at Lackland Air Force Base, Texas

    National Research Council Canada - National Science Library

    Granetto, Paul

    1996-01-01

    ... of the FY 1997 audit coverage. Public Law 102-190, "National Defense Authorization Act for Fiscal Years 1992 and 1993," December 5, 1991, directs the Secretary of Defense to ensure that the amount of the authorization that DoD...

  7. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  8. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  9. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  10. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  11. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  12. The Defense Resource Allocation Process

    National Research Council Canada - National Science Library

    Keller, William

    1997-01-01

    Above all, this book is about DECISION MAKING. In particular, it attempts to describe the formalized process by which we in the United States make and implement decisions about resources for our national security...

  13. Transforming Defense Basic Research Strategy

    National Research Council Canada - National Science Library

    Fountain, Augustus W

    2004-01-01

    ... technologies for development. With a basic research budget less than half that of the National Science Foundation and a mere fraction that of the NIH the DoD can no longer afford to pursue lofty science education goals...

  14. Mental incapacity defenses at the War Crimes Tribunal: questions and controversy.

    Science.gov (United States)

    Sparr, Landy F

    2005-01-01

    Following a report from the Secretary General in May 1993, the United Nations Security Council adopted Resolution 827 and its Statute establishing an International War Crimes Tribunal for the Former Yugoslavia (ICTY) located in The Hague, The Netherlands. Although such action has been discussed in the past, this is the first time the international community has established a tribunal to indict and try individuals for war crimes. The crimes had been previously "created" by multilateral international treaties. The ICTY Rules of Procedure and Evidence allowed for "any special defense, including that of diminished or lack of mental responsibility." Precise legal parameters of the defense were not specified. In 1998, a defendant at the ICTY "Celebici" Trial named Esad Landzo raised the defense of diminished mental responsibility. The Celebici Trial Chamber thus became the first legal body to consider reduced mental capacity as it applies to international criminal law. This article is an examination of the application of the affirmative defense of diminished responsibility at the ICTY and relates the process to the need for further definition of mental incapacity defenses at the newly established International Criminal Court (ICC). At the ICC preparatory commission, drafting material elements of crimes was emphasized, with less consideration given to mental elements. That diminished capacity and diminished-responsibility defenses have often confused scholars and practitioners alike is explored in this article with suggestions for further directions.

  15. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  16. 40 CFR 1042.635 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption for...

  17. 40 CFR 85.1708 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  18. Meeting national challenges with science, engineering, and technology

    International Nuclear Information System (INIS)

    1992-03-01

    This report discusses research in the following areas at Lawrence Livermore National Laboratory: national challenges; the Livermore Laboratory; national defense: preserving peace in a rapidly changing world; energy: clean and economic; environment: from the microscopic to the global; health: genetics and biomedicine; economy: bringing laboratory technology to the US market; education: sparking interest in science; and the Livermore Laboratory: a national resource

  19. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  20. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  1. 32 CFR Appendix A to Part 555 - Director of Defense Research and Engineering

    Science.gov (United States)

    2010-07-01

    ... be limited to 3% of the professional man-years at that laboratory unless expressed approval of the... function at the National Science Foundation shall not exceed two man-years per year through FY 76, subject... definition where existing Defense technology offers a unique potential solution. ...

  2. Charges Assessed the Army by the Defense Logistics Agency for Deployable Medical Systems

    National Research Council Canada - National Science Library

    1995-01-01

    .... Deployable medical systems are standardized modular field hospitals that can be prepositioned in the event of a contingency, national emergency, or war operations. In FY 1994, the Defense Personnel Support Center billed the Army $25 million for acquiring and assembling deployable medical systems.

  3. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available . The result is that many countries are not properly prepared, nor adequately protected by legislation, in the event of a cyber attack on a national level. This article will address the international cyber defense collaboration problem by looking at the impact...

  4. 78 FR 59854 - Defense Federal Acquisition Regulation Supplement: Acquisitions in Support of Operations in...

    Science.gov (United States)

    2013-09-30

    ...)(xxvi); 0 b. Removing paragraph (f)(xxvii) and redesignating paragraphs (f)(xxviii) through (xxxii) as.... Adding a new paragraph (f)(xxxii); and 0 e. Revising paragraphs (f)(xxxiv) and (xxxv). The revisions and... National Defense Authorization Act for Fiscal Year 2008 (Pub. L. 110-181). * * * * * (xxxii) Use the clause...

  5. West European and East Asian Perspectives on Defense, Deterrence and Strategy. Volume 1. Main Report.

    Science.gov (United States)

    1984-05-16

    this School -- especially in the SDP under David Owen’s leadership -- in raising the nuclear threshold in Europe by strengthening conventional...ConrolDEPARTMENT OF DEFENSE CONTRACTORS US European Commnand ATTN: ECJ-3 Grumman-CTEC. Inc ATTM: ECJ-5 ATTN: S. Shrier us National Military

  6. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  7. Integrated Unit Deployments: Rethinking Air National Guard Fighter Mobilizations

    Science.gov (United States)

    2016-06-01

    participation in the homeland defense mission. But they emphasized that homeland defense would not become an exclusive ANG mission. Operation...station that can absorb pilots and maintainers left behind. Few Air National Guard squadrons enjoy this luxury . Only Air Guard squadrons that are part

  8. [Overdiagnosis and defensive medicine in occupational medicine].

    Science.gov (United States)

    Berral, Alessandro; Pira, Enrico; Romano, Canzio

    2014-01-01

    In clinical medicine since some years overdiagnosis is giving rise to growing attention and concern. Overdiagnosis is the diagnosis of a "disease" that will never cause symptoms or death during a patient's lifetime. It is a side effect of testing for early forms of disease which may turn people into patients unnecessarily and may lead to treatments that do no good and perhaps do harm. Overdiagnosis occurs when a disease is diagnosed correctly, but the diagnosis is irrelevant. A correct diagnosis may be irrelevant because treatment for the disease is not available, not needed, or not wanted. Four drivers engender overdiagnosis: 1) screening in non symptomatic subjects; 2) raised sensitivity of diagnostic tests; 3) incidental overdiagnosis; 4) broadening of diagnostic criteria for diseases. "Defensive medicine" can play a role. It begs the question of whether even in the context of Occupational Medicine overdiagnosis is possible. In relation to the double diagnostic evaluation peculiar to Occupational Medicine, the clinical and the causal, a dual phenomenon is possible: that of overdiagnosis properly said and what we could define the overattribution, in relation to the assessment of a causal relationship with work. Examples of occupational "diseases" that can represent cases of overdiagnosis, with the possible consequences of overtreatment, consisting of unnecessary and socially harmful limitations to fitness for work, are taken into consideration: pleural plaques, alterations of the intervertebral discs, "small airways disease", sub-clinical hearing impairment. In Italy the National Insurance for occupational diseases (INAIL) regularly recognizes less than 50% of the notified diseases; this might suggest overdiagnosis and possibly overattribution in reporting. Physicians dealing with the diagnosis of occupational diseases are obviously requested to perform a careful, up-to-date and active investigation. When applying to the diagnosis of occupational diseases, proper

  9. Multiyear Procurement (MYP) and Block Buy Contracting in Defense Acquisition: Background and Issues for Congress

    Science.gov (United States)

    2016-07-25

    purposes of convenience. 2 For more on these three funding approaches, see CRS Report RL31404, Defense Procurement : Full Funding Policy— Background... procurement authorities. Section 1023 of H.R. 4909 as reported states (see part in bold): SEC. 1023. National Sea- Based Deterrence Fund. (a... procurement of critical contractor-furnished and Government-furnished components for national sea- based deterrence vessels. The authority under this

  10. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  11. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  12. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  13. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  14. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  15. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  16. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  17. Ballistic Missile Defense and ABM Treaty Limitations

    National Research Council Canada - National Science Library

    Robinson, Brian

    1998-01-01

    The U.S. must critically evaluate our current ballistic missile defense (BMD) strategy. In today's geostrategic context, is it sound strategy to continue to impose 1972 ABM Treaty restrictions on BMD systems development...

  18. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  19. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  20. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  1. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  2. DIFFiCULTIES FOR THE CONCEPTUALIZATION OF SECURITY AND DEFENSE

    Directory of Open Access Journals (Sweden)

    JAIME GARCÍA COVARRUBIAS

    2017-12-01

    Full Text Available The purpose of this essay is to assist to make clear the current confusion when conceptualizing Security and Defense, a fact that impacts the production of educational plans and programs in this issues, taking at the same time a position regarding these concepts. In fact, one of the reasons in the theoretical arena of this difficulty is the existence of a grey zone between each of them, that impacts the security planning process that somehow looses its most important feature, that is, to be clear, precise and focused. To achieve this objective, a relationship between democracy and security is settled, and then differences between both of them will be established. After that, an analysis between “real security” and the one perceived, as well as between effects and conditions will be done in order to conclude that National Security integrates the different sectors’ securities and is vital for the prevailing of the State and its citizens, while citizen security is oriented toward the individuals and must not be confused with National Security. Also, that Defense is another sector of Security, and finally that governments must understood that there will be an space between the current situation or objective security and the perception of how the people believe to live.

  3. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  4. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  5. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  6. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  7. NVLAP activities at Department of Defense calibration laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Schaeffer, D.M. [Defense Nuclear Agency, Alexandria, VA (United States)

    1993-12-31

    There are 367 active radiological instrument calibration laboratories within the U.S. Department of Defense (DoD). Each of the four services in DoD manages, operates, and certifies the technical proficiency and competency of those laboratories under their cognizance. Each service has designated secondary calibration laboratories to trace all calibration source standards to the National Institute of Standards and Technology. Individual service radiological calibration programs and capabilities, present and future, are described, as well as the measurement quality assurance (MQA) processes for their traceability. National Voluntary Laboratory Accreditation Program (NVLAP) programs for dosimetry systems are briefly summarized. Planned NVLAP accreditation of secondary laboratories is discussed in the context of current technical challenges and future efforts.

  8. NVLAP activities at Department of Defense calibration laboratories

    International Nuclear Information System (INIS)

    Schaeffer, D.M.

    1993-01-01

    There are 367 active radiological instrument calibration laboratories within the U.S. Department of Defense (DoD). Each of the four services in DoD manages, operates, and certifies the technical proficiency and competency of those laboratories under their cognizance. Each service has designated secondary calibration laboratories to trace all calibration source standards to the National Institute of Standards and Technology. Individual service radiological calibration programs and capabilities, present and future, are described, as well as the measurement quality assurance (MQA) processes for their traceability. National Voluntary Laboratory Accreditation Program (NVLAP) programs for dosimetry systems are briefly summarized. Planned NVLAP accreditation of secondary laboratories is discussed in the context of current technical challenges and future efforts

  9. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  10. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  11. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  12. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  14. Breaking the Nordic Defense Deadlock

    Science.gov (United States)

    2015-02-01

    United Nations] was a ‘ luxury good’, only affordable because the Nordics were allowed a free ride on a security order created by the presence of an... Brands Poroshenko ‘Nazi’ Ahead of EU Deal,” BBC News, June 27, 2014, available from www.bbc. co.uk/news/world-europe-28049565, accessed June, 27, 2014

  15. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  16. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  17. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  18. Nation/non-nation

    DEFF Research Database (Denmark)

    Sonnichsen, André; Gad, Ulrik Pram

    2008-01-01

    Is nationality the only way of organizing political community? Given the ubiquity of the national principle, one might think so. But, in practice, the national principle is constantly challenged by what can be termed non-national identities. This article looks at manners in which such deviating...... identities can be conceptualized, how contemporary European states have attempted to deal with them when they arise and to what extent non-national modes of organizing political community can point towards a challenge to the national principle itself. In its capacity as an introduction to the special issue......, this article seeks to frame the subsequent articles within the overarching theme of the tension between national and non-national communities in contemporary Europe....

  19. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  20. Collegiate Cyber Defense Competition Effort

    Science.gov (United States)

    2018-03-01

    grade by Applied Visions personnel. The CIAS also worked with Pacific Northwest National Labs to create a substation, control center, and plant ...center network, substation, and plant network were housed behind a Juniper firewall so that the plant network and substation were only accessible...will not provide copies of their actual network traffic to anyone. On the rare occasions traffic logs are shared, they are typically heavily modified

  1. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  2. Turning on the Dime: Diplomacy's Role in National Security

    National Research Council Canada - National Science Library

    Smith, Anton K

    2007-01-01

    The differences in approach and culture between the U.S. Departments of State and Defense are stark despite the fact that these organizations are members of the same team and share related national objectives...

  3. 75 FR 56461 - National Days of Prayer and Remembrance, 2010

    Science.gov (United States)

    2010-09-15

    ..., 2001, and in the dark days that followed. Innocent men and women were beginning a routine day at work... legacy of the lives lost nine Septembers ago and in defense of our Nation--of husbands and fathers, wives...

  4. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  5. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  6. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  7. Activities in department of energy hazardous and mixed waste defense waste management

    International Nuclear Information System (INIS)

    Eyman, L.D.

    1988-01-01

    In January 1986, the U.S. Department of Energy (DOE) Office of Assistant Secretary for Defense Programs (DP) created the Hazardous Waste and Remedial Actions Division within the Office of Defense Waste and Transportation Management. The Oak Ridge Operations Office (ORO) was assigned the responsibility for supporting DOE Headquarters (HQ) in planning nationally integrated activities for Resource Conservation and Recovery Act/Comprehensive Environmental Response, Compensation, and Liability Act/Superfund Amendments and Reauthorization Act (RCRA/CERCLA/SARA) compliance. In turn, ORO created the Hazardous Waste Remedial Actions Program Support Contractor Office (HAZWRAPSCO) to assist with the expanded lead assignment. The HAZWRAPSCO activities are currently supported by three distinct DOE-HQ funding elements: the Environmental Restoration Program, the Hazardous Waste Compliance Technology Program, and the Hazardous Waste Research and Development R and D Program. The Environmental Restoration Program is discussed in the paper, entitled The DOE Defense Program for Environmental Restoration

  8. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  9. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  10. Health transformation project and defensive medicine practice among neurosurgeons in Turkey.

    Science.gov (United States)

    Solaroglu, Ihsan; Izci, Yusuf; Yeter, H Gokce; Metin, M Mert; Keles, G Evren

    2014-01-01

    The term "Defensive" medicine was coined in the early 1970's and has been an important topic of scientific investigation and professional debate ever since. The aim of this study was to investigate the characteristics of defensive medicine, its reasons, and the extent to which it is practiced in the Turkish health care system. This is the first national survey to study the practice of defensive medicine among neurosurgeons in Turkey. The present cross-sectional study on defensive medicine assessed neurosurgeons registered at the Turkish Neurosurgical Society, who are actively working in various centers and hospitals within the Turkish health care system. A 40-question survey was adapted from existing measures described in the literature and was completed by a total of 404 neurosurgeons, representing 36.7% of the neurosurgeons registered at the Turkish Neurosurgical Society. Seventy-two percent of the participants in the current study reported practicing defensive medicine. This practice was mainly reported among inexperienced neurosurgeons (74.4%). Most were younger than 40 years of age (75.2%), working in state hospitals/universities (72.7%), and living in the Marmara region (38%). Respondents reported engaging in defensive medicine by avoiding high-risk surgery (62.6%), ordering additional imaging studies (60.9%) and laboratory tests (33.7%), and referring patients to consultants (31.2%). Most participants consider every patient as a potential threat in terms of a medical lawsuit (68.3%) and do not believe the courts can distinguish malpractice from complications (89.6%). Concerns and perceptions about medical liability lead neurosurgeons to practice defensive medicine. By avoiding high-risk surgery, ordering unnecessary diagnostic tests, and referring the patients to consultants, neurosurgeons try to minimize the risk of malpractice and protect themselves from legal risks, resulting in higher healthcare expenditure and longer treatment periods.

  11. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  12. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  13. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  14. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  15. FY85 Program plan for the Defense Transuranic Waste Program (DTWP)

    International Nuclear Information System (INIS)

    1984-11-01

    The Defense TRU Waste Program (DTWP) is the focal point for the Department of Energy in national planning, integration, and technical development for TRU waste management. The scope of this program extends from the point of TRU waste generation through delivery to a permanent repository. The TRU program maintains a close interface with repository development to ensure program compatibility and coordination. The defense TRU program does not directly address commercial activities that generate TRU waste. Instead, it is concerned with providing alternatives to manage existing and future defense TRU wastes. The FY85 Program Plan is consistent with the Defense TRU Waste Program goals and objectives stated in the Defense Transuranic Waste Program Strategy Document, January 1984. The roles of participants, the responsibilities and authorities for Research and Development (R and D), the organizational interfaces and communication channels for R and D and the establishment of procedures for planning, reporting, and budgeting of all R and D activities meet requirements stated in the Technical Management Plan for the Transuranic Waste Management Program. The Program Plan is revised as needed. The work breakdown structure is reflected graphically immediately following the Administration section and is described in the subsequent narrative. Detailed budget planning (i.e., programmatic funding and capital equipment) is presented for FY85; outyear budget projections are presented for future years

  16. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  17. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  18. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  19. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  20. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  1. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  2. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  3. Defense Waste Processing Facility Recycle Stream Evaporation

    International Nuclear Information System (INIS)

    STONE, MICHAEL

    2006-01-01

    The Defense Waste Processing Facility (DWPF) at the Savannah River Site (SRS) stabilizes high level radioactive waste (HLW) by vitrification of the waste slurries. DWPF currently produces approximately five gallons of dilute recycle for each gallon of waste vitrified. This recycle stream is currently sent to the HLW tank farm at SRS where it is processed through the HLW evaporators with the concentrate eventually sent back to the DWPF for stabilization. Limitations of the HLW evaporators and storage space constraints in the tank farm have the potential to impact the operation of the DWPF and could limit the rate that HLW is stabilized. After an evaluation of various alternatives, installation of a dedicated evaporator for the DWPF recycle stream was selected for further evaluation. The recycle stream consists primarily of process condensates from the pretreatment and vitrification processes. Other recycle streams consist of process samples, sample line flushes, sump flushes, and cleaning solutions from the decontamination and filter dissolution processes. The condensate from the vitrification process contains some species, such as sulfate, that are not appreciably volatile at low temperature and could accumulate in the system if 100% of the evaporator concentrate was returned to DWPF. These species are currently removed as required by solids washing in the tank farm. The cleaning solutions are much higher in solids content than the other streams and are generated 5-6 times per year. The proposed evaporator would be required to concentrate the recycle stream by a factor of 30 to allow the concentrate to be recycled directly to the DWPF process, with a purge stream sent to the tank farm as required to prevent buildup of sulfate and similar species in the process. The overheads are required to meet stringent constraints to allow the condensate to be sent directly to an effluent treatment plant. The proposed evaporator would nearly de-couple the DWPF process from the

  4. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  5. 40 CFR 90.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  6. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  7. Missile proliferation and missile defense

    International Nuclear Information System (INIS)

    Zarif, M. Javad

    2002-01-01

    The global security environment is becoming increasingly volatile and dangerous. A new arms race is looming in the horizon ... [Missiles have] become the strong weapon of the poor and the discriminated against who find themselves vulnerable to outside threat. They believe missiles may prove instrumental in deterring the enemy from beginning a full scale war ... the engagement of all states at the United Nations in the issue of missiles, through the panel of governmental experts, and the new idea of exploring the subject in the Conference on Disarmament do provide a dim light at the end of the tunnel. ... Efforts at non-proliferation of missiles are more likely to succeed when viewed as an integral part of a global and comprehensive negotiation and progress in other areas of disarmament. (author)

  8. 32 CFR 553.7 - Design and layout of Army national cemeteries.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Design and layout of Army national cemeteries... RESERVATIONS AND NATIONAL CEMETERIES ARMY NATIONAL CEMETERIES § 553.7 Design and layout of Army national cemeteries. (a) General cemetery layout plans, landscape planting plans and gravesite layout plans for Army...

  9. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R L; Price, D E; Spero, K K

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  10. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R.L. Jr.; Price, D.E.; Spero, K.K.

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented

  11. GNF Defense in Depth Update

    Energy Technology Data Exchange (ETDEWEB)

    Lingenfelter, Andrew A.; Schneider, Robert J.; Cantonwine, Paul E.; Moore, Brian; Rea, John; Crawford, Douglas C. [Global Nuclear Fuel, P.O. Box 780 M/C H25, Wilmington, NC 28402 (United States)

    2009-06-15

    Global Nuclear Fuel (GNF) has designed, fabricated, and placed into operation more than 9 million fuel rods in approximately 135 thousand assemblies. Customer satisfaction has always compelled GNF to reduce fuel rod failures (defined here as fuel rods that breach or leak in service), However, increasing success with and subsequent expectations for economic performance of nuclear reactor plants have raised broader Industry emphasis on fuel reliability. In 2005, GNF established its Defense-in-Depth (DID) Program for the purpose of focusing attention on the many aspects of fuel design, fabrication, performance, and utilization that affect fuel reliability as well as on the key methods that govern the utilization of GNF fuel. The Program is structured to address each of the identified in-service, fuel failure mechanisms. This paper provides a summary of GNF fuel performance, following previous updates. This paper will discuss recent GNF fuel reliability and channel performance, GNF2 introduction status, and methods. GNF's more recent fuel experience includes approximately 3.8 million GE11/13 (9x9) and GE12/14 (10x10) fuel rods, well over half of which are the GE12/14 design. (Those figures also include roughly 25,000 recently-introduced GNF2 fuel rods.) Reliability, expressed as annual, observed fuel failure rates (i.e., number of rods failed each year divided by the number of opportunities, or fuel rods in service), has improved for each year since 2005. The GNF fuel failure rate for years leading up to 2007 and 2008 has been on the order of 5 to 7 ppm (excluding the corrosion events of 2001-2003), and as of this writing (January 2009) the current in-service failure has decreased to around 1.5 ppm. Failures in GE14 fuel rod failures have been primarily due to debris-fretting (> 60%), with other failures being duty-related or yet undetermined. The only failure observed in GNF2 to date was a single, early-life debris failure in a bundle not equipped with GNF

  12. Defense waste processing facility radioactive operations. Part 1 - operating experience

    International Nuclear Information System (INIS)

    Little, D.B.; Gee, J.T.; Barnes, W.M.

    1997-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, SC is the nation's first and the world's largest vitrification facility. Following a ten year construction program and a 3 year non-radioactive test program, DWPF began radioactive operations in March 1996. This paper presents the results of the first 9 months of radioactive operations. Topics include: operations of the remote processing equipment reliability, and decontamination facilities for the remote processing equipment. Key equipment discussed includes process pumps, telerobotic manipulators, infrared camera, Holledge trademark level gauges and in-cell (remote) cranes. Information is presented regarding equipment at the conclusion of the DWPF test program it also discussed, with special emphasis on agitator blades and cooling/heating coil wear. 3 refs., 4 figs

  13. Defense Waste Processing Facility -- Radioactive operations -- Part 3 -- Remote operations

    International Nuclear Information System (INIS)

    Barnes, W.M.; Kerley, W.D.; Hughes, P.D.

    1997-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, South Carolina is the nation's first and world's largest vitrification facility. Following a ten year construction period and nearly three years of non-radioactive testing, the DWPF began radioactive operations in March 1996. Radioactive glass is poured from the joule heated melter into the stainless steel canisters. The canisters are then temporarily sealed, decontaminated, resistance welded for final closure, and transported to an interim storage facility. All of these operations are conducted remotely with equipment specially designed for these processes. This paper reviews canister processing during the first nine months of radioactive operations at DWPF. The fundamental design consideration for DWPF remote canister processing and handling equipment are discussed as well as interim canister storage

  14. PERSPECTIVES ON INTEROPERABILITY INTEGRATION WITHIN NATO DEFENSE PLANNING PROCESS

    Directory of Open Access Journals (Sweden)

    Florian CIOCAN

    2011-01-01

    Full Text Available Interoperability is not a new area of effort at NATO level. In fact, interoperability and more specifi cally standardization, has been a key element of the Alliance’s approach to fi elding forces for decades. But as the security and operational environment has been in a continuous change, the need to face the new threats and the current involvement in challenging operations in Afghanistan and elsewhere alongside with the necessity to interoperate at lower and lower levels of command with an increasing number of nations, including non-NATO ISAF partners, NGOs, and other organizations, have made the task even more challenging. In this respect Interoperability Integration within NATO Defense Planning Process will facilitate the timely identifi cation, development and delivery of required forces and capabilities that are interoperable and adequately prepared, equipped, trained and supported to undertake the Alliance’s full spectrum of missions.

  15. 3 CFR 8377 - Proclamation 8377 of May 11, 2009. National Defense Transportation Day and National...

    Science.gov (United States)

    2010-01-01

    ... modes of travel save businesses and consumers money, and can reduce impacts on our environment. To..., transportation is vital to keeping Americans safe. Global climate change and our reliance on foreign oil have... thousands of jobs. To make the most of every taxpayer dollar, my Administration is working side-by-side with...

  16. Budgeting for the Nation’s Defense Following the End of National Conflicts

    Science.gov (United States)

    2009-06-01

    anticipation of the probable and preparation for the possible. It is, in a word, alchemy ; a method of transmutation from idea into action.”8 These...this combination, Congress disbanded the army at the end of the Revolutionary War due to financial concerns as the war had resulted in “the finances

  17. 78 FR 28707 - National Defense Transportation Day and National Transportation Week, 2013

    Science.gov (United States)

    2013-05-15

    ... security. At a time when our cities face unprecedented threats and hazards, we must do more to ensure our... essential to making the United States the best place in the world to do business. In the past 4 years, we... private capital to upgrade the infrastructure our businesses need most. These initiatives would help...

  18. 76 FR 29135 - National Defense Transportation Day and National Transportation Week, 2011

    Science.gov (United States)

    2011-05-19

    ... define our economy, increasing the productivity of our people and our land. Our transportation system... rapidly empowers our men and women in uniform to respond to crises or natural disasters at home and abroad... work started by the American Recovery and Reinvestment Act to maintain a world-class logistics network...

  19. Structural evaluation of multifunctional flood defenses

    NARCIS (Netherlands)

    Voorendt, M.Z.; Kothuis, Baukje; Kok, Matthijs

    2017-01-01

    Flood risk reduction aims to minimize losses in low-lying areas. One of the ways to reduce flood risks is to protect land by means of flood defenses. The Netherlands has a long tradition of flood protection and, therefore, a wide variety of technical reports written

  20. Excessive Profits of German Defense Contractors

    Science.gov (United States)

    2014-09-01

    its business unit Thyssen Krupp Marine Systems, is a German defense contractor. (2) Tognom AG Tognum AG owned the MTU Friedrichshafen GmbH before... Friedrichshafen provided engines for many ships of the German Navy and for German battle tanks, such as the Leopard I and Leopard II. MTU refers to the

  1. The Transferability and Retraining of Defense Engineers.

    Science.gov (United States)

    Rittenhouse, Carl H.

    This study was undertaken to describe any special barriers to the transfer of engineers from defense to commercial work, and to evaluate retraining and reorientation techniques that might help ease the transfer. Interviews and questionnaires were used to obtain data from about 2,100 engineers and 100 managers in 14 industries. Characteristics,…

  2. Pathogen Pressure Puts Immune Defense into Perspective

    NARCIS (Netherlands)

    Horrocks, Nicholas P. C.; Matson, Kevin D.; Tieleman, B. Irene

    2011-01-01

    The extent to which organisms can protect themselves from disease depends on both the immune defenses they maintain and the pathogens they face. At the same time, immune systems are shaped by the antigens they encounter, both over ecological and evolutionary time. Ecological immunologists often

  3. DETERMINATION OF DEFENSE MECHANISM IN Phaseolus ...

    African Journals Online (AJOL)

    Administrator

    Field studies were conducted to determine the role of defense mechanism in various parameters associated with plant protection subjected to UV-B radiation in Phaseolus trilobus Ait. commonly used as green manure and fodder. Spectrophotometric analysis showed that UV-B radiation decreases the chlorophyll content ...

  4. Defense.gov Special Report: Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2012 Fiscal Budget Published Feb. 15, 2011 Top Stories Commanders Cite Department is losing billions of dollars by Congress' failure to pass the department's fiscal 2011 budget . Gates told a Senate committee. Story Gates, Mullen Take Budget to Senate WASHINGTON, Feb. 17, 2011 - The

  5. Under Secretary of Defense (Comptroller) > Budget

    Science.gov (United States)

    functionalStatements OUSD(C) History FMR Budget Materials Budget Execution Financial Management Improving Financial Performance Reports Regulations Press Release | Budget Briefing | Transcripts: David L. Norquist, Under PDF document. Click on Excel icon for Excel document Overview - FY2019 Defense Budget Performance

  6. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  7. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  8. Defense.gov - Special Report - Cybersecurity

    Science.gov (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  9. Department of Defense Education Activity. An Overview.

    Science.gov (United States)

    US Department of Defense, 2004

    2004-01-01

    DoDEA operates 223 public schools in 16 districts located in seven states, Puerto Rico, Guam, and 13 foreign countries to serve the children of military service members and Department of Defense civilian employees. Approximately 104,935 students are enrolled in DoDEA schools, with approximately 73,200 students in the DoDDS system, and…

  10. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  11. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Innovation in the Defense Acquisition Enterprise

    Science.gov (United States)

    2015-12-01

    uni- versities in the fields of innovation and entrepreneurship . Many books and articles have been written on innovation, perhaps none more well...partners has been the possible loss of freedom to make their own IR&D invest- ment decisions. That was never my intent . I once ran a major defense

  13. Iraqi Civil Defense Headquarters Baghdad, Iraq

    National Research Council Canada - National Science Library

    Johnston, Angelina; O'Connor, Kevin; Rawal, Yogin

    2007-01-01

    .... The assessment team included two engineers/inspectors and three auditors/inspectors. The overall objective of the project was to fully renovate the Civil Defense Headquarters and other buildings on the site to become a fully operational and usable facility.

  14. DefenseLink Special: Veterans Day 2006

    Science.gov (United States)

    information so we can address your issue or question. U.S. Department of Defense Header Image (click to return especially important this year as America's military members put their lives in danger to protect the country Service. Story Cities Carry ASY Banner to Honor Past, Present Veterans WASHINGTON, Nov. 8, 2006 - Veterans

  15. The National Ignition Facility Project

    International Nuclear Information System (INIS)

    Paisner, J.A.; Campbell, E.M.; Hogan, W.J.

    1994-01-01

    The mission of the National Ignition Facility is to achieve ignition and gain in inertial confinement fusion targets in the laboratory. The facility will be used for defense applications such as weapons physics and weapons effects testing, and for civilian applications such as fusion energy development and fundamental studies of matter at high temperatures and densities. This paper reviews the design, schedule, and costs associated with the construction project

  16. The National Ignition Facility Project

    International Nuclear Information System (INIS)

    Paisner, J.A.; Campbell, E.M.; Hogan, W.J.

    1994-01-01

    The mission of the National Ignition Facility is to achieve ignition and gain in ICF targets in the laboratory. The facility will be used for defense applications such as weapons physics and weapons effect testing, and for civilian applications such as fusion energy development and fundamental studies of matter at high temperatures and densities. This paper reviews the design, schedule and costs associated with the construction project

  17. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  18. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  19. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  20. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  1. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  2. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  3. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  4. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  5. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  6. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  7. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  8. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  9. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  10. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  11. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  12. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  13. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  14. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  15. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  16. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  17. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  18. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  19. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  20. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...