WorldWideScience

Sample records for sarin attack disaster

  1. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  2. Sarin

    Science.gov (United States)

    ... killers) called organophosphates in terms of how they work and what kind of harmful effects they cause. However, nerve agents are much more ... 106(1): 55-62, 2013. Sarin Causes Autonomic Imbalance and Cardiomyopathy: An ... Technol. Biomed. Life Sci., 2010, 878, 1207–1215. Smart JK. History ...

  3. Lessons learned from the Syrian sarin attack: evaluation of a clinical syndrome through social media.

    Science.gov (United States)

    Rosman, Yossi; Eisenkraft, Arik; Milk, Nadav; Shiyovich, Arthur; Ophir, Nimrod; Shrot, Shai; Kreiss, Yitshak; Kassirer, Michael

    2014-05-06

    On the night of 21 August 2013, sarin was dispersed in the eastern outskirts of Damascus, killing 1400 civilians and severely affecting thousands more. This article aims to delineate the clinical presentation and management of a mass casualty event caused by a nerve agent as shown in the social media. Authors searched YouTube for videos uploaded of this attack and identified 210 videos. Of these, 67 met inclusion criteria and were evaluated in the final analysis.These videos displayed 130 casualties; 119 (91.5%) of which were defined as moderately injured or worse. The most common clinical signs were dyspnea (53.0%), diaphoresis (48.5%), and loss of consciousness (40.7%). Important findings included a severe shortage of supporting measures and lack of antidotal autoinjectors. Decontamination, documented in 25% of the videos, was done in an inefficient manner. Protective gear was not noticed, except for sporadic use of latex gloves and surgical masks.This is believed to be the first time that social media was used to evaluate clinical data and management protocols to better prepare against future possible events.

  4. Extending injury prevention methodology to chemical terrorism preparedness: the Haddon Matrix and sarin.

    Science.gov (United States)

    Varney, Shawn; Hirshon, Jon Mark; Dischinger, Patricia; Mackenzie, Colin

    2006-01-01

    The Haddon Matrix offers a classic epidemiological model for studying injury prevention. This methodology places the public health concepts of agent, host, and environment within the three sequential phases of an injury-producing incident-pre-event, event, and postevent. This study uses this methodology to illustrate how it could be applied in systematically preparing for a mass casualty disaster such as an unconventional sarin attack in a major urban setting. Nineteen city, state, federal, and military agencies responded to the Haddon Matrix chemical terrorism preparedness exercise and offered feedback in the data review session. Four injury prevention strategies (education, engineering, enforcement, and economics) were applied to the individual factors and event phases of the Haddon Matrix. The majority of factors identified in all phases were modifiable, primarily through educational interventions focused on individual healthcare providers and first responders. The Haddon Matrix provides a viable means of studying an unconventional problem, allowing for the identification of modifiable factors to decrease the type and severity of injuries following a mass casualty disaster such as a sarin release. This strategy could be successfully incorporated into disaster planning for other weapons attacks that could potentially cause mass casualties.

  5. Aum Shinrikyo's Chemical and Biological Weapons: More Than Sarin.

    Science.gov (United States)

    Tu, A T

    2014-07-01

    The radical religious group Aum Shinrikyo was founded in Japan in the 1980s and grew rapidly in the 1990s. Aum members perpetrated a mass murder in Matsumoto City in 1994, where they used sarin as a chemical weapon to poison approximately 500 civilians. On March 20, 1995, Aum deployed sarin in an even larger terrorist attack on the Tokyo Subway System, which poisoned some 6,000 people. After the Tokyo Subway attack, the Japanese Police arrested the sect's senior members. From 2005 through 2011, 13 of these senior members were sentenced to death. In this article, aspects of Aum's chemical and biological terrorism are reviewed. Sarin production efforts by the sect are described, including how the degradation product of sarin in soil, methylphosphonic acid, enabled the detection of sarin production sites. Also, Aum's chemical-warfare agents other than sarin are described, as are its biological weapons. The author was permitted by the Japanese government to interview Dr. Tomomasa Nakagawa, one of the senior members of Aum Shinrikyo. From Dr. Nakagawa the author obtained valuable inside information about Aum's chemical and biological weapons programs. Copyright © 2014 Central Police University.

  6. The World Trade Center Attack Disaster preparedness: health care is ready, but is the bureaucracy?

    Science.gov (United States)

    Mattox, Kenneth

    2001-01-01

    When a disaster occurs, it is for governments to provide the leadership, civil defense, security, evacuation, and public welfare. The medical aspects of a disaster account for less than 10% of resource and personnel expenditure. Hospitals and health care provider teams respond to unexpected occurrences such as explosions, earthquakes, floods, fires, war, or the outbreak of an infectious epidemic. In some geographic locations where natural disasters are common, such as earthquakes in Japan, such disaster practice drills are common. In other locations, disaster drills become pro forma and have no similarity to real or even projected and predicted disasters. The World Trade Center disaster on 11 September 2001 provides new information, and points out new threats, new information systems, new communication opportunities, and new detection methodologies. It is time for leaders of medicine to re-examine their approaches to disaster preparedness. PMID:11737919

  7. Pathways for the Oxidation of Sarin in Urban Atmospheres

    Energy Technology Data Exchange (ETDEWEB)

    Gerald E. Streit; James E. Bossert; Jeffrey S. Gaffney; Jon Reisner; Laurie A. McNair; Michael Brown; Scott Elliott

    1998-11-01

    Terrorists have threatened and carried out chemicalhiological agent attacks on targets in major cities. The nerve agent sarin figured prominently in one well-publicized incident. Vapors disseminating from open containers in a Tokyo subway caused thousands of casualties. High-resolution tracer transport modeling of agent dispersion is at hand and will be enhanced by data on reactions with components of the urban atmosphere. As a sample of the level of complexity currently attainable, we elaborate the mechanisms by which sarin can decompose in polluted air. A release scenario is outlined involving the passage of a gas-phase agent through a city locale in the daytime. The atmospheric chemistry database on related organophosphorus pesticides is mined for rate and product information. The hydroxyl,radical and fine-mode particles are identified as major reactants. A review of urban air chernistry/rnicrophysics generates concentration tables for major oxidant and aerosol types in both clean and dirty environments. Organic structure-reactivity relationships yield an upper limit of 10-1' cm3 molecule-' S-* for hydrogen abstraction by hydroxyl. The associated midday loss time scale could be as little as one hour. Product distributions are difficult to define but may include nontoxic organic oxygenates, inorganic phosphorus acids, sarin-like aldehydes, and nitrates preserving cholinergic capabilities. Agent molecules will contact aerosol surfaces in on the order of minutes, with hydrolysis and side-chain oxidation as likely reaction channels.

  8. Fear of Terrorism and Preparedness in New York City 2 Years After the Attacks: Implications for Disaster Planning and Research

    Science.gov (United States)

    Boscarino, Joseph A.; Adams, Richard E.; Figley, Charles R.; Galea, Sandro; Foa, Edna B.

    2009-01-01

    Objectives To help improve disaster planning and research, we studied psychosocial predictors of terrorism fear and preparedness among New York City residents after the World Trade Center disaster (WTCD). Method We conducted a random cross-sectional survey of 1,681 adults interviewed 2 years after the WTCD. Participants were living in New York City at the time of the attack and exposed to ongoing terrorist threats. Results We found 44.9 percent (95% confidence interval [CI] = 41.9−47.9) of residents were concerned about future attacks and 16.9 percent (95% CI = 14.7−19.3) reported a fear level of “10” on a 10-point analog scale. Furthermore, 14.8 percent (95% CI = 12.8−17.0) reported they had made some plans for a future attack, a significant increase from the previous year. In addition, although 42.6 percent (95% CI = 39.6−45.7) indicated that they would likely wait for evacuation instructions following a chemical, biological, or nuclear attack, 34.4 percent (95% CI = 31.5−37.3) reported they would evacuate immediately against official advice. Predictors of high terrorism fear in a multivariate model included Hispanic ethnicity (odds ratio [OR] = 2.0, P = .006), lower education (OR = 4.4, P terrorism threats, terrorism fear and preparedness were related to socioeconomic factors, mental health status, terrorism exposure levels, and exposure to stressful life events. PMID:17041297

  9. The current state of affairs for disaster planning for a nuclear terrorist attack.

    Science.gov (United States)

    Goffman, Thomas E

    2009-01-01

    The author presents current thinking on the effects of an atomic bomb blast from a medical point of view and will argue that current US Federal plans for a nuclear disaster are simply crude, insufficient, disarticulated, and principally relies on martial law as a means of crowd control. The simple physics of a fusion reaction bomb is discussed along with the plans of other countries, apparently "secret"American plans, which show a poor knowledge of the physics of nuclear bombs as well as poor insight into what will be needed to help the maximum number of citizens. An alternative plan involving computer modeling and educating the public to the effects of a fission explosion are presented. The key issue of statewide planning is discussed, as the Federal government has dumped medical problems on "the local level."

  10. Synthesis of [11C]-Sarin

    International Nuclear Information System (INIS)

    Prenant, C.; Crouzel, C.

    1990-01-01

    [ 11 C]-acetone, prepared from 11 CO 2 and methyllithium, was reduced to [ 11 C]-isopropanol. The latter reacted with methylphosphonic acid difluoride in the presence of diisopropylamine, to yield [11C]-sarin. 3.4 GBq (100 mCi) of [ 11 C]-sarin may be obtained from about 55.5 GBq (1.5 Ci) of 11 CO 2 in 40 minutes. The product purified by HPLC, is obtained with a specific radioactivity ranging from 22.2 to 33.3 GBq (600 to 900 mCi/μmol.). (author)

  11. Synthesis of specific labelled [methyl-14C]sarin

    International Nuclear Information System (INIS)

    Sin-Ren, A.C.; Riggio, G.; Hopff, W.H.; Waser, P.G.

    1988-01-01

    The synthesis of [methyl- 14 C]sarin ([ 14 C]methylphosphono-fluoridic acid 1-methylethyl ester) was accomplished by another approach as for nonlabelled sarin in a tele-conducted reaction vessel. The purity was estimated by IR, GC, and GC-MS and the stability in different media was examined. (author)

  12. The effects of repeated low-dose sarin exposure

    International Nuclear Information System (INIS)

    Shih, T.-M.; Hulet, S.W.; McDonough, J.H.

    2006-01-01

    This project assessed the effects of repeated low-dose exposure of guinea pigs to the organophosphorus nerve agent sarin. Animals were injected once a day, 5 days per week (Monday-Friday), for 2 weeks with fractions (0.3x, 0.4x, 0.5x, or 0.6x) of the established LD 5 dose of sarin (42 μg/kg, s.c.). The animals were assessed for changes in body weight, red blood cell (RBC) acetylcholinesterase (AChE) levels, neurobehavioral reactions to a functional observational battery (FOB), cortical electroencephalographic (EEG) power spectrum, and intrinsic acetylcholine (ACh) neurotransmitter (NT) regulation over the 2 weeks of sarin exposure and for up to 12 days postinjection. No guinea pig receiving 0.3, 0.4 or 0.5 x LD 5 of sarin showed signs of cortical EEG seizures despite decreases in RBC AChE levels to as low as 10% of baseline, while seizures were evident in animals receiving 0.6 x LD 5 of sarin as early as the second day; subsequent injections led to incapacitation and death. Animals receiving 0.5 x LD 5 sarin showed obvious signs of cholinergic toxicity; overall, 2 of 13 animals receiving 0.5 x LD 5 sarin died before all 10 injections were given, and there was a significant increase in the angle of gait in the animals that lived. By the 10th day of injection, the animals receiving saline were significantly easier to remove from their cages and handle and significantly less responsive to an approaching pencil and touch on the rump in comparison with the first day of testing. In contrast, the animals receiving 0.4 x LD 5 sarin failed to show any significant reductions in their responses to an approaching pencil and a touch on the rump as compared with the first day. The 0.5 x LD 5 sarin animals also failed to show any significant changes to the approach and touch responses and did not adjust to handling or removal from the cage from the first day of injections to the last day of handling. Thus, the guinea pigs receiving the 0.4 and 0.5 x LD 5 doses of sarin failed to

  13. Pseudo LRM waveforms from CryoSat SARin acquisition

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Bouffard, Jerome; Parrinello, Tommaso; Féménias, Pierre

    2016-04-01

    CryoSat was launched on the 8th April 2010 and is the first European ice mission dedicated to the monitoring of precise changes in the thickness of polar ice sheets and floating sea ice. The main payload of CryoSat is a Ku-band pulsewidth limited radar altimeter, called SIRAL (Synthetic interferometric radar altimeter). When commanded in SARIn (synthetic aperture radar interferometry) mode, through coherent along-track processing of the returns received from two antennas, the interferometric phase related to the first arrival of the echo is used to retrieve the angle of arrival of the scattering in the across-track direction. When SIRAL operates in SAR or SARin mode, the obtained waveforms have an along-track resolution and a speckle reduction which is increased with respect to the pulse-limited waveforms. Anyway, in order to analyze the continuity of the geophysical retrieved parameters among different acquisition modes, techniques to transform SARin mode data to pseudo-LRM mode data are welcome. The transformation process is known as SAR reduction and it is worth recalling here that only approximate pseudo-LRM waveforms can be obtained in case of closed burst acquisitions, as SIRAL operates. A SAR reduction processing scheme has been developed to obtain pseudo-LRM waveforms from CryoSat SARin acquisition. As a trade-off between the along-track length on Earth surface contributing to one SARin pseudo-LRM waveform and the noisiness of the waveform itself, it has been chosen a SAR reduction approach based on the averaging of all the SARin echoes received each 20Hz, resulting in one pseudo-LRM waveform for each SARin burst given the SARin burst repetition period. SARin pseudo-LRM waveforms have been produced for CryoSat acquisition both on ice and sea surfaces, aiming at verifying the continuity of the retracked surface height over the ellipsoid between genuine LRM products and pseudo-LRM products. Moreover, the retracked height from the SARin pseudo-LRM has been

  14. Conduct of Occupational Health During Major Disasters: A Comparison of Literature on Occupational Health Issues in the World Trade Center Terrorist Attack and the Fukushima Nuclear Power Plant Accident.

    Science.gov (United States)

    Toyoda, Hiroyuki; Mori, Koji

    2017-01-01

    Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.

  15. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  16. Efficacy of the Tertiary Oxime Monoisonitrosoacetone (MINA) Against Lethal Sarin Intoxication in the Guinea Pig

    Science.gov (United States)

    2007-10-01

    Sarin 5a. CONTRACT NUMBER Intoxication in the Guinea Pig 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Koplovitz, I and...efficacy of MINA as a treatment for lethal sarin (GB) intoxication in guinea pigs . Male animals were challenged subcutaneously (s.c.) with 2 LD50s...oximes that are readily able to enter the brain. 15. SUBJECT TERMS oximes, brain, sarin, reactivation, nerve agents, guinea pigs 16. SECURITY

  17. Nanocrystalline zinc oxide for the decontamination of sarin

    Energy Technology Data Exchange (ETDEWEB)

    Mahato, T.H. [Defense R and D Establishment, Jhansi Road, 474002, Gwalior, MP (India); Prasad, G.K., E-mail: gkprasad@lycos.com [Defense R and D Establishment, Jhansi Road, 474002, Gwalior, MP (India); Singh, Beer; Acharya, J.; Srivastava, A.R.; Vijayaraghavan, R. [Defense R and D Establishment, Jhansi Road, 474002, Gwalior, MP (India)

    2009-06-15

    Nanocrystalline zinc oxide materials were prepared by sol-gel method and were characterized by X-ray diffraction, scanning electron microscopy, thermogravimetry, nitrogen adsorption and infrared spectroscopy techniques. The data confirmed the formation of zinc oxide materials of zincite phase with an average crystallite size of {approx}55 nm. Obtained material was tested as destructive adsorbent for the decontamination of sarin and the reaction was followed by GC-NPD and GC-MS techniques. The reaction products were characterized by GC-MS and the data explored the role of hydrolysis reaction in the detoxification of sarin. Sarin was hydrolyzed to form surface bound non-toxic phosphonate on the surface of nano-zinc oxide. The data also revealed the values of rate constant and half-life to be 4.12 h{sup -1} and 0.16 h in the initial stages of the reaction and 0.361 h{sup -1} and 1.9 h at the final stages of the reaction for the decontamination reaction on nanocrystalline ZnO.

  18. Nanocrystalline zinc oxide for the decontamination of sarin

    International Nuclear Information System (INIS)

    Mahato, T.H.; Prasad, G.K.; Singh, Beer; Acharya, J.; Srivastava, A.R.; Vijayaraghavan, R.

    2009-01-01

    Nanocrystalline zinc oxide materials were prepared by sol-gel method and were characterized by X-ray diffraction, scanning electron microscopy, thermogravimetry, nitrogen adsorption and infrared spectroscopy techniques. The data confirmed the formation of zinc oxide materials of zincite phase with an average crystallite size of ∼55 nm. Obtained material was tested as destructive adsorbent for the decontamination of sarin and the reaction was followed by GC-NPD and GC-MS techniques. The reaction products were characterized by GC-MS and the data explored the role of hydrolysis reaction in the detoxification of sarin. Sarin was hydrolyzed to form surface bound non-toxic phosphonate on the surface of nano-zinc oxide. The data also revealed the values of rate constant and half-life to be 4.12 h -1 and 0.16 h in the initial stages of the reaction and 0.361 h -1 and 1.9 h at the final stages of the reaction for the decontamination reaction on nanocrystalline ZnO.

  19. Lab-on-a-chip for rapid electrochemical detection of nerve agent Sarin

    DEFF Research Database (Denmark)

    Tan, Hsih-Yin; Loke, Weng Keong; Nguyen, Nam-Trung

    2014-01-01

    This paper reports a lab-on-a-chip for the detection of Sarin nerve agent based on rapid electrochemical detection. The chemical warfare agent Sarin (C4H10FO2P, O-isopropyl methylphosphonofluoridate) is a highly toxic organophosphate that induces rapid respiratory depression, seizures and death...

  20. Low Dose Sarin Leads To Murine Cardiac Dysfunction

    Science.gov (United States)

    2010-03-01

    hypoxia resulting from bronco -constriction also affects the cardiovascular system by reinforcing sympathetic tone, while ACh induced epinephrine...3000 4000 5000 6000 7000 8000 Septum LV Wall Total LV Ca rd io m yo cy te Si ze (P ix el s/ nu cl ei ) Control 0.4 LD50 0.5 LD50 * pɘ.05 vs... el s/ nu cl ei ) Control Sarin (Combined Groups) * pɘ.05 vs. control ** pɘ.01 vs. control † pɘ.001 vs. control 59 Results of Collagen

  1. Methodology identification in mass disasters

    OpenAIRE

    Ampudia García, Omar

    2014-01-01

    Major disasters in Perul ack from a treatment plan and adapt to the current reality. Were rare and limited to natural disasters such as major earthquakes, floods, torrential rains, erupting volcanoes, and so on.At first these disasters were limited to certain geographic areas ingeneral,but with the advancement of science and technology these events have soared alarming lyas rail crashes, plane crashes, car crashes going at high speed,and if we add the attacks by fundamentalist groups with car...

  2. Assessment of Subchronic Neurobehaviorial and Neuropathologic Effects in Rats Following Low-Level Sarin Exposure

    National Research Council Canada - National Science Library

    Olson, Carl

    1999-01-01

    .... Doses of pyridostigmine bromide (PB) i.m., Sarin (GB) s.c., and chlorpyrifos (CPF) topically which produced approximately 20-30, 5-10, and 5-10 percent whole blood cholinesterase inhibition (ChE...

  3. A critical role of acute bronchoconstriction in the mortality associated with high-dose sarin inhalation: Effects of epinephrine and oxygen therapies

    Energy Technology Data Exchange (ETDEWEB)

    Gundavarapu, Sravanthi; Zhuang, Jianguo; Barrett, Edward G.; Xu, Fadi; Russell, Robert G.; Sopori, Mohan L., E-mail: msopori@lrri.org

    2014-01-15

    Sarin is an organophosphate nerve agent that is among the most lethal chemical toxins known to mankind. Because of its vaporization properties and ease and low cost of production, sarin is the nerve agent with a strong potential for use by terrorists and rouge nations. The primary route of sarin exposure is through inhalation and, depending on the dose, sarin leads to acute respiratory failure and death. The mechanism(s) of sarin-induced respiratory failure is poorly understood. Sarin irreversibly inhibits acetylcholine esterase, leading to excessive synaptic levels of acetylcholine and, we have previously shown that sarin causes marked ventilatory changes including weakened response to hypoxia. We now show that LD{sub 50} sarin inhalation causes severe bronchoconstriction in rats, leading to airway resistance, increased hypoxia-induced factor-1α, and severe lung epithelium injury. Transferring animals into 60% oxygen chambers after sarin exposure improved the survival from about 50% to 75% at 24 h; however, many animals died within hours after removal from the oxygen chambers. On the other hand, if LD{sub 50} sarin-exposed animals were administered the bronchodilator epinephrine, > 90% of the animals survived. Moreover, while both epinephrine and oxygen treatments moderated cardiorespiratory parameters, the proinflammatory cytokine surge, and elevated expression of hypoxia-induced factor-1α, only epinephrine consistently reduced the sarin-induced bronchoconstriction. These data suggest that severe bronchoconstriction is a critical factor in the mortality induced by LD{sub 50} sarin inhalation, and epinephrine may limit the ventilatory, inflammatory, and lethal effects of sarin. - Highlights: • Inhalation exposure of rats to LD{sub 50} sarin causes death through respiratory failure. • Severe bronchoconstriction is the major cause of sarin-induced respiratory failure. • Transfer of sarin exposed rats to 60% oxygen improves the mortality temporarily.

  4. Inhalation of the nerve gas sarin impairs ventilatory responses to hypercapnia and hypoxia in rats

    International Nuclear Information System (INIS)

    Zhuang Jianguo; Xu Fadi; Campen, Matthew J.; Zhang Cancan; Pena-Philippides, Juan C.; Sopori, Mohan L.

    2008-01-01

    Sarin, a highly toxic nerve gas, is believed to cause bronchoconstriction and even death primarily through respiratory failure; however, the mechanism underlying the respiratory failure is not fully understood. The goals of this study were to ascertain whether sarin affects baseline ventilation (V E ) and V E chemoreflexes as well as airway resistance and, if so, whether these changes are reversible. Four groups of F344 rats were exposed to vehicle (VEH) or sarin at 2.5, 3.5, and 4.0 mg h m -3 (SL, SM, and SH, respectively). V E and V E responses to hypercapnia (7% CO 2 ) or hypoxia (10% O 2 ) were measured by plethysmography at 2 h and 1, 2, and 5 days after VEH or sarin exposure. Total pulmonary resistance (R L ) also was measured in anesthetized VEH- and SH-exposed animals 2 h after exposure. Our results showed that within 2 h after exposure 11% of the SM- and 52% of the SH- exposed groups died. Although the SM and SH significantly decreased hypercapnic and hypoxic V E to similar levels (64 and 69%), SH induced greater respiratory impairment, characterized by lower baseline V E (30%; P E impairment recovered within 1-2 days after sarin exposure; interestingly, SH did not significantly affect baseline R L . Moreover, sarin induced body tremors that were unrelated to the changes in the V E responses. Thus, LC 50 sarin causes a reversible impairment of V E that is not dependent on the sarin-induced body tremors and not associated with changes in R L

  5. The Potential Neurotoxic Effects of Low-Dose Sarin Exposure in a Guinea Pig Model

    Science.gov (United States)

    2002-01-01

    1 THE POTENTIAL NEUROTOXIC EFFECTS OF LOW-DOSE SARIN EXPOSURE IN A GUINEA PIG MODEL Melinda R. Roberson, PhD, Michelle B. Schmidt...Proving Ground, MD 21010 USA ABSTRACT This study is assessing the effects in guinea pigs of repeated low-dose exposure to the nerve...COVERED - 4. TITLE AND SUBTITLE The Potential Neurotoxic Effects Of Low-Dose Sarin Exposure In A Guinea Pig Model 5a. CONTRACT NUMBER 5b

  6. Disaster Research

    DEFF Research Database (Denmark)

    Given the tendency of books on disasters to predominantly focus on strong geophysical or descriptive perspectives and in-depth accounts of particular catastrophes, Disaster Research provides a much-needed multidisciplinary perspective of the area. This book is is structured thematically around key...... approaches to disaster research from a range of different, but often complementary academic disciplines. Each chapter presents distinct approaches to disaster research that is anchored in a particular discipline; ranging from the law of disasters and disaster historiography to disaster politics...... and anthropology of disaster. The methodological and theoretical contributions underlining a specific approach to disasters are discussed and illustrative empirical cases are examined that support and further inform the proposed approach to disaster research. The book thus provides unique insights into fourteen...

  7. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  8. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  9. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  10. Post-exposure treatment with nasal atropine methyl bromide protects against microinstillation inhalation exposure to sarin in guinea pigs

    International Nuclear Information System (INIS)

    Che, Magnus M.; Conti, Michele; Chanda, Soma; Boylan, Megan; Sabnekar, Praveena; Rezk, Peter; Amari, Ethery; Sciuto, Alfred M.; Gordon, Richard K.; Doctor, Bhupendra P.; Nambiar, Madhusoodana P.

    2009-01-01

    We evaluated the protective efficacy of nasal atropine methyl bromide (AMB) which does not cross the blood-brain barrier against sarin inhalation exposure. Age and weight matched male guinea pigs were exposed to 846.5 mg/m 3 sarin using a microinstillation inhalation exposure technique for 4 min. The survival rate at this dose was 20%. Post-exposure treatment with nasal AMB (2.5 mg/kg, 1 min) completely protected against sarin induced toxicity (100% survival). Development of muscular tremors was decreased in animals treated with nasal AMB. Post-exposure treatment with nasal AMB also normalized acute decrease in blood oxygen saturation and heart rate following sarin exposure. Inhibition of blood AChE and BChE activities following sarin exposure was reduced in animals treated with nasal AMB, indicating that survival increases the metabolism of sarin or expression of AChE. The body weight loss of animals exposed to sarin and treated with nasal AMB was similar to saline controls. No differences were observed in lung accessory lobe or tracheal edema following exposure to sarin and subsequent treatment with nasal AMB. Total bronchoalveolar lavage fluid (BALF) protein, a biomarker of lung injury, showed trends similar to saline controls. Surfactant levels post-exposure treatment with nasal AMB returned to normal, similar to saline controls. Alkaline phosphatase levels post-exposure treatment with nasal AMB were decreased. Taken together, these data suggest that nasal AMB blocks the copious airway secretion and peripheral cholinergic effects and protects against lethal inhalation exposure to sarin thus increasing survival.

  11. Validation of CryoSat-2 SARIn Performance over Arctic Sea Ice

    Science.gov (United States)

    Di Bella, A.; Skourup, H.; Bouffard, J.; Parrinello, T.

    2016-08-01

    The main objective of this work is to validate CryoSat-2 (CS2) SARIn performance over sea ice by use of airborne laser altimetry data obtained during the CryoVEx 2012 campaign. A study by [1] has shown that the extra information from the CS2 SARIn mode increases the number of valid sea surface height estimates which are usually discarded in the SAR mode due to snagging of the radar signal. As the number of valid detected leads increases, the uncertainty of the freeboard heights decreases.In this study, the snow freeboard heights estimated using data from the airborne laser scanner are used to validate the sea ice freeboard obtained by processing CS2 SARIn level 1b waveforms. The possible reduction in the random freeboard uncertainty is investigated comparing two scenarios, i.e. a SAR-like and a SARIn acquisition.It is observed that using the extra phase information, CS2 is able to detect leads up to 2370 m off-nadir. A reduction in the the total random freeboard uncertainty of ˜40% is observed by taking advantage of the CS2 interferometric capabilities, which enable to include ˜35% of the wave-forms discarded in the SAR-like scenario.

  12. beta-Aminoalcohols as Potential Reactivators of Aged Sarin-/Soman-Inhibited Acetylcholinesterase

    Science.gov (United States)

    2017-02-08

    The calculations suggest that the designed b-aminoalcohol can selectively reactivate aged sarin-/soman-inhibited AChE. Fur - thermore, unlike existing...Kolossv#ry, K. F. Wong, F. Paesani, J. Vanicek, X. Wu, S. R. Brozell, T. Steinbrecher, H. Gohlke, L. Yang, C. Tan , J. Mongan, V. Hornak, G. Cui, D. H

  13. Micromotor-based on-off fluorescence detection of sarin and soman simulants.

    Science.gov (United States)

    Singh, Virendra V; Kaufmann, Kevin; Orozco, Jahir; Li, Jinxing; Galarnyk, Michael; Arya, Gaurav; Wang, Joseph

    2015-06-30

    Self-propelled micromotor-based fluorescent "On-Off" detection of nerve agents is described. The motion-based assay utilizes Si/Pt Janus micromotors coated with fluoresceinamine toward real-time "on-the-fly" field detection of sarin and soman simulants.

  14. Kinetics of degradation of sulfur mustard and sarin simulants on HKUST-1 metal organic framework.

    Science.gov (United States)

    Roy, Anuradha; Srivastava, Avanish K; Singh, Beer; Shah, Dilip; Mahato, Timir Haran; Srivastava, Anchal

    2012-10-28

    The applicability of HKUST-1 for the degradation of sulfur mustard and sarin simulants was studied with and without coadsorbed water. Degradation was found to be via hydrolysis and dependent on the nucleophilic substitution reaction, vapour pressure and molecular diameter of the toxicants.

  15. Intravenous and inhalation toxicokinetics of sarin stereoisomers in atropinized guinea pigs

    NARCIS (Netherlands)

    Spruit, W.E.T.; Langenberg, J.P.; Trap, H.C.; Wiel, H.J. van der; Helmich, R.B.; Helden, H.P.M. van; Benschop, H.P.

    2000-01-01

    We report the first toxicokinetic studies of (±)-sarin. The toxicokinetics of the stereoisomers of this nerve agent were studied in anesthetized, atropinized, and restrained guinea pigs after intravenous bolus administration of a dose corresponding to 0.8 LD50 and after nose-only exposure to vapor

  16. Long-Term Effects of Subchronic Exposure to Sarin, Alone and With Stress or Other Chemicals

    National Research Council Canada - National Science Library

    Abou-Donia, Mohamed

    2002-01-01

    ...) and stress on the development of chronic and neurologic deficits. An important finding from our studies is that brain AChE and plasma BChE inhibition might be used as a biomarker for exposure, not for sarin-induced neurologic deficits...

  17. Low levels of sarin affect the EEG in marmoset monkeys: A pilot study

    NARCIS (Netherlands)

    Helden, H.H.P.M. van; Vanwersch, R.A.P.; Kuijpers, W.C.; Trap, H.C.; Philippens, I.H.C.; Benschop, H.P.

    2004-01-01

    The main purpose of this pilot study was to estimate the lowest observable adverse effect level (LOAEL) for the electroencephalogram (EEG) upon long-term, low-level exposure of vehicle-pretreated and pyridostigmine-pretreated marmoset monkeys to sarin vapour. This is the C·t value (t = 5 h) of

  18. Disaster Education: A Survey Study to Analyze Disaster Medicine Training in Emergency Medicine Residency Programs in the United States.

    Science.gov (United States)

    Sarin, Ritu R; Cattamanchi, Srihari; Alqahtani, Abdulrahman; Aljohani, Majed; Keim, Mark; Ciottone, Gregory R

    2017-08-01

    The increase in natural and man-made disasters occurring worldwide places Emergency Medicine (EM) physicians at the forefront of responding to these crises. Despite the growing interest in Disaster Medicine, it is unclear if resident training has been able to include these educational goals. Hypothesis This study surveys EM residencies in the United States to assess the level of education in Disaster Medicine, to identify competencies least and most addressed, and to highlight effective educational models already in place. The authors distributed an online survey of multiple-choice and free-response questions to EM residency Program Directors in the United States between February 7 and September 24, 2014. Questions assessed residency background and details on specific Disaster Medicine competencies addressed during training. Out of 183 programs, 75 (41%) responded to the survey and completed all required questions. Almost all programs reported having some level of Disaster Medicine training in their residency. The most common Disaster Medicine educational competencies taught were patient triage and decontamination. The least commonly taught competencies were volunteer management, working with response teams, and special needs populations. The most commonly identified methods to teach Disaster Medicine were drills and lectures/seminars. There are a variety of educational tools used to teach Disaster Medicine in EM residencies today, with a larger focus on the use of lectures and hospital drills. There is no indication of a uniform educational approach across all residencies. The results of this survey demonstrate an opportunity for the creation of a standardized model for resident education in Disaster Medicine. Sarin RR , Cattamanchi S , Alqahtani A , Aljohani M , Keim M , Ciottone GR . Disaster education: a survey study to analyze disaster medicine training in emergency medicine residency programs in the United States. Prehosp Disaster Med. 2017;32(4):368-373.

  19. Global Gene Expression Profiling of Human Genome Following Exposure to Sarin and Soman

    International Nuclear Information System (INIS)

    Gopalakrishnakone, P.; Pachiappan, A.; Srinivasan, K. N.; Loke, W. K.; Lee, F. K.

    2007-01-01

    Toxicogenomics merges genomics with toxicology is a rapidly expanding field on the assumption that the transcriptional responses of cells to different toxic exposure are sufficiently distinct robust and reproducible to discriminate toxin from different families/classes which can be called as 'fingerprints' or 'Atlases'. In this study chemical weapons sarin was studied in a time and dose dependent manner after exposure to human neuroblastoma cell line. (Sarin or GB) exerts its effect through inhibition of acetylcholinesterase activity and induction of delayed neurotoxicity in a dose [EC 50 50 ppm, (around 372.4 μM)] and time-dependent manner. The effect and/or the mechanism of single or repeated exposures to GB, however, are less clear and yet to be explored at cellular level. The present study aims to scrutinize, the global gene expression profile following sarin toxicity in neuronal cells using Affymetrix-GeneChips. A tim-course study on the effect of a single (3 or 24h) or repeated (24 or 48h) doses of sarin (5ppm) on SHSY5Y cells was carried out. Using GeneSpring (PCA) analysis, 550 genes whose expression was significantly (p less than 0.01) altered by at least 2.5-fold, were selected. The results indicate that the low-level single dose exposure do not always parallel acute toxicity, but can cause a reversible down-regulation of genes and a range of anti-cholinesterase effects. In contrast, repeated doses produced persistent irreversible down-regulation of genes related to neurodegenerative mechanism at 48h. Real-time PCR and western blot analysis confirmed the reduced expression of presenilin 1 (TMP21), 2 and dopa.decarboxylase (DDC) mRNA and proteins. Besides providing an in vitro experimental model for studies on the neuropathophysiology and brain cells this investigation indicate possible mechanisms by which sarin could mediate neuro-degeneration. A comparison will be made with similar study with soman. (author)

  20. Neurophysiologic and Neuropathologic Effects in Monkeys of Low Level Exposures to Sarin, Pyridostigmine, Pesticides and Botulinum Toxoid

    National Research Council Canada - National Science Library

    Olson, Carl

    1998-01-01

    .... Pilot studies are being performed to select doses of pyridostigmine bromide (PB), chlorpyrifos (CPF), and sarin (GE) to be used in two-week exposures with a 9-month post-dosing evaluation period...

  1. The Application of the Fluoride Reactivation Process to the Detection of Sarin and Soman Nerve Agent Exposures in Biological Samples

    National Research Council Canada - National Science Library

    Adams, T. K; Capacio, B. R; Smith, J. R; Whalley, C. E; Korte, W. D

    2004-01-01

    The fluoride reactivation process was evaluated for measuring the level of sarin or soman nerve agents reactivated from substrates in plasma and tissue from in vivo exposed guinea pigs (Cava porcellus...

  2. Assay techniques for detection of exposure to sulfur mustard, cholinesterase inhibitors, sarin, soman, GF, and cyanide. Technical bulletin

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    This technical bulletin provides analytical techniques to identify toxic chemical agents in urine or blood samples. It is intended to provide the clinician with laboratory tests to detect exposure to sulfur mustard, cholinesterase inhibitors, sarin, soman, GF, and cyanide.

  3. Engineering Bacteria to Catabolize the Carbonaceous Component of Sarin: Teaching E. coli to Eat Isopropanol

    DEFF Research Database (Denmark)

    Brown, Margaret E.; Mukhopadhyay, Aindrila; Keasling, Jay D.

    2016-01-01

    conversion with a key reaction performed by the acetone carboxylase complex (ACX). We engineered the heterologous expression of the ACX complex from Xanthobacter autotrophicus PY2 to match the naturally occurring subunit stoichiometry and purified the recombinant complex from E. coli for biochemical analysis....... Incorporating this ACX complex and enzymes from diverse organisms, we introduced an isopropanol degradation pathway in E. coli, optimized induction conditions, and decoupled enzyme expression to probe pathway bottlenecks. Our engineered E. coli consumed 65% of isopropanol compared to no-cell controls......We report an engineered strain of Escherichia coli that catabolizes the carbonaceous component of the extremely toxic chemical warfare agent sarin. Enzymatic decomposition of sarin generates isopropanol waste that, with this engineered strain, is then transformed into acetyl-CoA by enzymatic...

  4. Natural Detoxification Capacity to Inactivate Nerve Agents Sarin and VX in the Rat Blood

    Directory of Open Access Journals (Sweden)

    Jiří Bajgar

    2016-03-01

    Full Text Available Background: The method of continual determination of the rat blood cholinesterase activity was developed to study the changes of the blood cholinesterases following different intervetions. Aims: The aim of this study is registration of cholinesterase activity in the rat blood and its changes to demonstrate detoxification capacity of rats to inactivate sarin or VX in vivo. Methods: The groups of female rats were premedicated (ketamine and xylazine and cannulated to a. femoralis. Continual blood sampling (0.02 ml/min and monitoring of the circulating blood cholinesterase activity were performed. Normal activity was monitored 1–2 min and then the nerve agent was administered i.m. (2× LD50. Using different time intervals of the leg compression and relaxation following the agent injection, cholinesterase activity was monitored and according to the inhibition obtained, detoxification capacity was assessed. Results: Administration of sarin to the leg, then 1 and 5 min compression and 20 min later relaxation showed that further inhibition in the blood was not observed. On the other hand, VX was able to inhibit blood cholinesterases after this intervention. Conclusions: The results demonstrated that sarin can be naturally detoxified on the contrary to VX. Described method can be used as model for other studies dealing with changes of cholinesterases in the blood following different factors.

  5. A comparison of the reactivating and therapeutic efficacy of two novel bispyridinium oximes (K727, K733) with the oxime HI-6 and obidoxime in sarin-poisoned rats and mice.

    Science.gov (United States)

    Kassa, Jiri; Sepsova, Vendula; Matouskova, Lenka; Horova, Anna; Musilek, Kamil

    2015-03-01

    The ability of two novel bispyridinium oximes K727 and K733 and currently available oximes (HI-6, obidoxime) to reactivate sarin-inhibited acetylcholinesterase and to reduce acute toxicity of sarin was evaluated. To investigate the reactivating efficacy of the oximes, the rats were administered intramuscularly with atropine and oximes in equitoxic doses corresponding to 5% of their LD50 values at 1 min after the intramuscular administration of sarin at a dose of 24 µg/kg (LD50). The activity of acetylcholinesterase was measured at 60 min after sarin poisoning. The LD50 value of sarin in non-treated and treated mice was assessed using probit-logarithmical analysis of death occurring within 24 h after intramuscular administration of sarin at five different doses. In vivo determined percentage of reactivation of sarin-inhibited rat blood, diaphragm and brain acetylcholinesterase showed that the potency of both novel oximes K727 and K733 to reactivate sarin-inhibited acetylcholinesterase roughly corresponds to the reactivating efficacy of obidoxime. On the other hand, the oxime HI-6 was found to be the most efficient reactivator of sarin-inhibited acetylcholinesterase. While the oxime HI-6 was able to reduce the acute toxicity of sarin >3 times, both novel oximes and obidoxime decreased the acute toxicity of sarin HI-6 and, therefore, they are not suitable for the replacement of the oxime HI-6 for the antidotal treatment of acute sarin poisoning.

  6. Low-level exposure of guinea pigs and marmosets to sarin vapour in air: Lowest-observable-adverse-effect level (LOAEL) for miosis

    NARCIS (Netherlands)

    Helden, H.P.M. van; Trap, H.C.; Kuijpers, W.C.; Oostdijk, J.P.; Benschop, H.P.; Langenberg, J.P.

    2004-01-01

    The purpose of this pilot study was to indicate, for low-level exposure of conscious guinea pigs and marmoset monkeys to sarin vapour in air, the lowest-observable-adverse-effect level (LOAEL) of sarin for miosis. This is the concentration × time (C·t) value (t = 5 h) of exposure at which miosis

  7. FEMA Disaster Declarations Summary

    Data.gov (United States)

    Department of Homeland Security — The FEMA Disaster Declarations Summary is a summarized dataset describing all federally declared disasters, starting with the first disaster declaration in 1953,...

  8. CryoSat-2 SAR and SARin Inland Water Heights from the CRUCIAL project

    Science.gov (United States)

    Benveniste, J.; Restano, M.; Ambrózio, A.; Moore, P.; Birkinshaw, S.

    2017-12-01

    CRUCIAL was an ESA/STSE funded project investigating innovative land and inland water applications from CryoSat-2 with a forward-look component to the Sentinel-3 and Jason-CS/Sentinel-6 missions. The high along-track sampling of CryoSat-2 in its SAR and SARin modes offers the opportunity to recover high frequency signals over inland waters. A methodology was developed to process the FBR L1A Doppler beams to form a waveform product using ground cell gridding, beam steering and beam stacking. Inland water heights from CryoSat-2 are derived by using a set of empirical retrackers formulated for inland water applications. Results of the processing strategy include a comparison of waveforms and heights from the burst echoes (80 m along-track) and from multi-look waveforms (320 m along-track). SAR and SARin FBR data are available for the Amazon, Brahmaputra and Mekong for 2011-2015. FBR SAR results are compared against stage data from the nearest gauge. Heights from Tonlé Sap are also compared against Jason-2 data from the United States Department of Agriculture. A strategy to select the number of multi-looks over rivers was designed based on the rms of heights across Tonlé Sap. Comparisons include results from the empirical retrackers and from waveforms and heights obtained via ESA's Grid Processing on Demand (G-POD/SARvatore) using the SAMOSA2 retracker. Results of FBR SARin processing for the Amazon and Brahmaputra are presented including comparison of heights from the two antennae, extraction of slope of the ground surface and validation against ground data where appropriate.

  9. Hormone-dependence of sarin lethality in rats: Sex differences and stage of the estrous cycle

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Carl D., E-mail: carl.d.smith179.mil@mail.mil; Wright, Linnzi K.M.; Garcia, Gregory E.; Lee, Robyn B.; Lumley, Lucille A.

    2015-09-15

    Chemical warfare nerve agents (CWNAs) are highly toxic compounds that cause a cascade of symptoms and death, if exposed casualties are left untreated. Numerous rodent models have investigated the toxicity and mechanisms of toxicity of CWNAs, but most are limited to male subjects. Given the profound physiological effects of circulating gonadal hormones in female rodents, it is possible that the daily cyclical fluctuations of these hormones affect females' sensitivity to the lethal effects of CWNAs, and previous reports that included female subjects did not control for the stage of the hormonal cycle. The aim of the current study was to determine the 24-hour median lethal dose (LD{sub 50}) of the CWNA sarin in male, ovariectomized (OVEX) female, and female rats during different stages of the estrous cycle (diestrus, proestrus, and estrus). Additionally, baseline activity levels of plasma acetylcholinesterase, butyrylcholinesterase, and carboxylesterase were measured to determine differences among the groups. Results indicated that females in proestrus had a significantly higher LD{sub 50} of sarin compared to OVEX and estrous females. Although some sex differences were observed in the activity levels of plasma esterases, they were not consistent and likely not large enough to significantly affect the LD{sub 50}s. These results suggest that hormonal cyclicity can influence the outcome of CWNA-related studies using female rodents, and that this variability can be minimized by controlling for the stage of the cycle. Additional research is necessary to determine the precise mechanism of the observed differences because it is unlikely to be solely explained by plasma esterase activity. - Highlights: • The LD{sub 50} of sarin was determined in female rats throughout the stages of the estrous cycle. • Females in proestrus had a significantly higher LD{sub 50} compared to estrous or ovariectomized females. • No sex differences were observed between male and female

  10. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  11. Propagation of damage in the rat brain following sarin exposure: Differential progression of early processes

    International Nuclear Information System (INIS)

    Lazar, Shlomi; Egoz, Inbal; Brandeis, Rachel; Chapman, Shira; Bloch-Shilderman, Eugenia; Grauer, Ettie

    2016-01-01

    Sarin is an irreversible organophosphate cholinesterase inhibitor and a highly toxic warfare agent. Following the overt, dose-dependent signs (e.g. tremor, hyper secretion, seizures, respiratory depression and eventually death), brain damage is often reported. The goal of the present study was to characterize the early histopathological and biochemical events leading to this damage. Rats were exposed to 1LD50 of sarin (80 μg/kg, i.m.). Brains were removed at 1, 2, 6, 24 and 48 h and processed for analysis. Results showed that TSPO (translocator protein) mRNA increased at 6 h post exposure while TSPO receptor density increased only at 24 h. In all brain regions tested, bax mRNA decreased 1 h post exposure followed by an increase 24 h later, with only minor increase in bcl2 mRNA. At this time point a decrease was seen in both anti-apoptotic protein Bcl2 and pro-apoptotic Bax, followed by a time and region specific increase in Bax. An immediate elevation in ERK1/2 activity with no change in JNK may indicate an endogenous “first response” mechanism used to attenuate the forthcoming apoptosis. The time dependent increase in the severity of brain damage included an early bi-phasic activation of astrocytes, a sharp decrease in intact neuronal cells, a time dependent reduction in MAP2 and up to 15% of apoptosis. Thus, neuronal death is mostly due to necrosis and severe astrocytosis. The data suggests that timing of possible treatments should be determined by early events following exposure. For example, the biphasic changes in astrocytes activity indicate a possible beneficial effects of delayed anti-inflammatory intervention. - Highlights: • The severity of brain damage post 1LD50 sarin exposure is time dependent. • Sarin induce differential progression of early processes in the rat brain. • Potential treatments should be timed according to early events following exposure. • The biphasic astrocytes activity suggests a delay in anti-inflammatory intervention.

  12. Propagation of damage in the rat brain following sarin exposure: Differential progression of early processes

    Energy Technology Data Exchange (ETDEWEB)

    Lazar, Shlomi; Egoz, Inbal; Brandeis, Rachel; Chapman, Shira; Bloch-Shilderman, Eugenia; Grauer, Ettie, E-mail: ettieg@iibr.gov.il

    2016-11-01

    Sarin is an irreversible organophosphate cholinesterase inhibitor and a highly toxic warfare agent. Following the overt, dose-dependent signs (e.g. tremor, hyper secretion, seizures, respiratory depression and eventually death), brain damage is often reported. The goal of the present study was to characterize the early histopathological and biochemical events leading to this damage. Rats were exposed to 1LD50 of sarin (80 μg/kg, i.m.). Brains were removed at 1, 2, 6, 24 and 48 h and processed for analysis. Results showed that TSPO (translocator protein) mRNA increased at 6 h post exposure while TSPO receptor density increased only at 24 h. In all brain regions tested, bax mRNA decreased 1 h post exposure followed by an increase 24 h later, with only minor increase in bcl2 mRNA. At this time point a decrease was seen in both anti-apoptotic protein Bcl2 and pro-apoptotic Bax, followed by a time and region specific increase in Bax. An immediate elevation in ERK1/2 activity with no change in JNK may indicate an endogenous “first response” mechanism used to attenuate the forthcoming apoptosis. The time dependent increase in the severity of brain damage included an early bi-phasic activation of astrocytes, a sharp decrease in intact neuronal cells, a time dependent reduction in MAP2 and up to 15% of apoptosis. Thus, neuronal death is mostly due to necrosis and severe astrocytosis. The data suggests that timing of possible treatments should be determined by early events following exposure. For example, the biphasic changes in astrocytes activity indicate a possible beneficial effects of delayed anti-inflammatory intervention. - Highlights: • The severity of brain damage post 1LD50 sarin exposure is time dependent. • Sarin induce differential progression of early processes in the rat brain. • Potential treatments should be timed according to early events following exposure. • The biphasic astrocytes activity suggests a delay in anti-inflammatory intervention.

  13. [Disaster Control and Civil Protection in Germany].

    Science.gov (United States)

    Kippnich, Maximilian; Kowalzik, Barbara; Cermak, Rudolf; Kippnich, Uwe; Kranke, Peter; Wurmb, Thomas

    2017-09-01

    The train crash of Bad Aibling/Germany in February 2016 and the terrorist attacks of the recent years in Europe have demonstrated the urgent need to be prepared for such disastrous events. Disaster preparedness and disaster control are very important governmental duties, as are civil protection and civil defense. In Germany the responsibility for those tasks are divided between the 16 "Länder" and the Federation. While the Federation takes care of the civil protection and disaster assistance, the Länder are responsible for disaster control. The presented article focuses on these issues and gives valuable insights into the German system of disaster control and civil protection with a focus on health protection. Georg Thieme Verlag KG Stuttgart · New York.

  14. School Mental Health's Response to Terrorism and Disaster.

    Science.gov (United States)

    Weist, Mark D.; Sander, Mark A.; Lever, Nancy A.; Rosner, Leah E.; Pruitt, David B.; Lowie, Jennifer Axelrod; Hill, Susan; Lombardo, Sylvie; Christodulu, Kristin V.

    2002-01-01

    Explores the response of school mental health to terrorism and disaster, reviewing literature on child and adult reactions to trauma, discussing the development of crisis response teams, and presenting strategies for schools to respond to crises and disaster. One elementary school's experiences in response to the September 11th attacks are…

  15. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  16. Protection against soman and sarin exposure by transdermal physostigmine and scopolamine

    Energy Technology Data Exchange (ETDEWEB)

    Meshulam, Y.; Davidovici, R.; Levy, A.

    1993-05-13

    The purpose of this study was to evaluate the prophylactic efficacy of physostigmine (physo), administered via sustained release (SR) methods, with and without scopolamine, against soman and sarin exposure in guinea-pigs. Transdermal physo pad (3 sq cm/kg; 60-80 ug/sq cm), containing a vehicle based on propionic acid, was applied onto the dorsal back of the animals, 24 hours before exposure to the cholinesterase (ChE) inhibitors. At the time of exposure, physo concentrations in brain and plasma were 3.6 ng/g and 4.1 ng/ml respectively. Brain and whole blood ChE activity were inhibited to 70% and 57% of their original activity. Transdermal physo by itself protected up to 70% of the animals exposed to 1.5 LD(50) of soman or sarin (100% mortality was recorded in the control group). Combining transdermal physo with Scopoderm (by Ciba Geigy Inc.) provided full protection against 1.5 LD(50).

  17. Social epidemics in the aftermath of disasters.

    NARCIS (Netherlands)

    IJzermans, C.J.

    2002-01-01

    Issue/problem: After disasters, terrorist attacks and wars social epidemics of medically unexplained physical symptoms/syndromes (ups) are often seen. In modern times people feel more vulnerable and especially under pressure of those incidents, everyday symptoms are interpreted as disease and

  18. Sarin Exposures in A Cohort of British Military Participants in Human Experimental Research at Porton Down 1945-1987.

    Science.gov (United States)

    Keegan, Thomas J; Carpenter, Lucy M; Brooks, Claire; Langdon, Toby; Venables, Katherine M

    2017-12-15

    The effects of exposure to chemical warfare agents in humans are topical. Porton Down is the UK's centre for research on chemical warfare where, since WWI, a programme of experiments involving ~30000 participants drawn from the UK armed services has been undertaken. Our aim is to report on exposures to nerve agents, particularly sarin, using detailed exposure data not explored in a previous analysis. In this paper, we have used existing data on exposures to servicemen who attended the human volunteer programme at Porton Down to examine exposures to nerve agents in general and to sarin in particular. Six principal nerve agents were tested on humans between 1945 and 1987. Of all 4299 nerve agent tests recorded, 3511 (82%) were with sarin, most commonly in an exposure chamber, with inhalation being the commonest exposure route (85%). Biological response to sarin exposure was expressed as percentage change in cholinesterase activity and, less commonly, change in pupil size. For red blood cell cholinesterase, median inhibition for inhalation tests was 41% (interquartile range 28-51%), with a maximum of 87%. For dermal exposures the maximum inhibition recorded was 99%. There was a clear association between increasing exposure to sarin and depression of cholinesterase activity but the strength and direction of the association varied by exposure route and the presence of chemical or physical protection. Pupil size decreased with increased exposure but this relationship was less clear when modifiers, such as atropine drops, were present. These results, drawn from high quality experimental data, offer a unique insight into the effects of these chemical agents on humans. © The Author 2017. Published by Oxford University Press on behalf of the British Occupational Hygiene Society.

  19. Repeated low-dose exposures to sarin, soman, or VX affect acoustic startle in guinea pigs.

    Science.gov (United States)

    Smith, C D; Lee, R B; Moran, A V; Sipos, M L

    2016-01-01

    Chemical warfare nerve agents (CWNAs) are known to cause behavioral abnormalities in cases of human exposures and in animal models. The behavioral consequences of single exposures to CWNAs that cause observable toxic signs are particularly well characterized in animals; however, less is known regarding repeated smaller exposures that may or may not cause observable toxic signs. In the current study, guinea pigs were exposed to fractions (0.1, 0.2, or 0.4) of a medial lethal dose (LD50) of sarin, soman, or VX for two weeks. On each exposure day, and for a post-exposure period, acoustic startle response (ASR) was measured in each animal. Although relatively few studies use guinea pigs to measure behavior, this species is ideal for CWNA-related experiments because their levels of carboxylesterases closely mimic those of humans, unlike rats or mice. Results showed that the 0.4 LD50 doses of soman and VX transiently increased peak startle amplitude by the second week of injections, with amplitude returning to baseline by the second week post-exposure. Sarin also increased peak startle amplitude independent of week. Latencies to peak startle and PPI were affected by agent exposure but not consistently among the three agents. Most of the changes in startle responses returned to baseline following the cessation of exposures. These data suggest that doses of CWNAs not known to produce observable toxic signs in guinea pigs can affect behavior in the ASR paradigm. Further, these deficits are transient and usually return to baseline shortly after the end of a two-week exposure period. Published by Elsevier Inc.

  20. Cryosat Level1b SAR/Sarin: Improving the Quality of the Baseline C Products

    Science.gov (United States)

    Scagliola, M.; Fornari, M.; Tagliani, N.; Frommknecht, B.; Bouffard, J.; Parrinello, T.

    2014-12-01

    CryoSat was launched on the 8th April 2010 and it is the first European ice mission dedicated to monitoring precise changes in the thickness of polar ice sheets and floating sea ice over a 3-year period. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvement in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. Towards the release of the BaselineC of the CryoSat Level1b SAR/SARin products, that is expected at the end of 2014, several improvements have been identified: a datation bias of about -0.5195 ms will be corrected a range bias of about 0.6730 m will be corrected The range window size will be doubled with respect to BaselineB, so that the in Level1b products the waveforms will be doubled too Improved processing for 1Hz echoes to have sharper waveforms Surface sample stack weighting to filter out the single look echoes acquired at highest look angle, that results in a sharpening of the 20Hz waveforms Additional auxiliary information related to the mispointing angles of the instrument as well as to the stacks of single look echoes will be added This poster details the main quality improvements that are foreseen to be included in the CryoSat Level1b SAR/SARin products in BaselineC.

  1. CryoSat Level1b SAR/SARin: quality improvements towards BaselineC

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Bouzinac, Catherine; Tagliani, Nicolas; Parrinello, Tommaso

    2014-05-01

    CryoSat was launched on the 8th April 2010 and it is the first European ice mission dedicated to monitoring precise changes in the thickness of polar ice sheets and floating sea ice over a 3-year period. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvement in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. Towards the release of the BaselineC of the CryoSat Level1b SAR/SARin products, that is expected during 2014, several improvements have been identified: • a datation bias of about -0.5195 ms will be corrected • a range bias of about -0.6730 m will be corrected • the waveform length in the Level1b product will be doubled with respect to BaselineB • improved processing for 1Hz echoes to have sharper waveforms • surface sample stack weighting to filter out the single look echoes acquired at highest look angle, that results in a sharpening of the 20Hz waveforms This poster details the main improvements that are foreseen to be included in the CryoSat Level1b SAR/SARin products in BaselineC.

  2. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  3. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  4. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  5. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  6. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. It could have been me: vicarious victims and disaster-focused distress.

    Science.gov (United States)

    Wayment, Heidi A

    2004-04-01

    College students who had experienced no personal bereavement in the September 11 terrorist attacks completed questionnaires between 3 and 5 weeks after the attacks and 5 months later. Cross-sectional and longitudinal structural equation model (SEM) analyses revealed that general distress and disaster-focused distress are discernable reactions following a collective loss. Both types of distress were higher among women and by those reporting social strain. General distress was associated with previous stressful events and mental health issues. Perceived similarity to the victims predicted disaster-focused distress and mediated the relationship between attending to media accounts of victims and disaster-focused distress. Only the disaster-focused distress reactions of survivor guilt and grief were associated with collective helping behaviors after the attacks and, for women, these behaviors were associated with greater reductions in these distress reactions over time. Discussion focuses on the importance of examining disaster-focused distress reactions following collective loss.

  9. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  10. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  12. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  13. [The Hospital Emergency Plan: Important Tool for Disaster Preparedness].

    Science.gov (United States)

    Wurmb, Thomas; Scholtes, Katja; Kolibay, Felix; Rechenbach, Peer; Vogel, Ulrich; Kowalzik, Barbara

    2017-09-01

    Hospitals need to be prepared for any kind of disaster. The terrorist attacks and mass shootings that took place in Europe in recent years impressively demonstrated the capability of hospitals to manage such challenging and disastrous events. To be adequately prepared, the hospital emergency plan is a very important tool. In this article we describe the entire process of drafting the emergency plan. We discuss the theoretical background as well as different models of disaster planning and we give important practical hints and tips for those in charge of the hospital disaster planning. Georg Thieme Verlag KG Stuttgart · New York.

  14. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  15. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  16. Single whole-body exposure to sarin vapor in rats: Long-term neuronal and behavioral deficits

    International Nuclear Information System (INIS)

    Grauer, Ettie; Chapman, Shira; Rabinovitz, Ishai; Raveh, Lily; Weissman, Ben-Avi; Kadar, Tamar; Allon, Nahum

    2008-01-01

    Freely moving rats were exposed to sarin vapor (34.2 ± 0.8 μg/l) for 10 min. Mortality at 24 h was 35% and toxic sings in the surviving rats ranged from sever (prolonged convulsions) through moderate to almost no overt signs. Some of the surviving rats developed delayed, intermittent convulsions. All rats were evaluated for long-term functional deficits in comparison to air-exposed control rats. Histological analysis revealed typical cell loss at 1 week post inhalation exposure. Neuronal inflammation was demonstrated by a 20-fold increase in prostaglandin (PGE 2 ) levels 24 h following exposure that markedly decreased 6 days later. An additional, delayed increase in PGE 2 was detected at 1 month and continued to increase for up to 6 months post exposure. Glial activation following neural damage was demonstrated by an elevated level of peripheral benzodiazepine receptors (PBR) seen in the brain 4 and 6 months after exposure. At the same time muscarinic receptors were unaffected. Six weeks, four and six months post exposure behavioral evaluations were performed. In the open field, sarin-exposed rats showed a significant increase in overall activity with no habituation over days. In a working memory paradigm in the water maze, these same rats showed impaired working and reference memory processes with no recovery. Our data suggest long lasting impairment of brain functions in surviving rats following a single sarin exposure. Animals that seem to fully recover from the exposure, and even animals that initially show no toxicity signs, developed some adverse neural changes with time

  17. Characterization of the pharmacokinetics, brain distribution, and therapeutic efficacy of the adenosine A1 receptor partial agonist 2'-deoxy-N6-cyclopentyladenosine in sarin-poisoned rats

    International Nuclear Information System (INIS)

    Bueters, Tjerk J.H.; IJzerman, Ad P.; Helden, Herman P.M. van; Danhof, Meindert

    2003-01-01

    Characterization of the pharmacokinetics, brain distribution, and therapeutic efficacy of the adenosine A 1 receptor partial agonist 2'-deoxy-N 6 -cyclopentyladenosine in sarin-poisoned rats. Bueters, T.J.H., IJzerman, A.P., Van Helden, H.P.M., and Danhof, M. (2003). The objective of the present study was to determine (1) the influence of sarin poisoning (144 μg/kg sc) on the pharmacokinetics and brain distribution of the adenosine A 1 receptor partial agonist 2'-deoxy-N 6 -cyclopentyladenosine (2'dCPA), and (2) the effect of 2'dCPA (20 mg/kg iv) on the central acetylcholine (ACh) release and protection against sarin toxicity. A five-compartment model successfully described the pharmacokinetic profile of 2'dCPA in blood and brain microdialysate. A covariate analysis revealed that the volume of distribution of 2'dCPA in blood was different in sarin-poisoned rats, 177 ± 7 versus 148 ± 8 ml in control rats. However, the transport of 2'dCPA from blood to the brain was unaffected as reflected by the values of the intercompartmental transport clearances, 0.21 ± 0.02 and 0.21 ± 0.04 μl/min in control and sarin-poisoned rats, respectively. Also the area-under-curve (AUC) ratios of brain microdialysate and blood were identical with values of 0.02 ± 0.001 and 0.02 ± 0.002, respectively, demonstrating the restricted transport of 2'dCPA into the brain in both treatment groups. Treatment of sarin-poisoned rats by 2'dCPA did not adequately prevent the accumulation of ACh in the central nervous system. 2'dCPA delayed the emergence of concomitant symptoms compared to untreated rats, but eventually only 29% of the animals survived 24 h. In conclusion, the pharmacokinetic profile of 2'dCPA in blood was slightly changed by sarin, but not the distribution of 2'dCPA into the brain. The therapeutic efficacy of 2'dCPA against sarin was limited, presumably due to insufficient quantities of 2'dCPA reaching the brain

  18. CryoSat Level1b SAR/SARin BaselineC: Product Format and Algorithm Improvements

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Di Giacinto, Andrea; Bouffard, Jerome; Féménias, Pierre; Parrinello, Tommaso

    2015-04-01

    CryoSat was launched on the 8th April 2010 and is the first European ice mission dedicated to the monitoring of precise changes in the thickness of polar ice sheets and floating sea ice. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvements in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. The current IPF, Baseline B, was released in operation in February 2012. A reprocessing campaign followed, in order to reprocess the data since July 2010. After more than 2 years of development, the release in operations of Baseline C is expected in the first half of 2015. BaselineC Level1b products will be distributed in an updated format, including for example the attitude information (roll, pitch and yaw) and, for SAR/SARIN, the waveform length doubled with respect to Baseline B. Moreveor, various algorithm improvements have been identified: • a datation bias of about -0.5195 ms will be corrected (SAR/SARIn) • a range bias of about 0.6730 m will be corrected (SAR/SARIn) • a roll bias of 0.1062 deg and a pitch bias of 0.0520 deg • Surface sample stack weighting to filter out the single look echoes acquired at highest look angle, that results in a sharpening of the 20Hz waveforms With the operational release of BaselineC, the second CryoSat reprocessing campaign will be initiated, taking benefit of the upgrade implemented in the IPF1 processing chain but also at IPF2 level. The reprocessing campaign will cover the full Cryosat mission starting on 16th July 2010

  19. Anticonvulsant treatment of sarin-induced seizures with nasal midazolam: An electrographic, behavioral, and histological study in freely moving rats

    International Nuclear Information System (INIS)

    Gilat, E.; Kadar, T.; Levy, A.; Rabinovitz, I.; Cohen, G.; Kapon, Y.; Sahar, R.; Brandeis, R.

    2005-01-01

    Centrally mediated seizures and convulsions are common consequences of exposure to organophosphates (OPs). These seizures rapidly progress to status epilepticus (SE) and contribute to profound brain injury. Effective management of these seizures is critical for minimization of brain damage. Nasal application of midazolam (1.5 mg/kg) after 5 min of sarin-induced electrographic seizure activity (EGSA) ameliorated EGSA and convulsive behavior (238 ± 90 s). Identical treatment after 30 min was not sufficient to ameliorate ECoG paradoxical activity and convulsive behavior. Nasal midazolam (1.5 mg/kg), together with scopolamine (1 mg/kg, im) after 5 min of EGSA, exerted a powerful and rapid anticonvulsant effect (53 ± 10 s). Delaying the same treatment to 30 min of EGSA leads to attenuation of paroxysmal ECoG activity in all cases but total cessation of paroxysmal activity was not observed in most animals tested. Cognitive tests utilizing the Morris Water Maze demonstrated that nasal midazolam alone or together with scopolamine (im), administered after 5 min of convulsions, abolished the effect of sarin on learning. Both these treatments, when given after 30 min of convulsions, only decreased the sarin-induced learning impairments. Whereas rats which were not subject to the anticonvulsant agents did not show any memory for the platform location, both treatments (at 5 min as well as at 30 min) completely abolished the memory deficits. Both treatments equally blocked the impairment of reversal learning when given at 5 min. However, when administered after 30 min, midazolam alone reversed the impairments in reversal learning, while midazolam with scopolamine did not. Rats exposed to sarin and treated with the therapeutic regimen with the exclusion of midazolam exhibited severe brain lesions that encountered the hippocampus, pyriform cortex, and thalamus. Nasal midazolam at 5 min prevented brain damage, while delaying the midazolam treatment to 30 min of EGSA resulted in

  20. Anticonvulsant treatment of sarin-induced seizures with nasal midazolam: An electrographic, behavioral, and histological study in freely moving rats

    Energy Technology Data Exchange (ETDEWEB)

    Gilat, E [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel); Kadar, T [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel); Levy, A [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel); Rabinovitz, I [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel); Cohen, G [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel); Kapon, Y [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel); Sahar, R [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel); Brandeis, R [Department of Pharmacology, Israel Institute for Biological Research, Ness Ziona, 74100 (Israel)

    2005-11-15

    Centrally mediated seizures and convulsions are common consequences of exposure to organophosphates (OPs). These seizures rapidly progress to status epilepticus (SE) and contribute to profound brain injury. Effective management of these seizures is critical for minimization of brain damage. Nasal application of midazolam (1.5 mg/kg) after 5 min of sarin-induced electrographic seizure activity (EGSA) ameliorated EGSA and convulsive behavior (238 {+-} 90 s). Identical treatment after 30 min was not sufficient to ameliorate ECoG paradoxical activity and convulsive behavior. Nasal midazolam (1.5 mg/kg), together with scopolamine (1 mg/kg, im) after 5 min of EGSA, exerted a powerful and rapid anticonvulsant effect (53 {+-} 10 s). Delaying the same treatment to 30 min of EGSA leads to attenuation of paroxysmal ECoG activity in all cases but total cessation of paroxysmal activity was not observed in most animals tested. Cognitive tests utilizing the Morris Water Maze demonstrated that nasal midazolam alone or together with scopolamine (im), administered after 5 min of convulsions, abolished the effect of sarin on learning. Both these treatments, when given after 30 min of convulsions, only decreased the sarin-induced learning impairments. Whereas rats which were not subject to the anticonvulsant agents did not show any memory for the platform location, both treatments (at 5 min as well as at 30 min) completely abolished the memory deficits. Both treatments equally blocked the impairment of reversal learning when given at 5 min. However, when administered after 30 min, midazolam alone reversed the impairments in reversal learning, while midazolam with scopolamine did not. Rats exposed to sarin and treated with the therapeutic regimen with the exclusion of midazolam exhibited severe brain lesions that encountered the hippocampus, pyriform cortex, and thalamus. Nasal midazolam at 5 min prevented brain damage, while delaying the midazolam treatment to 30 min of EGSA resulted

  1. Attack-Related Life Disruption and Child Psychopathology in New York City Public Schoolchildren 6-Months Post-9/11

    Science.gov (United States)

    Comer, Jonathan S.; Fan, Bin; Duarte, Cristiane S.; Wu, Ping; Musa, George J.; Mandell, Donald J.; Albano, Anne Marie; Hoven, Christina W.

    2010-01-01

    In the aftermath of disasters, understanding relationships between disaster-related life disruption and children's functioning is key to informing future postdisaster intervention efforts. The present study examined attack-related life disruptions and psychopathology in a representative sample (N = 8,236) of New York City public schoolchildren…

  2. Australasian disasters of national significance: an epidemiological analysis, 1900-2012.

    Science.gov (United States)

    Bradt, David A; Bartley, Bruce; Hibble, Belinda A; Varshney, Kavita

    2015-04-01

    A regional epidemiological analysis of Australasian disasters in the 20th century to present was undertaken to examine trends in disaster epidemiology; to characterise the impacts on civil society through disaster policy, practice and legislation; and to consider future potential limitations in national disaster resilience. A surveillance definition of disaster was developed conforming to the Centre for Research on the Epidemiology of Disasters (CRED) criteria (≥10 deaths, ≥100 affected, or declaration of state emergency or appeal for international assistance). The authors then applied economic and legislative inclusion criteria to identify additional disasters of national significance. The surveillance definition yielded 165 disasters in the period, from which 65 emerged as disasters of national significance. There were 38 natural disasters, 22 technological disasters, three offshore terrorist attacks and two domestic mass shootings. Geographic analysis revealed that states with major population centres experienced the vast majority of disasters of national significance. Timeline analysis revealed an increasing incidence of disasters since the 1980s, which peaked in the period 2005-2009. Recent seasonal bushfires and floods have incurred the highest death toll and economic losses in Australasian history. Reactive hazard-specific legislation emerged after all terrorist acts and after most disasters of national significance. Timeline analysis reveals an increasing incidence in natural disasters over the past 15 years, with the most lethal and costly disasters occurring in the past 3 years. Vulnerability to disaster in Australasia appears to be increasing. Reactive legislation is a recurrent feature of Australasian disaster response that suggests legislative shortsightedness and a need for comprehensive all-hazards model legislation in the future. © 2015 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  3. Effects of low-level sarin and cyclosarin exposure on hippocampal subfields in Gulf War Veterans.

    Science.gov (United States)

    Chao, Linda L; Kriger, Stephen; Buckley, Shannon; Ng, Peter; Mueller, Susanne G

    2014-09-01

    More than 100,000 US troops were potentially exposed to chemical warfare agents sarin (GB) and cyclosarin (GF) when an ammunition dump at Khamisiyah, Iraq was destroyed during the 1991 Gulf War (GW). We previously reported reduced hippocampal volume in GW veterans with suspected GB/GF exposure relative to matched, unexposed GW veterans estimated from 1.5T magnetic resonance images (MRI). Here we investigate, in a different cohort of GW veterans, whether low-level GB/GF exposure is associated with structural alterations in specific hippocampal subfields, estimated from 4T MRI. The Automatic Segmentation of Hippocampal Subfields (ASHS) technique was used to quantify CA1, CA2, CA3 and dentate gyrus (DG), and subiculum (SUB) subfields volumes from high-resolution T2-weighted images acquired on a 4T MR scanner in 56 GW veterans with suspected GB/GF exposure and 56 "matched" unexposed GW veterans (mean age 49±7 years). GB/GF exposed veterans had smaller CA2 (p=0.003) and CA3/DG (p=0.01) subfield volumes compared to matched, unexposed GW veterans. There were no group difference in total hippocampal volume, quantified with FreeSurfer, and no dose-response relationship between estimated levels of GB/GF exposure and total hippocampal or subfield volume. These findings extend our previous report of structural alterations in the hippocampi of GW veterans with suspected GB/GF exposure to volume changes in the CA2, CA3, and DG hippocampal subfields in a different cohort of GW veterans with suspected GB/GF exposure. Published by Elsevier B.V.

  4. Effects of low-level sarin and cyclosarin exposure on hippocampal microstructure in Gulf War Veterans.

    Science.gov (United States)

    Chao, Linda L; Zhang, Yu

    2018-05-04

    In early March 1991, shortly after the end of the Gulf War (GW), a munitions dump was destroyed at Khamisiyah, Iraq. Later, in 1996, the dump was found to have contained the organophosphorus (OP) nerve agents sarin and cyclosarin. We previously reported evidence of smaller hippocampal volumes in GW veterans with predicted exposure to the Khamisiyah plume compared to unexposed GW veterans. To investigate whether these macroscopic hippocampal volume changes are accompanied by microstructural alterations in the hippocampus, the current study acquired diffusion-tensor imaging (DTI), T1-, and T2-weighted images from 170 GW veterans (mean age: 53 ± 7 years), 81 of whom had predicted exposure to the Khamisiyah plume according to Department of Defense (DOD) plume modeling. We examined fractional anisotropy (FA), mean diffusivity (MD), and grey matter (GM) density from a hippocampal region of interest (ROI). Results indicate that, even after accounting for total hippocampal GM density (or hippocampal volume), age, sex, apolipoprotein ε4 genotype, and potential confounding OP pesticide exposures, hippocampal MD significantly predicted Khamisiyah exposure status (model p = 0.005, R 2  = 0.215, standardized coefficient β = 0.26, t = 2.85). Hippocampal MD was also inversely correlated with verbal memory learning performance in the entire study sample (p = 0.001). There were no differences in hippocampal FA or GM density; however, veterans with predicted Khamisiyah exposure had smaller hippocampal volumes compared to unexposed veterans. Because MD is sensitive to general microstructural disruptions that lead to increased extracellular spaces due to neuronal death, inflammation and gliosis, and/or to axonal loss or demyelination, these findings suggest that low-level exposure to the Khamisiyah plume has a detrimental, lasting effects on both macro- and micro-structure of the hippocampus. Copyright © 2018. Published by Elsevier Inc.

  5. Community Disasters, Psychological Trauma, and Crisis Intervention.

    Science.gov (United States)

    Boscarino, Joseph A

    The current issue of International Journal of Emergency Mental Health and Human Resilience is focused on community disasters, the impact of trauma exposure, and crisis intervention. The articles incorporated include studies ranging from the World Trade Center disaster to Hurricane Sandy. These studies are related to public attitudes and beliefs about disease outbreaks, the impact of volunteerism following the World Trade Center attacks, alcohol misuse among police officers after Hurricane Katrina, posttraumatic stress disorder after Hurricane Sandy among those exposed to the Trade Center disaster, compassion fatigue and burnout among trauma workers, crisis interventions in Eastern Europe, and police officers' use of stress intervention services. While this scope is broad, it reflects the knowledge that has emerged since the Buffalo Creek and Chernobyl catastrophes, to the more recent Hurricane Katrina and Sandy disasters. Given the current threat environment, psychologists, social workers, and other providers need to be aware of these developments and be prepared to mitigate the impact of psychological trauma following community disasters, whether natural or man-made.

  6. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  7. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  8. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  9. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  10. Conceptualizing Cold Disasters

    DEFF Research Database (Denmark)

    Lauta, Kristian Cedervall; Dahlberg, Rasmus; Vendelø, Morten Thanning

    2017-01-01

    In the present article, we explore in more depth the particular circumstances and characteristics of governing what we call ‘cold disasters’, and thereby, the paper sets out to investigate how disasters in cold contexts distinguish themselves from other disasters, and what the implications hereof...... are for the conceptualization and governance of cold disasters. Hence, the paper can also be viewed as a response to Alexander’s (2012a) recent call for new theory in the field of disaster risk reduction. The article is structured in four overall parts. The first part, Cold Context, provides an overview of the specific...... conditions in a cold context, exemplified by the Arctic, and zooms in on Greenland to provide more specific background for the paper. The second part, Disasters in Cold Contexts, discusses “cold disasters” in relation to disaster theory, in order to, elucidate how cold disasters challenge existing...

  11. Disaster in Crisis

    DEFF Research Database (Denmark)

    Illner, Peer

    initiatives and bottom-up organising as the preferred method to combat disaster. Once construed as strictly a responsibility of the state, the mitigation and management of disasters has shifted since the 1970s into a matter for civil society: a shift which has been heralded as progressive, democratic...... the banner of disaster. Focussing on the modifications to disaster management in the United States between 1970 and 2012, I show how the inclusion of civil society in the provision of aid services was accompanied by a structural withdrawal of the state from disaster relief and other welfare services. I...... contextualise this withdrawal in the US government’s general turn to austerity in response to the economic crisis of the 1970s. My account couples the notion of disaster with that of economic crisis on the one hand and structural violence on the other to examine disasters as a specific problem for social...

  12. Quantitative analysis of O-isopropyl methylphosphonic acid in serum samples of Japanese citizens allegedly exposed to sarin: Estimation of internal dosage

    NARCIS (Netherlands)

    Noort, D.; Hulst, A.G.; Platenburg, D.H.J.M.; Polhuijs, M.; Benschop, H.P.

    1998-01-01

    A convenient and rapid micro-anion exchange liquid chromatography (LC) tandem electrospray mass spectrometry (MS) procedure was developed for quantitative analysis in serum of O-isopropyl methylphosphonic acid (IMPA), the hydrolysis product of the nerve agent sarin. The mass spectrometric procedure

  13. Transcriptional responses of the nerve agent-sensitive brain regions amygdala, hippocampus, piriform cortex, septum, and thalamus following exposure to the organophosphonate anticholinesterase sarin

    Directory of Open Access Journals (Sweden)

    Meyerhoff James L

    2011-07-01

    Full Text Available Abstract Background Although the acute toxicity of organophosphorus nerve agents is known to result from acetylcholinesterase inhibition, the molecular mechanisms involved in the development of neuropathology following nerve agent-induced seizure are not well understood. To help determine these pathways, we previously used microarray analysis to identify gene expression changes in the rat piriform cortex, a region of the rat brain sensitive to nerve agent exposure, over a 24-h time period following sarin-induced seizure. We found significant differences in gene expression profiles and identified secondary responses that potentially lead to brain injury and cell death. To advance our understanding of the molecular mechanisms involved in sarin-induced toxicity, we analyzed gene expression changes in four other areas of the rat brain known to be affected by nerve agent-induced seizure (amygdala, hippocampus, septum, and thalamus. Methods We compared the transcriptional response of these four brain regions to sarin-induced seizure with the response previously characterized in the piriform cortex. In this study, rats were challenged with 1.0 × LD50 sarin and subsequently treated with atropine sulfate, 2-pyridine aldoxime methylchloride, and diazepam. The four brain regions were collected at 0.25, 1, 3, 6, and 24 h after seizure onset, and total RNA was processed for microarray analysis. Results Principal component analysis identified brain region and time following seizure onset as major sources of variability within the dataset. Analysis of variance identified genes significantly changed following sarin-induced seizure, and gene ontology analysis identified biological pathways, functions, and networks of genes significantly affected by sarin-induced seizure over the 24-h time course. Many of the molecular functions and pathways identified as being most significant across all of the brain regions were indicative of an inflammatory response. There

  14. Probing the reactivation process of sarin-inhibited acetylcholinesterase with α-nucleophiles: hydroxylamine anion is predicted to be a better antidote with DFT calculations.

    Science.gov (United States)

    Khan, Md Abdul Shafeeuulla; Lo, Rabindranath; Bandyopadhyay, Tusar; Ganguly, Bishwajit

    2011-08-01

    Inactivation of acetylcholinesterase (AChE) due to inhibition by organophosphorus (OP) compounds is a major threat to human since AChE is a key enzyme in neurotransmission process. Oximes are used as potential reactivators of OP-inhibited AChE due to their α-effect nucleophilic reactivity. In search of more effective reactivating agents, model studies have shown that α-effect is not so important for dephosphylation reactions. We report the importance of α-effect of nucleophilic reactivity towards the reactivation of OP-inhibited AChE with hydroxylamine anion. We have demonstrated with DFT [B3LYP/6-311G(d,p)] calculations that the reactivation process of sarin-serine adduct 2 with hydroxylamine anion is more efficient than the other nucleophiles reported. The superiority of hydroxylamine anion to reactivate the sarin-inhibited AChE with sarin-serine adducts 3 and 4 compared to formoximate anion was observed in the presence and absence of hydrogen bonding interactions of Gly121 and Gly122. The calculated results show that the rates of reactivation process of adduct 4 with hydroxylamine anion are 261 and 223 times faster than the formoximate anion in the absence and presence of such hydrogen bonding interactions. The DFT calculated results shed light on the importance of the adjacent carbonyl group of Glu202 for the reactivation of sarin-serine adduct, in particular with formoximate anion. The reverse reactivation reaction between hydroxylamine anion and sarin-serine adduct was found to be higher in energy compared to the other nucleophiles, which suggests that this α-nucleophile can be a good antidote agent for the reactivation process. Copyright © 2011 Elsevier Inc. All rights reserved.

  15. Deterioration in brain and heart functions following a single sub-lethal (0.8 LCt50) inhalation exposure of rats to sarin vapor:

    International Nuclear Information System (INIS)

    Allon, N.; Chapman, S.; Egoz, I.; Rabinovitz, I.; Kapon, J.; Weissman, B.A.; Yacov, G.; Bloch-Shilderman, E.; Grauer, E.

    2011-01-01

    The main injuries among victims of the terrorist act in the Tokyo subway resulted from sub-lethal inhalation and whole body exposure to sarin vapor. In order to study the long term effects of such exposure and to simulate these conditions, freely moving rats were exposed to sarin vapor (27.2 ± 1.7 μg/l) for 10 min. About 50% of the rats showed no overt symptoms and the rest had mild to moderate clinical symptoms that subsided within 4 h following exposure. A reduction of weight was noted during the first 3 days with full recovery on the 4th day. Rat's heart was challenged with epinephrine 1 and 6 months post exposure. A significant reduction in the threshold for epinephrine-induced arrhythmia (EPIA) was noted in rats exposed to sarin. A time dependent increase in the kD and Bmax values of muscarinic auto receptors (M2) was recorded in the rat's cortex and striatum. No changes were recorded in the rats' brain trans locator protein (TSPO) levels, concomitant with no observed changes in the animals' performance in A Morris water maze test. A significant increase in open field activity was noted 6 months following exposure to sarin vapor as well as a significant decrease in prostaglandin E 2 (PGE 2 ) production in the brain. It is speculated that down regulation of the M2 auto receptor function, caused hyper reactivity of the cholinergic system which leads to the changes described above. The continuous reduction in M2 auto-receptor system through an unknown mechanism may be the cause for long lasting decline in sarin-exposed casualties' health.

  16. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  17. The inhibition, reactivation and mechanism of VX-, sarin-, fluoro-VX and fluoro-sarin surrogates following their interaction with HuAChE and HuBuChE.

    Science.gov (United States)

    Chao, Chih-Kai; Balasubramanian, Narayanaganesh; Gerdes, John M; Thompson, Charles M

    2018-06-16

    In this study, the mechanisms of HuAChE and HuBChE inhibition by Me-P(O) (OPNP) (OR) [PNP = p-nitrophenyl; R = CH 2 CH 3 , CH 2 CH 2 F, OCH(CH 3 ) 2 , OCH(CH 3 ) (CH 2 F)] representing surrogates and fluoro-surrogates of VX and sarin were studied by in vitro kinetics and mass spectrometry. The in vitro measures showed that the VX- and fluoro-VX surrogates were relatively strong inhibitors of HuAChE and HuBChE (k i  ∼ 10 5 -10 6  M -1 min -1 ) and underwent spontaneous and 2-PAM-mediated reactivation within 30 min. The sarin surrogates were weaker inhibitors of HuAChE and HuBChE (k i  ∼ 10 4 -10 5  M -1 min -1 ), and in general did not undergo spontaneous reactivation, although HuAChE adducts were partially reactivatable at 18 h using 2-PAM. The mechanism of HuAChE and HuBChE inhibition by the surrogates was determined by Q-TOF and MALDI-TOF mass spectral analyses. The surrogate-adducted proteins were trypsin digested and the active site-containing peptide bearing the OP-modified serine identified by Q-TOF as triply- and quadruply-charged ions representing the respective increase in mass of the attached OP moiety. Correspondingly, monoisotopic ions of the tryptic peptides representing the mass increase of the OP-adducted peptide was identified by MALDI-TOF. The mass spectrometry analyses validated the identity of the OP moiety attached to HuAChE or HuBChE as MeP(O) (OR)-O-serine peptides (loss of the PNP leaving group) via mechanisms consistent with those found with chemical warfare agents. MALDI-TOF MS analyses of the VX-modified peptides versus time showed a steady reduction in adduct versus parent peptide (reactivation), whereas the sarin-surrogate-modified peptides remained largely intact over the course of the experiment (24 h). Overall, the presence of a fluorine atom on the surrogate modestly altered the rate constants of inhibition and reactivation, however, the mechanism of inhibition (ejection of PNP group) did not change

  18. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  19. Simulating and Communicating Outcomes in Disaster Management Situations

    Directory of Open Access Journals (Sweden)

    Michal Lichter

    2015-09-01

    Full Text Available An important, but overlooked component of disaster managment is raising the awareness and preparedness of potential stakeholders. We show how recent advances in agent-based modeling and geo-information analytics can be combined to this effect. Using a dynamic simulation model, we estimate the long run outcomes of two very different urban disasters with severe consequences: an earthquake and a missile attack. These differ in terms of duration, intensity, permanence, and focal points. These hypothetical shocks are simulated for the downtown area of Jerusalem. Outcomes are compared in terms of their potential for disaster mitigation. The spatial and temporal dynamics of the simulation yield rich outputs. Web-based mapping is used to visualize these results and communicate risk to policy makers, planners, and the informed public. The components and design of this application are described. Implications for participatory disaster management and planning are discussed.

  20. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  1. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  2. Disaster mental health

    DEFF Research Database (Denmark)

    Henderson, Silja; Berliner, Peter; Elsass, Peter

    2015-01-01

    In this chapter we focus on disaster mental health, particularly theoretical and research-based implications for intervention. The field of disaster mental health research is vast and impossible to cover in a single chapter, but we will visit central research, concepts, and understandings within...... disaster mental health and intervention, and refer to further literature where meaningful. We conclude the chapter with recommendations for further research....

  3. Disaster mitigation: initial response.

    Science.gov (United States)

    Kennedy, George; Richards, Michael; Chicarelli, Michael; Ernst, Amy; Harrell, Andrew; Stites, Danniel

    2013-01-01

    The objective of this review is to stimulate the reader's considerations for developing community disaster mitigation. Disaster mitigation begins long before impact and is defined as the actions taken by a community to eliminate or minimize the impact of a disaster. The assessment of vulnerabilities, the development of infrastructure, memoranda of understanding, and planning for a sustainable response and recovery are parts of the process. Empowering leadership and citizens with knowledge of available resources through the planning and development of a disaster response can strengthen a community's resilience, which can only add to the viability and quality of life enjoyed by the entire community.

  4. 13 CFR 123.603 - What is the interest rate on an economic injury disaster loan under this subpart?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What is the interest rate on an... September 11, 2001 Terrorist Attacks § 123.603 What is the interest rate on an economic injury disaster loan under this subpart? Your economic injury disaster loan under this subpart will have an interest rate of...

  5. Preparing for Disaster: Taking the Lead

    Science.gov (United States)

    Colber, Judith

    2008-01-01

    In this article, Irwin Redlener, director of the National Center for Disaster Preparedness describes disasters in relation to five phases that may serve as a helpful framework for planning disaster response: (1) before the disaster (pre-disaster); (2) during the disaster (intra-disaster); (3) immediately after the disaster (immediate…

  6. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  8. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  9. Dual Role of Water in Heterogeneous Catalytic Hydrolysis of Sarin by Zirconium-Based Metal-Organic Frameworks.

    Science.gov (United States)

    Momeni, Mohammad R; Cramer, Christopher J

    2018-05-22

    Recent experimental studies on Zr IV -based metal-organic frameworks (MOFs) have shown the extraordinary effectiveness of these porous materials for the detoxification of phosphorus-based chemical warfare agents (CWAs). However, pressing challenges remain with respect to characterizing these catalytic processes both at the molecular and crystalline levels. We here use theory to compare the reactivity of different zirconium-based MOFs for the catalytic hydrolysis of the CWA sarin, using both periodic and cluster modeling. We consider both hydrated and dehydrated secondary building units, as well as linker functionalized MOFs, to more fully understand and rationalize available experimental findings as well as to enable concrete predictions for achieving higher activities for the decomposition of CWAs.

  10. The performance and potentials of the CryoSat-2 SAR and SARIn modes for lake level estimation

    DEFF Research Database (Denmark)

    Nielsen, Karina; Stenseng, Lars; Andersen, Ole Baltazar

    2017-01-01

    Over the last few decades, satellite altimetry has proven to be valuable for monitoring lake levels. With the new generation of altimetry missions, CryoSat-2 and Sentinel-3, which operate in Synthetic Aperture Radar (SAR) and SAR Interferometric (SARIn) modes, the footprint size is reduced...... to approximately 300 m in the along-track direction. Here, the performance of these new modes is investigated in terms of uncertainty of the estimated water level from CryoSat-2 data and the agreement with in situ data. The data quality is compared to conventional low resolution mode (LRM) altimetry products from...... of that of the Envisat results. Generally, the CryoSat-2 lake levels also show a better agreement with the in situ data. The lower uncertainty of the CryoSat-2 results entails a more detailed description of water level variations....

  11. Stack Characterization in CryoSat Level1b SAR/SARin Baseline C

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Di Giacinto, Andrea; Bouffard, Jerome; Féménias, Pierre; Parrinello, Tommaso

    2015-04-01

    CryoSat was launched on the 8th April 2010 and is the first European ice mission dedicated to the monitoring of precise changes in the thickness of polar ice sheets and floating sea ice. CryoSat is the first altimetry mission operating in SAR mode and it carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. The current CryoSat IPF (Instrument Processing Facility), Baseline B, was released in operation in February 2012. After more than 2 years of development, the release in operations of the Baseline C is expected in the first half of 2015. It is worth recalling here that the CryoSat SAR/SARin IPF1 generates 20Hz waveforms in correspondence of an approximately equally spaced set of ground locations on the Earth surface, i.e. surface samples, and that a surface sample gathers a collection of single-look echoes coming from the processed bursts during the time of visibility. Thus, for a given surface sample, the stack can be defined as the collection of all the single-look echoes pointing to the current surface sample, after applying all the necessary range corrections. The L1B product contains the power average of all the single-look echoes in the stack: the multi-looked L1B waveform. This reduces the data volume, while removing some information contained in the single looks, useful for characterizing the surface and modelling the L1B waveform. To recover such information, a set of parameters has been added to the L1B product: the stack characterization or beam behaviour parameters. The stack characterization, already included in previous Baselines, has been reviewed and expanded in Baseline C. This poster describes all the stack characterization parameters, detailing what they represent and how they have been computed. In details, such parameters can be summarized in: - Stack

  12. Disaster Risk Management - The Kenyan Challenges

    Science.gov (United States)

    Nabutola, W.

    2009-04-01

    Keywords: natural disasters; man-made disasters; terrorist attacks; land slides; disaster policies and legislations; fire; earthquakes; hurricanes; soil erosion; disaster research policy; Preamble: "Risk does not begin and end on the floor of the New York Stock Exchange. The vastness of the subject matter is daunting. Risk touches on the most profound aspects of psychology, mathematics, statistics and history. The literature is monumental; each day's headlines bring many new items of interest. But I know we are not unique, everywhere in the world risks abound." "AGAINST THE GODS the remarkable story of risk" by Peter L. Bernstein, 1998 The real challenge is what can we, as a nation do to avert, prevent them, or in the unfortunate event that they occur, how can we mitigate their impact on the economy? Introductory remarks: Disaster in Kenya, as indeed anywhere else, is not one of those happenings we can wish away. It can strike anywhere any time. Some of it is man-made but most of it is natural. The natural are sometimes induced by man in one way or another. For example, when we harvest trees without replacing them, this diminishes the forest cover and can lead to soil erosion, whose advanced form is land slides. Either way disasters in their different forms and sizes present challenges to the way we live our lives or not, perhaps, even how we die. Disasters in our country have reached crisis stage. ‘In Chinese language, crisis means danger, but it also means opportunity' Les Brown, motivational speaker in "the power of a larger vision" Why I am interested Whereas Kenya experiences man made and natural disasters, there are more sinister challenges of the man-made variety. These loom on the horizon and, from time to time raise their ugly heads, taking many Kenyan lives in their wake, and property destroyed. These are post election violence and terrorist attacks, both related to politics, internal and external. In January 2008, soon after presidential and national

  13. Disaster Risk Management - The Kenyan Challenge

    Science.gov (United States)

    Nabutola, W.; Scheer, S.

    2009-04-01

    Keywords: natural disasters; man-made disasters; terrorist attacks; land slides; disaster policies and legislations; fire; earthquakes; hurricanes; soil erosion; disaster research policy; Preamble: "Risk does not begin and end on the floor of the New York Stock Exchange. The vastness of the subject matter is daunting. Risk touches on the most profound aspects of psychology, mathematics, statistics and history. The literature is monumental; each day's headlines bring many new items of interest. But I know we are not unique, everywhere in the world risks abound." "AGAINST THE GODS the remarkable story of risk" by Peter L. Bernstein, 1998 The real challenge is what can we, as a nation do to avert, prevent them, or in the unfortunate event that they occur, how can we mitigate their impact on the economy? Introductory remarks: Disaster in Kenya, as indeed anywhere else, is not one of those happenings we can wish away. It can strike anywhere any time. Some of it is man-made but most of it is natural. The natural are sometimes induced by man in one way or another. For example, when we harvest trees without replacing them, this diminishes the forest cover and can lead to soil erosion, whose advanced form is land slides. Either way disasters in their different forms and sizes present challenges to the way we live our lives or not, perhaps, even how we die. Disasters in our country have reached crisis stage. ‘In Chinese language, crisis means danger, but it also means opportunity' Les Brown, motivational speaker in "the power of a larger vision" Why I am interested Whereas Kenya experiences man made and natural disasters, there are more sinister challenges of the man-made variety. These loom on the horizon and, from time to time raise their ugly heads, taking many Kenyan lives in their wake, and property destroyed. These are post election violence and terrorist attacks, both related to politics, internal and external. In January 2008, soon after presidential and national

  14. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  15. Innovative shelter for disasters

    NARCIS (Netherlands)

    Erkelens, P.A.; Akkerman, M.S.; Cox, M.G.D.M.; Egmond - de Wilde De Ligny, van E.L.C.; Haas, de T.C.A.; Brouwer, E.R.P.

    2010-01-01

    Disasters cause tremendous material and immaterial damage to people and their habitat. During the first days after the disaster the victims have to be provided with food, shelter, security, health care and registration. For sheltering, depending on the local circumstances, tents are often used for a

  16. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  17. Epidemics after Natural Disasters

    Science.gov (United States)

    Gayer, Michelle; Connolly, Maire A.

    2007-01-01

    The relationship between natural disasters and communicable diseases is frequently misconstrued. The risk for outbreaks is often presumed to be very high in the chaos that follows natural disasters, a fear likely derived from a perceived association between dead bodies and epidemics. However, the risk factors for outbreaks after disasters are associated primarily with population displacement. The availability of safe water and sanitation facilities, the degree of crowding, the underlying health status of the population, and the availability of healthcare services all interact within the context of the local disease ecology to influence the risk for communicable diseases and death in the affected population. We outline the risk factors for outbreaks after a disaster, review the communicable diseases likely to be important, and establish priorities to address communicable diseases in disaster settings. PMID:17370508

  18. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  19. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  20. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  1. The oxime pro-2-PAM provides minimal protection against the CNS effects of the nerve agents sarin, cyclosarin, and VX in guinea pigs.

    Science.gov (United States)

    Shih, Tsung-Ming; Guarisco, John A; Myers, Todd M; Kan, Robert K; McDonough, John H

    2011-01-01

    This study examined whether pro-2-PAM, a pro-drug dihydropyridine derivative of the oxime 2-pralidoxime (2-PAM) that can penetrate the brain, could prevent or reverse the central toxic effects of three nerve agents; sarin, cyclosarin, and VX. The first experiment tested whether pro-2-PAM could reactivate guinea pig cholinesterase (ChE) in vivo in central and peripheral tissues inhibited by these nerve agents. Pro-2-PAM produced a dose-dependent reactivation of sarin- or VX-inhibited ChE in both peripheral and brain tissues, but with substantially greater reactivation in peripheral tissues compared to brain. Pro-2-PAM produced 9-25% reactivation of cyclosarin-inhibited ChE in blood, heart, and spinal cord, but no reactivation in brain or muscle tissues. In a second experiment, the ability of pro-2-PAM to block or terminate nerve agent-induced electroencephalographic seizure activity was evaluated. Pro-2-PAM was able to block sarin- or VX-induced seizures (16-33%) over a dose range of 24-32 mg/kg, but was ineffective against cyclosarin-induced seizures. Animals that were protected from seizures showed significantly less weight loss and greater behavioral function 24 h after exposure than those animals that were not protected. Additionally, brains were free from neuropathology when pro-2-PAM prevented seizures. In summary, pro-2-PAM provided modest reactivation of sarin- and VX-inhibited ChE in the brain and periphery, which was reflected by a limited ability to block or terminate seizures elicited by these agents. Pro-2-PAM was able to reactivate blood, heart, and spinal cord ChE inhibited by cyclosarin, but was not effective against cyclosarin-induced seizures.

  2. Social capital and disaster preparedness among low income Mexican Americans in a disaster prone area.

    Science.gov (United States)

    Reininger, Belinda M; Rahbar, Mohammad H; Lee, Minjae; Chen, Zhongxue; Alam, Sartaj R; Pope, Jennifer; Adams, Barbara

    2013-04-01

    Examination of social capital and its relationship to disaster preparedness has grown in prominence partially due to world-wide need to effectively respond to terrorist attacks, viral epidemics, or natural disasters. Recent studies suggested that social capital may be related to a community's ability to plan for and respond to such disasters. Few studies, however, have examined social capital constructs among low income populations living in disaster prone areas and accounted for the influence of social capital at the individual and community level. We examined social capital as measured by perceived fairness, perceived civic trust, perceived reciprocity and group membership. We undertook a multistage random cluster survey in three coastal counties in Texas (U.S.) noted for their high levels of poverty. Individuals from 3088 households provided data on social capital, socioeconomic and demographic characteristics, and self-reported level of preparedness for a hurricane. We used multivariable logistic regression to test potential associations between social capital measures and disaster preparedness. After adjusting for age, gender, marital status, ethnicity, education, employment, household income, acculturation, self-reported health, special needs persons in household, household size, and distance to the shore we found a higher prevalence of preparedness among individuals who reported the highest perception of fairness [AOR = 3.12, 95% CI: (1.86, 5.21)] compared to those individuals who reported lowest perceptions of fairness. We also found a higher prevalence of preparedness [AOR = 2.06; 95% CI: (1.17, 3.62)] among individuals who reported highest perceptions of trust compared to individuals who reported lowest perceptions of trust. Perceived reciprocity and group membership were not associated with preparedness. These results extend previous findings on social capital and disaster preparedness and further characterize social capital's presence among a low

  3. Natural disasters and the lung.

    Science.gov (United States)

    Robinson, Bruce; Alatas, Mohammad Fahmi; Robertson, Andrew; Steer, Henry

    2011-04-01

    As the world population expands, an increasing number of people are living in areas which may be threatened by natural disasters. Most of these major natural disasters occur in the Asian region. Pulmonary complications are common following natural disasters and can result from direct insults to the lung or may be indirect, secondary to overcrowding and the collapse in infrastructure and health-care systems which often occur in the aftermath of a disaster. Delivery of health care in disaster situations is challenging and anticipation of the types of clinical and public health problems faced in disaster situations is crucial when preparing disaster responses. In this article we review the pulmonary effects of natural disasters in the immediate setting and in the post-disaster aftermath and we discuss how this could inform planning for future disasters. © 2011 The Authors. Respirology © 2011 Asian Pacific Society of Respirology.

  4. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  5. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  6. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  7. Coping with Disaster

    Science.gov (United States)

    ... or friends. On-going stress from the secondary effects of disaster, such as temporarily living elsewhere, loss of friends and social networks, loss of personal property, parental unemployment, and costs ...

  8. FEMA Disaster Recovery Centers

    Data.gov (United States)

    Department of Homeland Security — This is a search site for FEMA's Disaster Recovery Centers (DRC). A DRC is a readily accessible facility or mobile office set up by FEMA where applicants may go for...

  9. Resilience in disaster research

    DEFF Research Database (Denmark)

    Dahlberg, Rasmus; Johannessen-Henry, Christine Tind; Raju, Emmanuel

    2015-01-01

    This paper explores the concept of resilience in disaster management settings in modern society. The diversity and relatedness of ‘resilience’ as a concept and as a process are reflected in its presentation through three ‘versions’: (i) pastoral care and the role of the church for victims...... of disaster trauma, (ii) federal policy and the US Critical Infrastructure Plan, and (iii) the building of resilient communities for disaster risk reduction practices. The three versions aim to offer characteristic expressions of resilience, as increasingly evident in current disaster literature....... In presenting resilience through the lens of these three versions, the article highlights the complexity in using resilience as an all-encompassing word. The article also suggests the need for understanding the nexuses between risk, vulnerability, and policy for the future of resilience discourse....

  10. Disaster Distress Helpline: Wildfires

    Science.gov (United States)

    ... on Facebook . Resources Helpline Brochure Helpline Wallet Card Disaster Kit Back To Top SAMHSA Quick Links + SAMHSA.gov Homepage Accessibility Privacy Disclaimer Viewers & Plugins FOIA Plain Language Site Map SAMHSA Archive Strategic Initiatives Health Financing Prevention ...

  11. Disaster Distress Helpline

    Science.gov (United States)

    ... on Facebook . Resources Helpline Brochure Helpline Wallet Card Disaster Kit Back To Top SAMHSA Quick Links + SAMHSA.gov Homepage Accessibility Privacy Disclaimer Viewers & Plugins FOIA Plain Language Site Map SAMHSA Archive Strategic Initiatives Health Financing Prevention ...

  12. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  13. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  14. The system was blinking red: Awareness Contexts and Disasters

    Directory of Open Access Journals (Sweden)

    Vivian B. Martin

    2015-12-01

    Full Text Available The awareness context has been a source of inspiration for grounded theories for more than 50 years; yet little has been done to extend the theory beyond nursing and the medical field, and a few works on identity. This paper extends the awareness context by examining its role in several high-profile disasters, natural and man-made, where gaining a clear sense of what was going on was often blocked by poor information flow and general communication failures, interpersonal and technological. Selective coding and the introduction of new concepts after analyzing hundreds of pages of documents issued by special commissions in the aftermath of the 9/11 attacks, Hurricane Katrina, the Deepwater Horizon oil spill in the Gulf, and the Sago Mine Disaster not only explain various processes around awareness in the midst of crisis, but also illuminate pre-crisis patterns that, if attended, could have mitigated the impact of the disasters.

  15. Nuclear disasters: current plans and future directions for oncologists.

    Science.gov (United States)

    Goffman, Thomas E

    2008-01-01

    To show that there is a significant role for oncologists in the event of a terrorist nuclear disaster. Professionals need data on current political issues regarding a nuclear attack already put in place by the administration and the military. Review of what actually occurs during a fission bomb's explosion helps to point out what medical care will be most needed. The author contends that those trained in the oncologies could play a major part. Modern-day America. Potential civilian survivors. Large gaps noted in statewide disaster plans in the public domain. Oncologists must get involved now in disaster planning; statewide plans are necessary throughout the nation; the public needs to know the basics of what to do in the advent of a nuclear bomb explosion.

  16. Disaster Preparedness among Health Professionals and Support Staff: What is Effective? An Integrative Literature Review.

    Science.gov (United States)

    Gowing, Jeremy R; Walker, Kim N; Elmer, Shandell L; Cummings, Elizabeth A

    2017-06-01

    Introduction It is important that health professionals and support staff are prepared for disasters to safeguard themselves and the community during disasters. There has been a significantly heightened focus on disasters since the terrorist attacks of September 11, 2001 in New York (USA); however, despite this, it is evident that health professionals and support staff may not be adequately prepared for disasters. Report An integrative literature review was performed based on a keyword search of the major health databases for primary research evaluating preparedness of health professionals and support staff. The literature was quality appraised using a mixed-methods appraisal tool (MMAT), and a thematic analysis was completed to identify current knowledge and gaps. Discussion The main themes identified were: health professionals and support staff may not be fully prepared for disasters; the most effective content and methods for disaster preparedness is unknown; and the willingness of health professionals and support staff to attend work and perform during disasters needs further evaluation. Gaps were identified to guide further research and the creation of new knowledge to best prepare for disasters. These included the need for: high-quality research to evaluate the best content and methods of disaster preparedness; inclusion of the multi-disciplinary health care team as participants; preparation for internal disasters; the development of validated competencies for preparedness; validated tools for measurement; and the importance of performance in actual disasters to evaluate preparation. The literature identified that all types of disaster preparedness activities lead to improvements in knowledge, skills, or attitude preparedness for disasters. Most studies focused on external disasters and the preparedness of medical, nursing, public health, or paramedic professionals. There needs to be a greater focus on the whole health care team, including allied health

  17. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  18. Stealth Disasters and Geoethics

    Science.gov (United States)

    Kieffer, Susan W.

    2013-04-01

    Natural processes of the earth unleash energy in ways that are sometimes harmful or, at best, inconvenient, for humans: earthquakes, volcanic eruptions, hurricanes, landslides, floods. Ignoring the biological component of the geosphere, we have historically called such events "natural disasters." They are typically characterized by a sudden onset and relatively immediate consequences. There are many historical examples and our human societies have evolved various ways of coping with them logistically, economically, and psychologically. Preparation, co-existence, recovery, and remediation are possible, at least to some extent, even in the largest of events. Geoethical questions exist in each stage, but the limited local extent of these disasters allows the possibility of discussion and resolution. There are other disasters that involve the natural systems that support us. Rather than being driven primarily by natural non-biological processes, these are driven by human behavior. Examples are climate change, desertification, acidification of the oceans, and compaction and erosion of fertile soils. They typically have more gradual onsets than natural disasters and, because of this, I refer to these as "stealth disasters." Although they are unfolding unnoticed or ignored by many, they are having near-term consequences. At a global scale they are new to human experience. Our efforts at preparation, co-existence, recovery, and remediation lag far behind those that we have in place for natural disasters. Furthermore, these four stages in stealth disaster situations involve many ethical questions that typically must be solved in the context of much larger cultural and social differences than encountered in natural disaster settings. Four core ethical principles may provide guidelines—autonomy, non-maleficence, beneficence, and justice (e.g., Jamais Cascio). Geoscientists can contribute to the solutions in many ways. We can work to ensure that as people take responsibility

  19. Disaster medicine. Mental care

    International Nuclear Information System (INIS)

    Haginoya, Masato; Shimoda, Kazutaka

    2012-01-01

    Described are 5 essential comments of view concerning the post-disaster psychiatric care through authors' experience at the aid of the 2011 Tohoku Earthquake and Tsunami including Fukushima Daiichi Nuclear Power Plant Accident. Firstly, at the acute phase of disaster, the ensured safe place, sleep and rest are necessary as a direct aid of sufferers and their family. Insomnia is seen in many of them and can partly be a prodrome of disorders like post traumatic stress disorder (PTSD). US Psychological First Aid (PFA) is useful for a guide of the initial aid for disaster, and translated Japanese version is available free. Public anxiety as a psychological effect can be caused even out of the disaster-stricken area by such factors as on-site news reports (inducing identification), internet information, economical and social confusion, forecasted radiation hazard, etc. Cool-headed understanding is required for them and particularly for complicated radiological information. The system for psychiatric treatment is needed as exemplified by its temporary lack due to the radiation disaster near the Plant and consequent prompt dispatch of psychiatrists from Dokkyo Medical University. Survived sufferers' grief and bereavement are said to tend to last long, to be complicated and deteriorated, indicating the necessity of management of continuous mental health. Alcoholism as a result to avoid those feelings should be noted. Finally, pointed out is the mental care for supporters working for recovery from the disaster, like policeman, Self-Defense Force member, fireman, doctor, nurse, officer, volunteer and many others concerned, because PTSD prevalence is reported to amount to 12.4% of rescue and recovery workers of US World Trade Center Disaster (9.11) even 2-3 years after. (T.T.)

  20. 77 FR 60004 - Pennsylvania Disaster #PA-00053

    Science.gov (United States)

    2012-10-01

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13307 and 13308] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 09/21/2012. Incident... adversely affected by the disaster: Primary Counties: Centre. Contiguous Counties: Pennsylvania: Blair...

  1. 76 FR 30749 - Pennsylvania Disaster #PA-00038

    Science.gov (United States)

    2011-05-26

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12594 and 12595] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 05/18/2011. Incident... disaster: Primary Counties: Cumberland. Contiguous Counties: Pennsylvania: Adams, Dauphin, Franklin, Perry...

  2. 78 FR 52600 - Pennsylvania Disaster #PA-00063

    Science.gov (United States)

    2013-08-23

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13722 and 13723] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 08/14/2013. Incident: Severe... adversely affected by the disaster: Primary Counties: Lawrence. Contiguous Counties: Pennsylvania: Beaver...

  3. 77 FR 65044 - Pennsylvania Disaster #PA-00054

    Science.gov (United States)

    2012-10-24

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13346 and 13347] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 10/18/2012. Incident... adversely affected by the disaster: Primary Counties: Montgomery. Contiguous Counties: Pennsylvania: Berks...

  4. 76 FR 5647 - Pennsylvania Disaster #PA-00036

    Science.gov (United States)

    2011-02-01

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12449 and 12450] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 01/25/2011. Incident... the disaster: Primary Counties: Philadelphia. Contiguous Counties: Pennsylvania: Bucks, Delaware...

  5. 75 FR 71486 - Pennsylvania Disaster # PA-00035

    Science.gov (United States)

    2010-11-23

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12389 and 12390] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 11/15/2010. Incident: Severe... the disaster: Primary Counties: Delaware. Contiguous Counties: Pennsylvania: Chester, Montgomery...

  6. 75 FR 2165 - Pennsylvania Disaster #PA-00030

    Science.gov (United States)

    2010-01-14

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12002 and 12003] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 01/07/2010. Incident... adversely affected by the disaster: Primary Counties: Centre. Contiguous Counties: Pennsylvania: Blair...

  7. 78 FR 47814 - Pennsylvania Disaster # PA-00059

    Science.gov (United States)

    2013-08-06

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13676 and 13677] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of PENNSYLVANIA dated 07/29/2013. Incident: Severe... adversely affected by the disaster: Primary Counties: Allegheny. Contiguous Counties: Pennsylvania...

  8. 78 FR 60366 - Pennsylvania Disaster #PA-00064

    Science.gov (United States)

    2013-10-01

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13777 and 13778] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 09/24/2013. Incident: Storms... adversely affected by the disaster: Primary Counties: Armstrong. Contiguous Counties: Pennsylvania...

  9. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  10. The Performance and Potentials of the CryoSat-2 SAR and SARIn Modes for Lake Level Estimation

    Directory of Open Access Journals (Sweden)

    Karina Nielsen

    2017-05-01

    Full Text Available Over the last few decades, satellite altimetry has proven to be valuable for monitoring lake levels. With the new generation of altimetry missions, CryoSat-2 and Sentinel-3, which operate in Synthetic Aperture Radar (SAR and SAR Interferometric (SARIn modes, the footprint size is reduced to approximately 300 m in the along-track direction. Here, the performance of these new modes is investigated in terms of uncertainty of the estimated water level from CryoSat-2 data and the agreement with in situ data. The data quality is compared to conventional low resolution mode (LRM altimetry products from Envisat, and the performance as a function of the lake area is tested. Based on a sample of 145 lakes with areas ranging from a few to several thousand km 2 , the CryoSat-2 results show an overall superior performance. For lakes with an area below 100 km 2 , the uncertainty of the lake levels is only half of that of the Envisat results. Generally, the CryoSat-2 lake levels also show a better agreement with the in situ data. The lower uncertainty of the CryoSat-2 results entails a more detailed description of water level variations.

  11. Disaster Metrics: A Comprehensive Framework for Disaster Evaluation Typologies.

    Science.gov (United States)

    Wong, Diana F; Spencer, Caroline; Boyd, Lee; Burkle, Frederick M; Archer, Frank

    2017-10-01

    Introduction The frequency of disasters is increasing around the world with more people being at risk. There is a moral imperative to improve the way in which disaster evaluations are undertaken and reported with the aim of reducing preventable mortality and morbidity in future events. Disasters are complex events and undertaking disaster evaluations is a specialized area of study at an international level. Hypothesis/Problem While some frameworks have been developed to support consistent disaster research and evaluation, they lack validation, consistent terminology, and standards for reporting across the different phases of a disaster. There is yet to be an agreed, comprehensive framework to structure disaster evaluation typologies. The aim of this paper is to outline an evolving comprehensive framework for disaster evaluation typologies. It is anticipated that this new framework will facilitate an agreement on identifying, structuring, and relating the various evaluations found in the disaster setting with a view to better understand the process, outcomes, and impacts of the effectiveness and efficiency of interventions. Research was undertaken in two phases: (1) a scoping literature review (peer-reviewed and "grey literature") was undertaken to identify current evaluation frameworks and typologies used in the disaster setting; and (2) a structure was developed that included the range of typologies identified in Phase One and suggests possible relationships in the disaster setting. No core, unifying framework to structure disaster evaluation and research was identified in the literature. The authors propose a "Comprehensive Framework for Disaster Evaluation Typologies" that identifies, structures, and suggests relationships for the various typologies detected. The proposed Comprehensive Framework for Disaster Evaluation Typologies outlines the different typologies of disaster evaluations that were identified in this study and brings them together into a single

  12. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  13. Disaster: would your community bounce back?

    Energy Technology Data Exchange (ETDEWEB)

    Sims, Benjamin H [Los Alamos National Laboratory

    2011-01-12

    What makes some communities or organizations able to quickly bounce back from a disaster, while others take a long time to recover? This question has become very important for emergency planners in federal, state, and local government - particularly since the 9/11 attacks and Hurricane Katrina, which nearly destroyed New Orleans five years ago. These events have made people aware that we can't always prevent disasters, but might be able to improve the ability of communities and regions to respond to and bounce back from major disruptions. Social scientists have found that most communities are, in fact, quite resilient to most disasters. People tend to work together, overcome divisions, identify problems, and develop improvised solutions. This often leads to a greater sense of community and a sense of personal accomplishment. Long-term recovery can be harder, but rebuilding can create jobs and stimulate economies. Communities may even end up better than they were before. But there are some disturbing exceptions to this trend, including Hurricane Katrina. The hurricane killed many people, the federal and local emergency response was not effective, people who could not evacuate were housed in the Superdome and Convention Center in terrible conditions, crime was prevalent, and local government did not appear to have control over the situation. A significant portion of the population was eventually evacuated to other cities. Even five years later, many people have not returned, and large parts of the city have not been rebuilt. Clearly, New Orleans lacked sufficient resilience to overcome a disaster of the magnitude of Katrina. There are four factors that social scientists are beginning to agree are important for community resilience: (1) A strong, diverse economy - Stable jobs, good incomes, diversity of industries, personal savings; (2) Robust social networks - Community members know each other, help each other, and have connections outside the community; (3

  14. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  15. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  16. A Dictionary of Disaster Management

    DEFF Research Database (Denmark)

    Rubin, Olivier; Dahlberg, Rasmus

    A Dictionary of Disaster Management offers over 200 terms covering different disasters from a social science perspective, brining together insights from many different disciplines including sociology, political science, history, anthropology, and natural science. It also features practical terms...

  17. Disaster Debris Recovery Database - Landfills

    Data.gov (United States)

    U.S. Environmental Protection Agency — The US EPA Disaster Debris Recovery Database (DDRD) promotes the proper recovery, recycling, and disposal of disaster debris for emergency responders at the federal,...

  18. Disaster Debris Recovery Database - Recovery

    Data.gov (United States)

    U.S. Environmental Protection Agency — The US EPA Disaster Debris Recovery Database (DDRD) promotes the proper recovery, recycling, and disposal of disaster debris for emergency responders at the federal,...

  19. FEMA Historical Disaster Declarations - shp

    Data.gov (United States)

    Department of Homeland Security — The Historical Disaster Declarations provides geospatial view to the Robert T. Stafford Disaster Relief and Emergency Assistance Act (referred to as the Stafford Act...

  20. Winged messengers of disaster

    International Nuclear Information System (INIS)

    Medvedev, Z.

    1977-01-01

    The work of the Soviet ecologists, led by A.I. Il'enko, on birds in the southern Urals area, site of the nuclear disaster in 1958, is discussed. The distribution of 90 Sr and 137 Cs in birds, food chains in a large running-water lake, bird migration patterns, and nest conservatism of ducks have been studied. It is pointed out that the existence of migratory species among contaminated species of the southern Urals provides an opportunity for observers in the West to test the truth about the 1958 nuclear disaster in the southern Urals. It is felt that the reports discussed here corroborate the author's original statement that the Urals nuclear disaster involved nuclear waste rather than a major reactor accident. (U.K.)

  1. Natural disasters and human mobility

    NARCIS (Netherlands)

    Mbaye, L.; Zimmermann, K.

    2016-01-01

    This paper reviews the effect of natural disasters on human mobility or migration. Although there is an increase of natural disasters and migration recently and more patterns to observe, the relationship remains complex. While some authors find that disasters increase migration, others show that

  2. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  3. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  4. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  5. Emerging trends in disaster management and the Ethiopian ...

    African Journals Online (AJOL)

    Emerging trends in disaster management and the Ethiopian experience: genesis, reform and transformation. ... Journal of Business and Administrative Studies ... Key words: disaster management, drought, pre-disaster action, post-disaster action, hazards, disaster, Ethiopian disaster management system, Ethiopia.

  6. Acute effects of a sarin-like organophosphorus agent, bis(isopropyl methyl)phosphonate, on cardiovascular parameters in anaesthetized, artificially ventilated rats

    Energy Technology Data Exchange (ETDEWEB)

    Watanabe, Yoshimasa [Department of Pharmacology, Graduate School of Medical Sciences, Nagoya City University, Nagoya (Japan); Itoh, Takeo, E-mail: titoh@med.nagoya-cu.ac.jp [Department of Pharmacology, Graduate School of Medical Sciences, Nagoya City University, Nagoya (Japan); Shiraishi, Hiroaki [Department of Forensic Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan); Maeno, Yoshitaka [Department of Forensic Medical Science, Graduate School of Medical Sciences, Nagoya City University, Nagoya (Japan); Arima, Yosuke; Torikoshi, Aiko; Namera, Akira [Department of Forensic Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan); Makita, Ryosuke [Department of Nursing, Faculty of Health Sciences, Hiroshima Cosmopolitan University, Hiroshima (Japan); Yoshizumi, Masao [Department of Cardiovascular Physiology and Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan); Nagao, Masataka [Department of Forensic Medicine, Institute of Biomedical and Health Sciences, Hiroshima University, Hiroshima (Japan)

    2013-10-01

    The organophosphorus compound sarin irreversibly inhibits acetylcholinesterase. We examined the acute cardiovascular effects of a sarin-like organophosphorus agent, bis(isopropyl methyl)phosphonate (BIMP), in anaesthetized, artificially ventilated rats. Intravenous administration of BIMP (0.8 mg/kg; the LD50 value) induced a long-lasting increase in blood pressure and tended to increase heart rate. In rats pretreated with the non-selective muscarinic-receptor antagonist atropine, BIMP significantly increased both heart rate and blood pressure. In atropine-treated rats, hexamethonium (antagonist of ganglionic nicotinic receptors) greatly attenuated the BIMP-induced increase in blood pressure without changing the BIMP-induced increase in heart rate. In rats treated with atropine plus hexamethonium, intravenous phentolamine (non-selective α-adrenergic receptor antagonist) plus propranolol (non-selective β-adrenergic receptor antagonist) completely blocked the BIMP-induced increases in blood pressure and heart rate. In atropine-treated rats, the reversible acetylcholinesterase inhibitor neostigmine (1 mg/kg) induced a transient increase in blood pressure, but had no effect on heart rate. These results suggest that in anaesthetized rats, BIMP induces powerful stimulation of sympathetic as well as parasympathetic nerves and thereby modulates heart rate and blood pressure. They may also indicate that an action independent of acetylcholinesterase inhibition contributes to the acute cardiovascular responses induced by BIMP. - Highlights: • A sarin-like agent BIMP markedly increased blood pressure in anaesthetized rats. • Muscarinic receptor blockade enhanced the BIMP-induced increase in blood pressure. • Ganglionic nicotinic receptor blockade attenuated the BIMP-induced response. • Blockade of α- as well as β-receptors attenuated the BIMP-induced response.

  7. Structure of HI-6*sarin-acetylcholinesterase determined by X-ray crystallography and molecular dynamics simulation: reactivator mechanism and design.

    Directory of Open Access Journals (Sweden)

    Fredrik Ekström

    2009-06-01

    Full Text Available Organophosphonates such as isopropyl metylphosphonofluoridate (sarin are extremely toxic as they phosphonylate the catalytic serine residue of acetylcholinesterase (AChE, an enzyme essential to humans and other species. Design of effective AChE reactivators as antidotes to various organophosphonates requires information on how the reactivators interact with the phosphonylated AChEs. However, such information has not been available hitherto because of three main challenges. First, reactivators are generally flexible in order to change from the ground state to the transition state for reactivation; this flexibility discourages determination of crystal structures of AChE in complex with effective reactivators that are intrinsically disordered. Second, reactivation occurs upon binding of a reactivator to the phosphonylated AChE. Third, the phosphorous conjugate can develop resistance to reactivation. We have identified crystallographic conditions that led to the determination of a crystal structure of the sarin(nonaged-conjugated mouse AChE in complex with [(E-[1-[(4-carbamoylpyridin-1-ium-1-ylmethoxymethyl]pyridin-2-ylidene]methyl]-oxoazanium dichloride (HI-6 at a resolution of 2.2 A. In this structure, the carboxyamino-pyridinium ring of HI-6 is sandwiched by Tyr124 and Trp286, however, the oxime-pyridinium ring is disordered. By combining crystallography with microsecond molecular dynamics simulation, we determined the oxime-pyridinium ring structure, which shows that the oxime group of HI-6 can form a hydrogen-bond network to the sarin isopropyl ether oxygen, and a water molecule is able to form a hydrogen bond to the catalytic histidine residue and subsequently deprotonates the oxime for reactivation. These results offer insights into the reactivation mechanism of HI-6 and design of better reactivators.

  8. Acute effects of a sarin-like organophosphorus agent, bis(isopropyl methyl)phosphonate, on cardiovascular parameters in anaesthetized, artificially ventilated rats

    International Nuclear Information System (INIS)

    Watanabe, Yoshimasa; Itoh, Takeo; Shiraishi, Hiroaki; Maeno, Yoshitaka; Arima, Yosuke; Torikoshi, Aiko; Namera, Akira; Makita, Ryosuke; Yoshizumi, Masao; Nagao, Masataka

    2013-01-01

    The organophosphorus compound sarin irreversibly inhibits acetylcholinesterase. We examined the acute cardiovascular effects of a sarin-like organophosphorus agent, bis(isopropyl methyl)phosphonate (BIMP), in anaesthetized, artificially ventilated rats. Intravenous administration of BIMP (0.8 mg/kg; the LD50 value) induced a long-lasting increase in blood pressure and tended to increase heart rate. In rats pretreated with the non-selective muscarinic-receptor antagonist atropine, BIMP significantly increased both heart rate and blood pressure. In atropine-treated rats, hexamethonium (antagonist of ganglionic nicotinic receptors) greatly attenuated the BIMP-induced increase in blood pressure without changing the BIMP-induced increase in heart rate. In rats treated with atropine plus hexamethonium, intravenous phentolamine (non-selective α-adrenergic receptor antagonist) plus propranolol (non-selective β-adrenergic receptor antagonist) completely blocked the BIMP-induced increases in blood pressure and heart rate. In atropine-treated rats, the reversible acetylcholinesterase inhibitor neostigmine (1 mg/kg) induced a transient increase in blood pressure, but had no effect on heart rate. These results suggest that in anaesthetized rats, BIMP induces powerful stimulation of sympathetic as well as parasympathetic nerves and thereby modulates heart rate and blood pressure. They may also indicate that an action independent of acetylcholinesterase inhibition contributes to the acute cardiovascular responses induced by BIMP. - Highlights: • A sarin-like agent BIMP markedly increased blood pressure in anaesthetized rats. • Muscarinic receptor blockade enhanced the BIMP-induced increase in blood pressure. • Ganglionic nicotinic receptor blockade attenuated the BIMP-induced response. • Blockade of α- as well as β-receptors attenuated the BIMP-induced response

  9. Translocal disaster interventions:

    DEFF Research Database (Denmark)

    Dalgas, Karina Märcher

    2018-01-01

    The disaster-prone Philippine archipelago is a major sender of migrants worldwide.Based on ethnographic fieldwork in the Philippines and Denmark, this article investi-gates how individual migrants channelled relief to their neighbourhoods of originafter the Bohol earthquake of 2013. I argue that ...

  10. Food for Disasters

    Centers for Disease Control (CDC) Podcasts

    2012-07-23

    When disaster strikes, you might not have access to food or water. This podcast discusses types of emergency food supplies you should keep on hand in your emergency kit.  Created: 7/23/2012 by Office of Public Health Preparedness and Response (PHPR).   Date Released: 7/23/2012.

  11. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  12. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  13. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  14. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  15. Planning cultural heritage protection is easier than managing an actual disaster

    Directory of Open Access Journals (Sweden)

    Zdena Rosická

    2011-01-01

    Full Text Available Efficient preparedness is easier to carry out comparing to dealing with consequences of disasters, anthropogenic incidents and other emergencies. Most disasters are water related, i.e. the result of flooding due to high water, water used to extinguish the fire, etc. Cultural heritage as a whole is exposed to attack from natural weathering processes, pollutants as well as water-origin disasters, fires, arson, theft, landslides or extreme weather events. In case of a disaster or any other emergency, unfortunately, no one can afford to wait for all the data and information to be entirely completed in order to make conclusions and survive a disastrous attack. When a disaster occurs and a historical object is affected, decisions must me made fast about rescue priorities, which items to save and which to sacrifice; there must be available priority lists, working guides for salvage teams as well as a disaster plan, updated lists of human resources, suppliers and service providers, lists of types and number of vehicles including passable roads available in case the movable cultural heritage evacuation becomes urgent. Emergency-response officials must be trained in measures to ensure relevant handling, conservation and care.

  16. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  17. The Psychology of Ongoing Threat: Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2007-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic "bull's eye" disaster models, which assume the…

  18. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  19. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  20. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  1. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  2. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  3. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  4. Academic Responses to Fukushima Disaster.

    Science.gov (United States)

    Yasui, Kiyotaka; Kimura, Yuko; Kamiya, Kenji; Miyatani, Rie; Tsuyama, Naohiro; Sakai, Akira; Yoshida, Koji; Yamashita, Shunichi; Chhem, Rethy; Abdel-Wahab, May; Ohtsuru, Akira

    2017-03-01

    Since radiation accidents, particularly nuclear disasters, are rarer than other types of disasters, a comprehensive radiation disaster medical curriculum for them is currently unavailable. The Fukushima compound disaster has urged the establishment of a new medical curriculum in preparation for any future complex disaster. The medical education will aim to aid decision making on various health risks for workers, vulnerable people, and residents addressing each phase in the disaster. Herein, we introduce 3 novel educational programs that have been initiated to provide students, professionals, and leaders with the knowledge of and skills to elude the social consequences of complex nuclear disasters. The first program concentrates on radiation disaster medicine for medical students at the Fukushima Medical University, together with a science, technology, and society module comprising various topics, such as public risk communication, psychosocial consequences of radiation anxiety, and decision making for radiation disaster. The second program is a Phoenix Leader PhD degree at the Hiroshima University, which aims to develop future leaders who can address the associated scientific, environmental, and social issues. The third program is a Joint Graduate School of Master's degree in the Division of Disaster and Radiation Medical Sciences at the Nagasaki University and Fukushima Medical University.

  5. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  6. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  7. Selective chromo-fluorogenic detection of DFP (a Sarin and Soman mimic) and DCNP (a Tabun mimic) with a unique probe based on a boron dipyrromethene (BODIPY) dye.

    Science.gov (United States)

    Barba-Bon, Andrea; Costero, Ana M; Gil, Salvador; Martínez-Máñez, Ramón; Sancenón, Félix

    2014-11-21

    A novel colorimetric probe (P4) for the selective differential detection of DFP (a Sarin and Soman mimic) and DCNP (a Tabun mimic) was prepared. Probe P4 contains three reactive sites; i.e. (i) a nucleophilic phenol group able to undergo phosphorylation with nerve gases, (ii) a carbonyl group as a reactive site for cyanide; and (iii) a triisopropylsilyl (TIPS) protecting group that is known to react with fluoride. The reaction of P4 with DCNP in acetonitrile resulted in both the phosphorylation of the phenoxy group and the release of cyanide, which was able to react with the carbonyl group of P4 to produce a colour modulation from pink to orange. In contrast, phosphorylation of P4 with DFP in acetonitrile released fluoride that hydrolysed the TIPS group in P4 to yield a colour change from pink to blue. Probe P4 was able to discriminate between DFP and DCNP with remarkable sensitivity; limits of detection of 0.36 and 0.40 ppm for DCNP and DFP, respectively, were calculated. Besides, no interference from other organophosphorous derivatives or with presence of acid was observed. The sensing behaviour of P4 was also retained when incorporated into silica gel plates or onto polyethylene oxide membranes, which allowed the development of simple test strips for the colorimetric detection of DCNP and DFP in the vapour phase. P4 is the first probe capable of colorimetrically differentiating between a Tabun mimic (DCNP) and a Sarin and Soman mimic (DFP).

  8. Learning from mega disasters

    DEFF Research Database (Denmark)

    Greve, Anni

    In Tokyo building on ruins has been its sine qua non ever since the city turned into an enormous urban formation in the seventeenth century: ‘The trauma of urban collapse has been so severe for us in Japan, the inevitability of destruction and rebirth’ (Arate Isozaki 2006 ). But March 2011...... the earthquake was 45 times as great as the 1923 Great Kanto Earthquake in the Tokyo area, which killed approximately 140.000 people. Even though Japan is considered one of the best-prepared countries in the world for handling major disasters the reality of a large nuclear disaster proved to be far worse than...... what was planned for. This paper presentation discusses “The Great East Japan Earthquake” of 2011 with particular focus on what happens to social relations and cultural norms, when uncertainty and crisis is something people are living through and living in....

  9. Disaster prevention surveillance system

    International Nuclear Information System (INIS)

    Nara, Satoru; Kamiya, Eisei

    2001-01-01

    Fuji Electric Co., Ltd. has supplied many management systems to nuclear reactor institution. 'The nuclear countermeasures-against-calamities special-measures' was enforced. A nuclear entrepreneur has devised the measure about expansion prevention and restoration of a calamity while it endeavors after prevention of generating of a nuclear calamity. Our company have supplied the 'disaster prevention surveillance system' to the Japan Atomic Energy Research Institute Tokai Research Establishment aiming at strengthening of the monitoring function at the time (after the accident) of the accident used as one of the above-mentioned measures. A 'disaster prevention surveillance system' can share the information on the accident spot in an on-site command place, an activity headquarters, and support organizations, when the serious accident happens. This system is composed of various sensors (temperature, pressure and radiation), cameras, computers and network. (author)

  10. Lessons from nuclear disasters

    International Nuclear Information System (INIS)

    Shigematsu, Itsuzo

    2005-01-01

    The most severe and worst of all nuclear disasters is, needless to say, the explosion of an atomic bomb. The WHO committee on the effects of nuclear war, established in 1982, concluded that the only approach to the treatment of the health effects of nuclear warfare is primary prevention, that is, the prevention of nuclear war. Nuclear disasters have also occurred in nuclear power plants and nuclear facilities, causing various damage and acute anxiety among the workers and general public, but thus far the related health effects have not always been correctly evaluated. Such problems as exposed population, individual exposed dose and health risks which are associated with these evaluation efforts are discussed here. (author)

  11. Legislation for nuclear disaster

    International Nuclear Information System (INIS)

    Nagata, Shozo

    2012-01-01

    Fukushima nuclear disaster accident clarified problems on nuclear-related legislation and its application. Legislation for nuclear disaster (LNA) could not respond to severe accident because assumed size of accident was not enough. After emergency event corresponding to the article 15 of LNA, was reported by the operator, more than two hours passed by the issuance of Emergency State Declaration. Off-site center could not work at all. This article reviewed outline of LNA and introduced discussion on the reform of legislation and its application. Reform discussion should be focused on swift and effective response readiness to emergency: 1) operator's substantial nuclear emergency drilling, (2) reinforcement of government's headquarters for emergency response, (3) after nuclear emergency, government's headquarters remained to enhance resident's safety from radiation hazard and (4) enactment of nuclear emergency preparedness guidelines for local communities. (T. Tanaka)

  12. An efficient algorithm for the detection of exposed and hidden wormhole attack

    International Nuclear Information System (INIS)

    Khan, Z.A.; Rehman, S.U.; Islam, M.H.

    2016-01-01

    MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead. (author)

  13. Natural Disasters and Nontuberculous Mycobacteria

    Science.gov (United States)

    Bernhard, Jon N.; Chan, Edward D.

    2015-01-01

    Infectious diseases acquired by survivors of large-scale natural disasters complicate the recovery process. During events such as tsunamis, hurricanes, earthquakes, and tornados and well into the recovery period, victims often are exposed to water-soil mixtures that have relocated with indigenous microbes. Because nontuberculous mycobacteria (NTM) are ubiquitous in water and soil, there is potential for increased exposure to these organisms during natural disasters. In this hypothesis-driven commentary, we discuss the rise in NTM lung disease and natural disasters and examine the geographic overlap of NTM infections and disaster frequencies in the United States. Moreover, we show an increased number of positive NTM cultures from Louisiana residents in the years following three of the relatively recent epic hurricanes and posit that such natural disasters may help to drive the increased number of NTM infections. Finally, we advocate for increased environmental studies and surveillance of NTM infections before and after natural disasters. PMID:25644904

  14. Radiation accident/disaster

    International Nuclear Information System (INIS)

    Kida, Yoshiko; Hirohashi, Nobuyuki; Tanigawa, Koichi

    2013-01-01

    Described are the course of medical measures following Fukushima Daiichi Nuclear Power Plant (FNPP) Accident after the quake and tsunami (Mar. 11, 2011) and the future task for radiation accident/disaster. By the first hydrogen explosion in FNPP (Mar. 12), evacuation of residents within 20 km zone was instructed, and the primary base for measures of nuclear disaster (Off-site Center) 5 km afar from FNPP had to work as a front base because of damage of communicating ways, of saving of injured persons and of elevation of dose. On Mar. 13, the medical arrangement council consisting from stuff of Fukushima Medical University (FMU), National Institute of Radiological Sciences, Nuclear Safety Research Association and Prefectural officers was setup in residents' hall of Fukushima City, and worked for correspondence to persons injured or exposed, where communication about radiation and between related organizations was still poor. The Off-site Center's head section moved to Prefectural Office on Mar. 15 as headquarters. Early in the period, all residents evacuated from the 20 km zone, and in-hospital patients and nursed elderly were transported with vehicles, >50 persons of whom reportedly died mainly by their base diseases. The nation system of medicare for emergent exposure had consisted from the network of the primary to third facilities; there were 5 facilities in the Prefecture, 3 of which were localized at 4-9 km distance from FNPP and closed early after the Accident; and the secondary facility of FMU became responsible to all exposed persons. There was no death of workers of FNPP. Medical stuff also measured the ambient dose at various places near FNPP, having had risk of exposure. At the Accident, the important system of command, control and communication was found fragile and measures hereafter should be planned on assumption of the worst scenario of complete damage of the infrastructure and communication. It is desirable for Disaster Medical Assistance Team which

  15. Effects of low-level sarin and cyclosarin exposure on white matter integrity in Gulf War Veterans.

    Science.gov (United States)

    Chao, Linda L; Zhang, Yu; Buckley, Shannon

    2015-05-01

    We previously found evidence of reduced gray and white matter volume in Gulf War (GW) veterans with predicted low-level exposure to sarin (GB) and cyclosarin (GF). Because loss of white matter tissue integrity has been linked to both gray and white matter atrophy, the current study sought to test the hypothesis that GW veterans with predicted GB/GF exposure have evidence of disrupted white matter microstructural integrity. Measures of fractional anisotropy and directional (i.e., axial and radial) diffusivity were assessed from the 4T diffusion tensor images (DTI) of 59 GW veterans with predicted GB/GF exposure and 59 "matched" unexposed GW veterans (mean age: 48 ± 7 years). The DTI data were analyzed using regions of interest (ROI) analyses that accounted for age, sex, total brain gray and white matter volume, trauma exposure, posttraumatic stress disorder, current major depression, and chronic multisymptom illness status. There were no significant group differences in fractional anisotropy or radial diffusivity. However, there was increased axial diffusivity in GW veterans with predicted GB/GF exposure compared to matched, unexposed veterans throughout the brain, including the temporal stem, corona radiata, superior and inferior (hippocampal) cingulum, inferior and superior fronto-occipital fasciculus, internal and external capsule, and superficial cortical white matter blades. Post hoc analysis revealed significant correlations between higher fractional anisotropy and lower radial diffusivity with better neurobehavioral performance in unexposed GW veterans. In contrast, only increased axial diffusivity in posterior limb of the internal capsule was associated with better psychomotor function in GW veterans with predicted GB/GF exposure. The finding that increased axial diffusivity in a region of the brain that contains descending corticospinal fibers was associated with better psychomotor function and the lack of significant neurobehavioral deficits in veterans

  16. Global rhetorics of disaster: media constructions of Bataclan and the 'Colectiv Revolution' in the wake of 9/11

    OpenAIRE

    Draga Alexandru, Maria-Sabina

    2017-01-01

    This article examines the recent global emergence of a rhetoric of disaster that connects violent events such as terrorist attacks and destructive accidents under an assumption of similarity based on their equally resulting in tragedy and mourning. I will compare discursive constructions of the terrorist attacks on 9/11, often considered the archetypal terrorist act of the new millennium, the Club Colectiv fire in Bucharest (October 30, 2015), followed by the “Colectiv Revolution” that led to...

  17. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  18. FEMA Disaster Declaration Summary -shp

    Data.gov (United States)

    Department of Homeland Security — This dataset lists all official FEMA Disaster Declarations. This is raw, unedited data from FEMA's National Emergency Management Information System (NEMIS) and as...

  19. FEMA Disaster Declaration Summary - API

    Data.gov (United States)

    Department of Homeland Security — This dataset lists all official FEMA Disaster Declarations. This is raw, unedited data from FEMA's National Emergency Management Information System (NEMIS) and as...

  20. Natural Disasters (Environmental Health Student Portal)

    Science.gov (United States)

    ... be prepared. Games and Activities Stop Disasters (International Strategy for Disaster Reduction) - Online game to learn how to stop various disasters ... | Accessibility Videos and Players Contact Us: tehip@teh.nlm.nih. ...

  1. 76 FR 58328 - Pennsylvania Disaster #PA-00042

    Science.gov (United States)

    2011-09-20

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12820 and 12821] Pennsylvania Disaster PA... Presidential declaration of a major disaster for the Commonwealth of Pennsylvania (FEMA-4025-DR), dated 09/ 12..., Philadelphia, Sullivan, Wyoming. Contiguous Counties (Economic Injury Loans Only): Pennsylvania: Berks...

  2. 78 FR 45282 - Pennsylvania Disaster #PA-00058

    Science.gov (United States)

    2013-07-26

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13669 and 13670] Pennsylvania Disaster PA... Administrative declaration of a disaster for the Commonwealth of Pennsylvania dated 07/16/2013. Incident: Severe...: Pennsylvania: Armstrong; Blair; Cambria; Cameron; Centre; Clarion; Clinton; Elk; Forest; Greene; Indiana...

  3. 76 FR 58327 - Pennsylvania Disaster #PA-00044

    Science.gov (United States)

    2011-09-20

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12822 and 12823] Pennsylvania Disaster PA... Presidential declaration of a major disaster for the Commonwealth of Pennsylvania (FEMA-4030-DR), dated 09/ 12.... Contiguous Counties (Economic Injury Loans Only): Pennsylvania: Berks, Carbon, Centre, Chester, Clinton...

  4. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  5. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  6. Living with disasters: social capital for disaster governance.

    Science.gov (United States)

    Melo Zurita, Maria de Lourdes; Cook, Brian; Thomsen, Dana C; Munro, Paul G; Smith, Timothy F; Gallina, John

    2017-10-24

    This paper explores how social networks and bonds within and across organisations shape disaster operations and strategies. Local government disaster training exercises serve as a window through which to view these relations, and 'social capital' is used as an analytic for making sense of the human relations at the core of disaster management operations. These elements help to expose and substantiate the often intangible relations that compose the culture that exists, and that is shaped by preparations for disasters. The study reveals how this social capital has been generated through personal interactions, which are shared among disaster managers across different organisations and across 'levels' within those organisations. Recognition of these 'group resources' has significant implications for disaster management in which conducive social relations have become paramount. The paper concludes that socio-cultural relations, as well as a people-centred approach to preparations, appear to be effective means of readying for, and ultimately responding to, disasters. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  7. Disasters And Minimum Health Standards In Disaster Response

    Directory of Open Access Journals (Sweden)

    Sibel GOGEN

    Full Text Available Millions of people are affected by natural or man made disasters all over the world. The number of people affected by disasters increase globally, due to global climate changes, increasing poverty, low life standards, inappropriate infrastructure, lack of early response systems, abuse of natural sources, and beside these, nuclear weapons, wars and conflicts, terrorist actions, migration, displacement and population movements. 95 % of life loss due to disasters are in the underdeveloped or developing countries. Turkey is a developing country, highly affected by disasters. For coping with disasters, not only national action plans, but also International Action Plans and cooperations are needed. Since all the disasters have direct and indirect effects on health, applications of minimal health standarts in disaster response, will reduce the morbidity and mortality rates. In this paper, water supplies and sanitation, vector control, waste control, burial of corpses, nutrition and minimum health standards in disaster response, are reviewed. [TAF Prev Med Bull 2004; 3(12.000: 296-306

  8. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  9. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  10. 78 FR 45548 - South Dakota; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-07-29

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance...; 97.048, Disaster Housing Assistance to [[Page 45549

  11. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  12. Nuclear power plant disasters

    International Nuclear Information System (INIS)

    Trott, K.R.

    1979-01-01

    The possibility of a nuclear power plant disaster is small but not excluded: in its event, assistance to the affected population mainly depends on local practitioners. Already existing diseases have to be diagnosed and treated; moreover, these physicians are responsible for the early detection of those individuals exposed to radiation doses high enough to induce acute illness. Here we present the pathogenesis, clinical development and possible diagnostic and therapeutical problems related to acute radiation-induced diseases. The differentiation of persons according to therapy need and prognosis is done on the sole base of the clinical evidence and the peripheral blood count. (orig.) [de

  13. Disasters as Usual

    DEFF Research Database (Denmark)

    Albris, Kristoffer

    In this thesis, I explore how citizens and public institutions have adjusted to recent recurring floods in Dresden. As a riverine city, Dresden regularly experienced damaging floods throughout its history, right up until the start of the Second World War. Then something strange happened. Although...... the future as being fraught with uncertainty. This has implications both for how people understand themselves as members of society as well as for the relationship between the state and civil society. In other words, floods in Dresden have a social, political and public life. Rather than seeing disasters...

  14. Dynamic Routing during Disaster Events

    NARCIS (Netherlands)

    Fitrianie, S.; Rothkrantz, L.J.M.

    2015-01-01

    Innovations in mobile technology allow people to request route information on their smartphone to reach safe areas during emergency and disaster evacuations. In return, the affected people in the field can send their observation reports, e.g. using a dedicated icon-based disaster language. However,

  15. Disaster Management: Mental Health Perspective.

    Science.gov (United States)

    Math, Suresh Bada; Nirmala, Maria Christine; Moirangthem, Sydney; Kumar, Naveen C

    2015-01-01

    Disaster mental health is based on the principles of 'preventive medicine' This principle has necessitated a paradigm shift from relief centered post-disaster management to a holistic, multi-dimensional integrated community approach of health promotion, disaster prevention, preparedness and mitigation. This has ignited the paradigm shift from curative to preventive aspects of disaster management. This can be understood on the basis of six 'R's such as Readiness (Preparedness), Response (Immediate action), Relief (Sustained rescue work), Rehabilitation (Long term remedial measures using community resources), Recovery (Returning to normalcy) and Resilience (Fostering). Prevalence of mental health problems in disaster affected population is found to be higher by two to three times than that of the general population. Along with the diagnosable mental disorders, affected community also harbours large number of sub-syndromal symptoms. Majority of the acute phase reactions and disorders are self-limiting, whereas long-term phase disorders require assistance from mental health professionals. Role of psychotropic medication is very limited in preventing mental health morbidity. The role of cognitive behaviour therapy (CBT) in mitigating the mental health morbidity appears to be promising. Role of Psychological First Aid (PFA) and debriefing is not well-established. Disaster management is a continuous and integrated cyclical process of planning, organising, coordinating and implementing measures to prevent and to manage disaster effectively. Thus, now it is time to integrate public health principles into disaster mental health.

  16. Economic development and natural disasters

    NARCIS (Netherlands)

    Klomp, Jeroen

    2016-01-01

    In this study we examine the impact of large-scale natural disasters on economic development. A major obstacle in exploring this relationship is the poor data quality on GDP per capita in low-income countries, while at the same time more than 90% of all disasters that happen worldwide occur in

  17. Disaster: Prevention, Preparedness and Action.

    Science.gov (United States)

    Buchanan, Sally

    1981-01-01

    Discission of threat of disaster to library archival materials focuses on prevention (building maintenance, materials storage, fire prevention), preparedness (preplanning, procedures for handling emergencies, finances of recovery operation), and action (instructions for handling damaged materials). Current library activities in disaster planning…

  18. Disaster and Sociolegal Studies

    Directory of Open Access Journals (Sweden)

    Susan Sterett

    2013-04-01

    Full Text Available Disasters are treated as independent events external to law. However, social processes define the beginning, end and extent of those events for mitigation, adaptation and response and recovery; those processes include the mobilization of law by people and organizations. Within the sociology of disaster, it is tempting to treat law as a problem-solving tool. Sociolegal analysis approaches law more skeptically: legal actors face problems and defer to the decisions others have made, or discount future problems as much as other institutions do and thereby contribute to problems, or offer compensation that does not ameliorate the inequality within and among countries that disaster can exacerbate. Law can signal that it is doing something about problems via national or supranational rights; for it actually to help requires legal actors to mobilize. Finally, the site of law has been displaced: from law being within public authority enacted through institutions to law as a matter of individual, self-governance set in expectation of disaster, and humanitarian assistance done through non-governmental organizations. This collection contributes analyses of individuals and organizations' action in disaster through legal processes. Los desastres se tratan como hechos independientes externos al derecho. Sin embargo, los procesos sociales definen el principio, el final y el alcance de esos acontecimientos en lo que respecta a su mitigación, adaptación, respuesta y recuperación; esos procesos incluyen la movilización del derecho por personas y organizaciones. En el ámbito de la sociología de los desastres, es tentador tratar el derecho como una herramienta para la resolución de problemas. Sin embargo, los análisis sociojurídicos se aproximan al derecho de forma más escéptica: los actores legales se enfrentan a problemas y se adhieren a decisiones que otros han tomado, o descartan problemas futuros de la misma forma que otras instituciones, aumentando

  19. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  20. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  1. A Constraint-Based Model for Fast Post-Disaster Emergency Vehicle Routing

    Directory of Open Access Journals (Sweden)

    Roberto Amadini

    2013-12-01

    Full Text Available Disasters like terrorist attacks, earthquakes, hurricanes, and volcano eruptions are usually unpredictable events that affect a high number of people. We propose an approach that could be used as a decision support tool for a post-disaster response that allows the assignment of victims to hospitals and organizes their transportation via emergency vehicles. By exploiting the synergy between Mixed Integer Programming and Constraint Programming techniques, we are able to compute the routing of the vehicles so as to rescue much more victims than both heuristic based and complete approaches in a very reasonable time.

  2. Sarin, Dr Apurva

    Indian Academy of Sciences (India)

    JNU). Date of birth: 1 March 1962. Specialization: Immunology, Cell Biology, Apoptosis Address: Institute of for Stem Cell Biology and Regenerative Medicine, GKVK Campus, Bengaluru 560 065, Karnataka Contact: Office: (080) 2366 6080

  3. Ecological disaster in Kuwait

    International Nuclear Information System (INIS)

    Wray, T.K.

    1991-01-01

    Six million barrels of oil are going up in smoke each day in Kuwait, dumping 3.7 million pounds of toxic gases, soot, and smoke - including cancer-causing compounds - into the air each hour. This paper reports that the prognosis for the situation is dim. Even as specialized firefighting companies from the United States and Canada began arriving in Kuwait in March, oil officials there predicted dousing the fires would take at least two years and pumping up oil production to pre-war levels would take between five and 10 years. An oil well fire is a disaster. The effect on the ozone, the ecology, the marine life is massive. We aren't even breathing air here, we're just breathing smog

  4. Societal risk and major disasters

    International Nuclear Information System (INIS)

    Clement, C.F.

    1989-01-01

    A disaster can be defined as an event, or a series of events, in which a large number of people is adversely affected by a single cause. This definition includes man-made accidents, like that at Chernobyl, as well as the natural disasters that insurance companies are sometimes pleased to describe as Acts of God. In 1986 alone, 12,000 people died and 2.2 million were made homeless by 215 major accidents or disasters. The nature of risk is examined in this paper. (author)

  5. Disaster related heat illness

    International Nuclear Information System (INIS)

    Miyake, Yasufumi

    2012-01-01

    Explained and discussed are the outline of heat illness (HI), its raised risk and measures taken at the disaster of the Fukushima Nuclear Power Plant Accident (FNPPA; Mar. 2011). High temperature and humid environment induce HI through the fervescence and dehydration resulting in the intestinal ischemia/hypoxia and organ failure. Epidemiologic data of the heatstroke in Japan suggest its seemingly parallel incidence to seasonal hotness of the summer. HI is classified in either classical (non-exertional) or exertional heatstroke, both with severity of I (slight), II (slight symptom of the central nervous system (CNS); necessary for consultation) and III (most serious; having dysfunction of CNS, organ or coagulation). Therapy depends on the severity: I for the first aid on site, II necessary for carrying to hospital and III for hospitalization. Protection is possible by personal, neighbors' and managers' carefulness, and supply of sufficient water and minerals. Risk of HI was suddenly raised at taking measures to meet with the FNPPA. Japanese Association for Acute Medicine (JAAM) promptly organized JAAM-FNPPA Working Group to treat the emergent multiple incidents including the radiation exposure and HI as well. Exertional HI was mainly in labors wearing rather sealed closes to protect radiation to work for steps of the Accident, and which was similar to evacuees temporarily entering the evacuation area for visit to their own vacant houses. In the summer, classical HI was also a problem mainly in elderly living in the evacuation dwellings. Document of HI incidents and patients at FNPPA should be recorded for the reference to possible disaster in future. (T.T.)

  6. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  7. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  8. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  9. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  10. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  11. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  12. Integrated simulation of emergency response in disasters

    International Nuclear Information System (INIS)

    Kanno, Taro; Furuta, Kazuo

    2005-01-01

    An integrated simulation system of emergency response in disasters is under development that can consider various factors of disasters, such as disaster phenomena, activities of response organizations, resident behavior, and their environment. The aim of this system is to provide support for design and assessment of disaster management systems. This paper introduces the conceptual design of the entire system and presents simulators of organizational behavior in nuclear and earthquake disasters. (author)

  13. Disaster Concept at Different Educational Grades

    OpenAIRE

    Dikmenli, Yurdal; Gafa, İbrahim

    2017-01-01

    Disasters cover allthe events that damage both humans and their living environment. The disasters whichstem from nature are called natural disasters while those which stem from humankind,are called human disasters. Since humans constantly encounter such events at differenttimes, places and in different forms, it is inevitable that they will be affectedby them. Thus, one wonders what people understand the concept of disaster tobe. The aim of this study is to identify the students from all the ...

  14. The environmental and medical geochemistry of potentially hazardous materials produced by disasters

    Science.gov (United States)

    Plumlee, Geoffrey S.; Morman, Suzette A.; Meeker, G.P.; Hoefen, Todd M.; Hageman, Philip L.; Wolf, Ruth E.

    2014-01-01

    Many natural or human-caused disasters release potentially hazardous materials (HM) that may pose threats to the environment and health of exposed humans, wildlife, and livestock. This chapter summarizes the environmentally and toxicologically significant physical, mineralogical, and geochemical characteristics of materials produced by a wide variety of recent disasters, such as volcanic eruptions, hurricanes and extreme storms, spills of mining/mineral-processing wastes or coal extraction by-products, and the 2001 attacks on and collapse of the World Trade Center towers. In describing these characteristics, this chapter also illustrates the important roles that geochemists and other earth scientists can play in environmental disaster response and preparedness. In addition to characterizing in detail the physical, chemical, and microbial makeup of HM generated by the disasters, these roles also include (1) identifying and discriminating potential multiple sources of the materials; (2) monitoring, mapping, and modeling dispersal and evolution of the materials in the environment; (3) understanding how the materials are modified by environmental processes; (4) identifying key characteristics and processes that influence the materials' toxicity to exposed humans and ecosystems; (5) estimating shifts away from predisaster environmental baseline conditions; and (6) using geochemical insights learned from past disasters to help estimate, prepare for, and increase societal resilience to the environmental and related health impacts of future disasters.

  15. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  16. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  17. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  18. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  19. Effects of foreign disasters on the petroleum industry in Japan: A financial market perspective

    International Nuclear Information System (INIS)

    Hanabusa, Kunihiro

    2010-01-01

    In this paper, we examine how certain foreign disasters - the September 11 terrorist attacks, Iraq War, and Hurricane Katrina - affected the stock prices of the Japanese petroleum industry. Using the market model with and without heteroskedasticity, we analyze and estimate the extent to which these disasters impacted the stock prices from two perspectives: (1) the influence of these disastrous incidents on the entire petroleum industry and (2) the effect on individual firms. The empirical results reveal that an increase in the stock prices of individual firms caused an increase in the stock prices of the entire Japanese petroleum industry after the September 11 terrorist attacks. However, the Iraq War and Hurricane Katrina had both negative and positive influences on the expected profits of individual firms and did not have a significant effect on the stock prices of the Japanese petroleum industry. (author)

  20. FEMA Current Disaster Declarations -shp

    Data.gov (United States)

    Department of Homeland Security — This dataset lists the current Disaster Declarations in Shapefile. This data was compiled and distributed by FEMA Mapping and Analysis Center (MAC). Metadata file...

  1. Nuclear disaster in the Urals

    International Nuclear Information System (INIS)

    Medvedev, Z.A.

    1979-01-01

    The subject is discussed in chapters, entitled: a big sensation begins; the sensation continues; the Urals disaster; radioactive contamination of lakes, water plants, and fish; mammals in the radioactive contaminated zone of the Urals; identification of the contaminated zone as the Chelyabinsk region and the time of the disaster as Fall-Winter 1957; birds in the radioactive biocenosis and the spread of radioactivity to other countries; soil animals in the Urals contaminated zone; trees in the Urals contaminated zone; field plants in the Urals radioactive zone and research in plant radiogenetics; population genetics research in the radioactive environment; the CIA documents on the Urals nuclear disaster; the causes of the Urals disaster - an attempted reconstruction of the 1957-1958 events. (U.K.)

  2. The Three Mile Island Disaster.

    Science.gov (United States)

    Crosby, Emeral

    1980-01-01

    For the past decade, education has been experiencing meltdown, explosions, radiation leaks, heat pollution, and management crises, just like the Three Mile Island disaster. This article offers suggestions on how to deal with these problems. (Author/LD)

  3. Chernobylsk, return on a disaster

    International Nuclear Information System (INIS)

    Ackermann, G.

    2006-01-01

    The author gives the result of the situation after the Chernobylsk disaster. She made its own inquiry by traveling in the forbidden area, meeting operators, victims, scientific people and ecologists. (N.C.)

  4. FEMA Disaster Recovery Centers - KML

    Data.gov (United States)

    Department of Homeland Security — This is a KML file for FEMA's Disaster Recovery Centers (DRC). A DRC is a readily accessible facility or mobile office set up by FEMA where applicants may go for...

  5. Psychological impact of nuclear disasters

    International Nuclear Information System (INIS)

    Behere, Prakash B.; Chougule, Kaveri N.; Syyed, S.

    2017-01-01

    There are major Nuclear Power plant disasters in world, one was Chernobyl, Ukraine 1986, and other was Fukushima, Japan 2011. There are many studies, which are evidence based to demonstrate short and long terms consequences of nuclear plant disasters. The psychological consequences of nuclear power plant disasters include depression, anxiety, posttraumatic stress disorder, and medically unexplained somatic symptoms. These effects are often long term and associated with fears about developing serious illness like cancer. Research on disasters involving radiation, particularly evidence from Chernobyl, indicates that mothers of young children and safai workers are the highest risk groups. It is important that non-mental health providers learn to recognize and manage psychological symptoms and that medical programs be designed to reduce stigma and alleviate psychological suffering by integrating psychiatric and medical treatment

  6. Practice parameter on disaster preparedness.

    Science.gov (United States)

    Pfefferbaum, Betty; Shaw, Jon A

    2013-11-01

    This Practice Parameter identifies best approaches to the assessment and management of children and adolescents across all phases of a disaster. Delivered within a disaster system of care, many interventions are appropriate for implementation in the weeks and months after a disaster. These include psychological first aid, family outreach, psychoeducation, social support, screening, and anxiety reduction techniques. The clinician should assess and monitor risk and protective factors across all phases of a disaster. Schools are a natural site for conducting assessments and delivering services to children. Multimodal approaches using social support, psychoeducation, and cognitive behavioral techniques have the strongest evidence base. Psychopharmacologic interventions are not generally used but may be necessary as an adjunct to other interventions for children with severe reactions or coexisting psychiatric conditions. Copyright © 2013. Published by Elsevier Inc.

  7. Natural Disasters, Gender and Handicrafts

    OpenAIRE

    Takasaki, Yoshito

    2012-01-01

    Using original post-disaster household survey data gathered in rural Fiji, this article explores the disaster–gender nexus. Female-headed households are disadvantaged, not because of bias against them in disaster damage or relief, but because of a newly emerging gendered division of labour for dwelling rehabilitation that tightens their constraints on intra-household labour allocation. Female-headed households with damaged dwellings resort to female labour activities connected with informal r...

  8. Chronicle of an announced disaster

    International Nuclear Information System (INIS)

    Vanssay, B. de.

    1993-01-01

    Sociology of disasters is a global approach of situations of disasters. It is an analysis of behaviours and social dynamics used by a community to answer to it. Sociology studied different phases of these situations in a chronological and thematic way. It studies a social context, tries to find risk perceptions and then possibilities of populations to answer to a emergency situation. A concrete example is studied with the disastrous inundation happened in the south of France, the 22 September 1992

  9. Hydroxocobalamin: improved public health readiness for cyanide disasters.

    Science.gov (United States)

    Sauer, S W; Keim, M E

    2001-06-01

    The United States is under the constant threat of a mass casualty cyanide disaster from industrial accidents, hazardous material transportation incidents, and deliberate terrorist attacks. The current readiness for cyanide disaster by the emergency medical system in the United States is abysmal. We, as a nation, are simply not prepared for a significant cyanide-related event. The standard of care for cyanide intoxication is the cyanide antidote kit, which is based on the use of nitrites to induce methemoglobinemia. This kit is both expensive and ill suited for out-of-hospital use. It also has its own inherent toxicity that prevents rapid administration. Furthermore, our hospitals frequently fail to stock this life-saving antidote or decline to stock more than one. Hydroxocobalamin is well recognized as an efficacious, safe, and easily administered cyanide antidote. Because of its extremely low adverse effect profile, it is ideal for out-of-hospital use in suspected cyanide intoxication. To effectively prepare for a cyanide disaster, the United States must investigate, adopt, manufacture, and stockpile hydroxocobalamin to prevent needless morbidity and mortality.

  10. The Japanese aerial attack on Hanford Engineer Works

    Science.gov (United States)

    Clark, Charles W.

    The day before the Pearl Harbor attack, December 6, 1941, the University of Chicago Metallurgical Laboratory was given four goals: design a plutonium (Pu) bomb; produce Pu by irradiation of uranium (U); extract Pu from the irradiated U; complete this in time to be militarily significant. A year later the first controlled nuclear chain reaction was attained in Chicago Pile 1 (CP-1). In January 1943, Hanford, WA was chosen as the site of the Pu factory. Neutron irradiation of 238U was to be used to make 239Pu. This was done by a larger version of CP-1, Hanford Reactor B, which went critical in September 1944. By July 1945 it had made enough Pu for two bombs: one used at the Trinity test in July; the other at Nagasaki, Japan in August. I focus on an ironic sidelight to this story: disruption of hydroelectric power to Reactor B by a Japanese fire balloon attack on March 10, 1945. This activated the costly coal-fired emergency backup plant to keep the reactor coolant water flowing, thwarting disaster and vindicating the conservative design of Hanford Engineer Works. Management of the Hanford Engineer Works in World War II, H. Thayer (ASCE Press 1996).

  11. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  12. A disaster relief exercise

    Science.gov (United States)

    Quagliotti, Fulvia; Novaro Mascarello, Laura

    2016-04-01

    The Remotely Piloted Aircraft Systems (RPAS) is an effective tool for military applications, both for properly military operations, such as research missions and road surveillance, and for civilian support after natural disasters, like landslides, floods, and earthquakes, when reaching victims is often hard or it would take too much time for their survival. Information are needed without hazarding the life of the military troops. When roads, bridges and other communication ways are usually not available, the unmanned platform is the only easy and fast way to contact people. It can be launched directly from the operation site and it could take crucial information or carry medication, necessaries and everything that could help rescue teams. The unmanned platform can also be used for the first aid in an emergency situation when the use of a helicopter is too dangerous and other troops could be involved in heavy fighting. The RPAS has some advantages. First is the reduced cost, compared to traditional aircraft, that could enable the user to have several operating units. Secondly, pilots are not on board and therefore, if needed, the crew' rotation and rest do not imply the need to stop operations. The third fact is that, depending on the type of delivery that is used, the operations may take place on a twenty-four hours' base. The main benefit achieved with these three facts is that continuous operation may take place and eventually make up the capacity difference. To sum up, the main motivation behind this employment of UAS is to replace human lives on the cockpits and to assure the execution of Dangerous, Dull and Dirty missions. In May 2015, the ERIDANO Exercise was performed in Moncalieri city, near Turin (Italy) and it was a joint exercise between the Italian Army, National Emergency Service and Politecnico of Turin. The aim was the control and management of emergency situations due to natural disasters. In particular, a flood was simulated. A multicopter was used

  13. Natural disasters and gender dynamics

    Science.gov (United States)

    Roder, Giulia; Tarolli, Paolo

    2016-04-01

    Worldwide statistics reveal that the increasing number of risks and disaster impacts within the last decades have caused highly severe damages, with high death toll and huge economic damages (World Bank, 2010). As a consequence people's vulnerabilities have increased disproportionally in recent years. Individuals' ability to anticipate, prepare, cope, respond and recover from disasters differs according to some socio-economic attributes present in each community. The research on natural disasters in a gendered perspective is fairly limited compared to other variables. In fact, the need to track social vulnerabilities and investigate gender dynamics into all levels of the disaster life cycle has been recognized only recently, during the Sendai Framework for Disaster Risk Reduction (March 2015). For this purpose, we propose a review of the literature regarding the ways men and women conceptualise natural disasters, prepare and react, both physically and psychologically, to catastrophic events. This work tries to give some interpretation to these subjects analysing the social context in which sex discrepancies are developed, in different countries, cultures and in various socio-economic backgrounds. Findings highlighted that women perceived more the risk, and they have developed personal strategies to better react and withstand the impacts of negative occurrences. Being at home, working in the house and caring the children have been always placed them at a higher exposure to disasters. However, these circumstances, they gave them the means to organize the family for evacuations thanks to their deep knowledge of the territory they live and the neighbourhood networks they create. Women seem to be not sole victims, but valuable resources able to take leading roles in building disaster resilience. Some case studies, however, continue to demonstrate a female's higher fear and powerless face hazardous events than their counterparts, showing various mental health disorders

  14. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  15. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  16. Risk Communication Strategies: Lessons Learned from Previous Disasters with a Focus on the Fukushima Radiation Accident.

    Science.gov (United States)

    Svendsen, Erik R; Yamaguchi, Ichiro; Tsuda, Toshihide; Guimaraes, Jean Remy Davee; Tondel, Martin

    2016-12-01

    It has been difficult to both mitigate the health consequences and effectively provide health risk information to the public affected by the Fukushima radiological disaster. Often, there are contrasting public health ethics within these activities which complicate risk communication. Although no risk communication strategy is perfect in such disasters, the ethical principles of risk communication provide good practical guidance. These discussions will be made in the context of similar lessons learned after radiation exposures in Goiania, Brazil, in 1987; the Chernobyl nuclear power plant accident, Ukraine, in 1986; and the attack at the World Trade Center, New York, USA, in 2001. Neither of the two strategies is perfect nor fatally flawed. Yet, this discussion and lessons from prior events should assist decision makers with navigating difficult risk communication strategies in similar environmental health disasters.

  17. NASA's Applied Sciences: Natural Disasters Program

    Science.gov (United States)

    Kessler, Jason L.

    2010-01-01

    Fully utilize current and near-term airborne and spaceborne assets and capabilities. NASA spaceborne instruments are for research but can be applied to natural disaster response as appropriate. NASA airborne instruments can be targeted specifically for disaster response. Could impact research programs. Better flow of information improves disaster response. Catalog capability, product, applicable disaster, points of contact. Ownership needs to come from the highest level of NASA - unpredictable and irregular nature of disasters requires contingency funding for disaster response. Build-in transfer of applicable natural disaster research capabilities to operational functionality at other agencies (e.g., USFS, NOAA, FEMA...) at the outset, whenever possible. For the Decadal Survey Missions, opportunities exist to identify needs and requirements early in the mission design process. Need to understand additional needs and commitments for meeting the needs of the disaster community. Opportunity to maximize disaster response and mitigation from the Decadal Survey Missions. Additional needs or capabilities may require agency contributions.

  18. Post- and peritraumatic stress in disaster survivors: an explorative study about the influence of individual and event characteristics across different types of disasters

    Directory of Open Access Journals (Sweden)

    Anna Grimm

    2012-05-01

    Full Text Available Background : Examination of existing research on posttraumatic adjustment after disasters suggests that survivors’ posttraumatic stress levels might be better understood by investigating the influence of the characteristics of the event experienced on how people thought and felt, during the event as well as afterwards. Objective : To compare survivors’ perceived post- and peritraumatic emotional and cognitive reactions across different types of disasters. Additionally, to investigate individual and event characteristics. Design : In a European multi-centre study, 102 survivors of different disasters terror attack, flood, fire and collapse of a building were interviewed about their responses during the event. Survivors’ perceived posttraumatic stress levels were assessed with the Impact of Event Scale-Revised (IES-R. Peritraumatic emotional stress and risk perception were rated retrospectively. Influences of individual characteristics, such as socio-demographic data, and event characteristics, such as time and exposure factors, on post- and peritraumatic outcomes were analyzed. Results : Levels of reported post- and peritraumatic outcomes differed significantly between types of disasters. Type of disaster was a significant predictor of all three outcome variables but the factors gender, education, time since event, injuries and fatalities were only significant for certain outcomes. Conclusion : Results support the hypothesis that there are differences in perceived post- and peritraumatic emotional and cognitive reactions after experiencing different types of disasters. However, it should be noted that these findings were not only explained by the type of disaster itself but also by individual and event characteristics. As the study followed an explorative approach, further research paths are discussed to better understand the relationships between variables.

  19. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  20. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  1. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  2. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  3. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  4. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  5. Movies about nuclear disasters

    International Nuclear Information System (INIS)

    Portelli, A.; Guarnieri, F.; Martin, C.

    2014-01-01

    'The China Syndrome' by J.Bridges is the most famous film about nuclear energy, it was released in 1979 and tells the story of a television reporter who discovers safety cover-ups in the Ventana nuclear power plant. In the film 'Mount Fuji in red' a part of 'Akira Kurosawa's dreams' film released in 1990, the eruption of the Mount Fuji triggered a series of accidents in Japanese nuclear plants which sent millions of people fleeing in terror and blocked by the ocean. More recent films are 'Land of Oblivion' by M.Boganim - 2012, 'The land of hope' by S.Sion - 2012 or 'Grand Central' by R. Zlotowski - 2013. All this list of films depicting nuclear disasters and their dramatic consequences on the daily life of people contribute to build a frightening picture of nuclear energy in the mind of people. Although any film is fictional it can influence people but also open people's eyes on society issues like sub-contracting, unemployment, risk assessment... (A.C.)

  6. Waiting for Disasters: A Risk Reduction Assessment of Technological Disasters

    Science.gov (United States)

    Rovins, Jane; Winningham, Sam

    2010-05-01

    This session provides a risk reduction/mitigation assessment of natural hazards causation of technological disasters and possible solution. People use technology in an attempt to not only control their environment but nature itself in order to make them feel safe and productive. Most strategies for managing hazards followed a traditional planning model i.e. study the problem, identify and implement a solution, and move on to the next problem. This approach is often viewed as static model and risk reduction is more of an upward, positive, linear trend. However, technological disasters do not allow risk reduction action to neatly fit this upward, positive, linear trend with actual or potential threats to the environment and society. There are different types of technological disasters, including industrial accidents; pipeline ruptures; accidents at power, water and heat supply systems and other lines of communication; sudden collapse of buildings and mines; air crashes; shipwrecks; automobile and railway accidents to name a few. Natural factors can play an essential role in triggering or magnifying technological disasters. They can result from the direct destruction of given technical objects by a hazardous natural process such as the destruction of an atomic power plant or chemical plant due to an earthquake. Other examples would include the destruction of communications or infrastructure systems by heavy snowfalls, strong winds, avalanches. Events in the past ten years clearly demonstrate that natural disasters and the technological disasters that accompany them are not problems that can be solved in isolation and risk reduction can play an important part. Risk reduction was designed to head off the continuing rising financial and structural tolls from disasters. All Hazard Risk Reduction planning was supposed to include not only natural, but technological, and human-made disasters as well. The subsequent disaster risk reduction (DRR) indicators were to provide the

  7. Screening for generalized anxiety disorder symptoms in the wake of terrorist attacks: a study in primary care.

    Science.gov (United States)

    Ghafoori, Bita; Neria, Yuval; Gameroff, Marc J; Olfson, Mark; Lantigua, Rafael; Shea, Steven; Weissman, Myrna M

    2009-06-01

    Little is known about the mental health impact of terrorism beyond posttraumatic stress disorder (PTSD) and depression. The associations between exposure to the September 11, 2001 (9/11) attacks in New York City and generalized anxiety disorder (GAD) symptoms were examined in a sample of 929 primary care patients. After controlling for PTSD, depression, panic and substance use disorders, and pre-9/11 trauma, patients who screened positive (vs. negative) for GAD symptoms were roughly twice as likely to report having a loved one at the 9/11 disaster site, twice as likely to know someone who was killed by the attacks, and twice as likely to know someone who was involved with the rescue/recovery efforts after the disaster. Implications for treatment and future research are discussed.

  8. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  9. Effects of the 2002 sniper attacks on the homeless population in Washington, DC.

    Science.gov (United States)

    Fullerton, Carol S; Gifford, Robert K; Flynn, Brian W; Peterson, Karen M; Ahearn, Frederick L; Donaldson, Linda Plitt; Ursano, Robert J

    2009-10-01

    Despite the prevalence of homelessness, this population has rarely been included in disaster and terrorism planning. To better understand the mental health needs of the homeless during a terrorist event and to highlight the need to address methodological limitations in research in this area, we examined responses to the October 2002 Washington, DC, sniper attacks. We interviewed 151 homeless individuals 1 year after the Washington, DC, sniper attacks. The majority (92.7%) was aware of the sniper events; 84.1% stayed informed through the media and 72.7% had someone to turn to for emotional support. Almost half (44%) reported identification with victims and 41% increased substance use during the attacks. More than half (61.7%) felt extremely frightened or terrified and 57.6% reported high perceived threat. Females, nonwhites, and participants with less than a high school education experienced greater threat. Women, nonwhites, and younger (homeless population may be difficult to reach or reluctant to comply with public health programs. Addressing barriers to health care in vulnerable groups is critical to effective public health disaster response.

  10. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  11. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  12. Crisis Communication during Natural Disasters: Meeting Real and Perceived Needs

    Science.gov (United States)

    Jones, L.

    2017-12-01

    When significant natural disasters strike, our modern information-driven society turns to scientists, demanding information about the event. As part of their civic duty scientists respond, recognizing how the scientific information could be used to improve response to the disaster and reduce losses. However, what we often find is that the demand for information is not for improved response but to satisfy psychological, often subconscious needs. Human beings evolved our larger brains to better survive against larger and stronger predators. Recognizing that a movement of grass and the lack of birdsong means that a predator is hiding would in turn mean a greater likelihood of having progeny. Our ability to theorize comes from the need to create patterns in the face of danger that will keep us safe. From wondering about someone's exercise habits when we hear they have a heart attack, to blaming hurricane victims for not heeding evacuation orders even if they had no means to evacuate, we respond to disasters by trying to make a pattern that means that we will not suffer the same fate. Much of the demand for information after a natural disaster is a search for these patterns. Faced with a random distribution, many people still make patterns that can reduce their anxiety. The result is that meanings are ascribed to the information that is not supported by the data and was not part of the communication as intended by the scientist. The challenge for science communicators is to recognize this need and present the information is a way that both reduces the anxiety that arises from a lack of knowledge or uncertainty while making clear what patterns can or cannot be made about future risks.

  13. 20 CFR 625.7 - Disaster Unemployment Assistance: Duration.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Disaster Unemployment Assistance: Duration... DISASTER UNEMPLOYMENT ASSISTANCE § 625.7 Disaster Unemployment Assistance: Duration. DUA shall be payable... unemployment which begin during a Disaster Assistance Period. ...

  14. Natural disasters and suicide: evidence from Japan.

    Science.gov (United States)

    Matsubayashi, Tetsuya; Sawada, Yasuyuki; Ueda, Michiko

    2013-04-01

    Previous research shows no consensus as to whether and how natural disasters affect suicide rates in their aftermath. Using prefecture-level panel data of natural disasters and suicide in Japan between 1982 and 2010, we estimate both contemporaneous and lagged effects of natural disasters on the suicide rates of various demographic groups. We find that when the damage caused by natural disasters is extremely large, as in the case of the Great Hanshin-Awaji Earthquake in 1995, suicide rates tend to increase in the immediate aftermath of the disaster and several years later. However, when the damage by natural disasters is less severe, suicide rates tend to decrease after the disasters, especially one or two years later. Thus, natural disasters affect the suicide rates of affected populations in a complicated way, depending on the severity of damages as well as on how many years have passed since the disaster. We also find that the effects of natural disasters on suicide rates vary considerably across demographic groups, which suggests that some population subgroups are more vulnerable to the impact of natural disasters than others. We then test the possibility that natural disasters enhance people's willingness to help others in society, an effect that may work as a protective factor against disaster victims' suicidal risks. We find that natural disasters increase the level of social ties in affected communities, which may mitigate some of the adverse consequence of natural disasters, resulting in a decline in suicide rates. Our findings also indicate that when natural disasters are highly destructive and disruptive, such protective features of social connectedness are unlikely to be enough to compensate for the severe negative impact of disasters on health outcomes. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  16. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  17. Learning from disasters

    International Nuclear Information System (INIS)

    Taylor, R.

    2005-01-01

    Key common issues for preventing disasters are maintaining competence, application of acceptable standards, questioning attitude, organisational 'complacency'/loss of focus/organisational drift, poor communication, loss of 'oversight', management of change (often involving contractorisation) and external pressures. Lessons learned in leadership are well communicated standards and expectations, high visibility; 'actions align with words', demonstration that safety has priority; no 'turning a blind eye' because 'to tolerate is to validate', encouraging questioning and learning and need to be aware of these deeper root-causes and impact of organisational issues. Leadership issues relating to communication and learning comprise listening to the workforce and encouraging a questioning attitude 'If you really want to know how safe you are - ask your people', raise awareness of risks, consequences and promoting the importance of 'questioning and alert compliance', promoting the need for excellence in communication over safety issues at all levels e.g. between shifts and encouraging learning which leads to - 'the right message to the right people at the right time'. Alertness to 'organisational drift' means continuous review against best practice, monitoring of range of 'deeper' indicators, 'not just headlines', effective risk identification and management of change processes (particularly organisational), reinforcement of the safety message when perceptions may be that its priority has become lower and questioning and challenging the impact of changes in an organisational 'context'. Possible issues for the agency are to promote an understanding of these 'deeper' but vital issues in all organisations with an impact on nuclear safety, develop common ('hard hitting') messages about the vital role of leadership and the need for 'alertness and challenge', develop approaches and tools to assist and encourage self assessment and external scrutiny in the key areas, embed these

  18. Enhancing Saarc Disaster Management: A Comparative Study With Asean Coordinating Centre For Humanitarian Assistance On Disaster Management

    Science.gov (United States)

    2016-03-01

    North Atlantic Treaty Organization NDMA National Disaster Management Authority NDMO National Disaster Management Organization NIDM National...disaster management authorities. National Disaster Management Authority ( NDMA ) has envisaged the role of the army in relief, recovery, management of

  19. 78 FR 32416 - Minnesota; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-05-30

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C..., Disaster Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing...

  20. 78 FR 41942 - Alaska; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-07-12

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C...; 97.048, Disaster Housing Assistance to Individuals and Households In Presidentially Declared Disaster...

  1. 78 FR 32414 - Illinois; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-05-30

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency..., Disaster Housing Assistance to Individuals and Households In Presidentially Declared Disaster Areas; 97.049...

  2. 78 FR 51204 - Colorado; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-08-20

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C..., Disaster Housing Assistance to Individuals and Households In Presidentially Declared Disaster Areas; 97.049...

  3. Country logistics performance and disaster impact.

    Science.gov (United States)

    Vaillancourt, Alain; Haavisto, Ira

    2016-04-01

    The aim of this paper is to deepen the understanding of the relationship between country logistics performance and disaster impact. The relationship is analysed through correlation analysis and regression models for 117 countries for the years 2007 to 2012 with disaster impact variables from the International Disaster Database (EM-DAT) and logistics performance indicators from the World Bank. The results show a significant relationship between country logistics performance and disaster impact overall and for five out of six specific logistic performance indicators. These specific indicators were further used to explore the relationship between country logistic performance and disaster impact for three specific disaster types (epidemic, flood and storm). The findings enhance the understanding of the role of logistics in a humanitarian context with empirical evidence of the importance of country logistics performance in disaster response operations. © 2016 The Author(s). Disasters © Overseas Development Institute, 2016.

  4. 76 FR 54521 - Iowa Disaster #IA-00036

    Science.gov (United States)

    2011-09-01

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12754 and 12755] Iowa Disaster IA-00036 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major [[Page 54522

  5. On civil engineering disasters and their mitigation

    Science.gov (United States)

    Xie, Lili; Qu, Zhe

    2018-01-01

    Civil engineering works such as buildings and infrastructure are the carriers of human civilization. They are, however, also the origins of various types of disasters, which are referred to in this paper as civil engineering disasters. This paper presents the concept of civil engineering disasters, their characteristics, classification, causes, and mitigation technologies. Civil engineering disasters are caused primarily by civil engineering defects, which are usually attributed to improper selection of construction site, hazard assessment, design and construction, occupancy, and maintenance. From this viewpoint, many so-called natural disasters such as earthquakes, strong winds, floods, landslides, and debris flows are substantially due to civil engineering defects rather than the actual natural hazards. Civil engineering disasters occur frequently and globally and are the most closely related to human beings among all disasters. This paper emphasizes that such disasters can be mitigated mainly through civil engineering measures, and outlines the related objectives and scientific and technological challenges.

  6. Can Disaster Risk Education Reduce the Impacts of Recurring Disasters on Developing Societies?

    Science.gov (United States)

    Baytiyeh, Hoda

    2018-01-01

    The impacts of recurring disasters on vulnerable urban societies have been tragic in terms of destruction and fatalities. However, disaster risk education that promotes risk mitigation and disaster preparedness has been shown to be effective in minimizing the impacts of recurring disasters on urban societies. Although the recent integration of…

  7. Disaster imminent--Hurricane Hugo.

    Science.gov (United States)

    Guynn, J B

    1990-04-01

    Response to a disaster situation depends upon the type of circumstances presented. In situations where the disaster is the type that affects the hospital as well as a wide surrounding area directly, the hospital and pharmacy itself may be called upon to continue functioning for some period of time without outside assistance. The ability to function for prolonged periods of time requires the staff to focus on the job at hand and the administrative staff to provide security, compassion, and flexibility. Plans for a disaster of the nature of a hurricane require that attention be paid to staffing, medication inventories, supplies, and services being rendered. Recognition of the singular position occupied by a hospital in the community and the expectations of the local population require that hospitals and the pharmacy department have the ability to respond appropriately.

  8. Disaster countermeasures around nuclear facilities

    International Nuclear Information System (INIS)

    Tatsuta, Yoshinori

    1982-01-01

    The following matters are described. Safety regulation administration for nuclear power plants; nuclear disaster countermeasures in the United States; disaster countermeasures around nuclear facilities (a report of the ad hoc committee in Nuclear Safety Commission), including general requirements, the scope of areas to take the countermeasures, emergency environmental monitoring, guidelines for taking the countermeasures, and emergency medical treatment. In the nuclear safety administration, the system of stationing safety expert personnel on the sites of nuclear power generation and qualifying the persons in charge of reactor operation in the control room is also introduced. As for the disaster countermeasures, such as the detection of an abnormal state, the notification of the abnormality to various organs concerned, the starting of emergency environmental monitoring, the establishment of the countermeasure headquarters, and emergency measures for the local people. (Mori, K.)

  9. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  10. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  11. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  12. Promoting Disaster Science and Disaster Science Communities as Part of Sound Disaster Preparedness

    Science.gov (United States)

    McNutt, M. K.

    2015-12-01

    During disasters, effectively engaging the vast expertise of the academic community can help responders make timely and critical decisions. A barrier to such engagement, however, is the cultural gap between reward systems in academia and in the disaster response community. Responders often are focused on ending the emergency quickly with minimal damage. Academic scientists often need to produce peer reviewed publications to justify their use of time and money. Each community is used to speaking to different audiences, and delivering answers on their own time scales. One approach to bridge this divide is to foster a cohesive community of interdisciplinary disaster scientists: researchers who focus on crises that severely and negatively disrupt the environment or threaten human health, and are able to apply scientific methods in a timely manner to understand how to prevent, mitigate, respond to, or recover from such events. Once organized, a disaster science community could develop its own unique culture. It is well known in the disaster response community that all the preparation that takes place before an event ever occurs is what truly makes the difference in reducing response time, improving coordination, and ultimately reducing impacts. In the same vein, disaster scientists would benefit from consistently interacting with the response community. The advantage of building a community for all disasters, rather than for just one type, is that it will help researchers maintain momentum between emergencies, which may be decades or more apart. Every disaster poses similar challenges: Knowing when to speak to the press and what to say; how to get rapid, actionable peer review; how to keep proprietary industry information confidential; how to develop "no regrets" actions; and how to communicate with decision makers and the public. During the Deepwater Horizonspill, I personally worked with members of the academic research community who cared not whether they got a peer

  13. System i Disaster Recovery Planning

    CERN Document Server

    Dolewski, Richard

    2008-01-01

    Mapping out all the preparations necessary for an effective disaster recovery plan and its safeguard-a continuous maintenance program-this guide is aimed at IT managers of small and medium businesses. The opening section covers the initial steps of auditing vulnerability, ranking essential IT functions, and reviewing the storage of tape backups, with the following discussion focused on the elements of the plan itself. The plan includes a mission statement, a definition of disaster, the assignment of staff to teams, methods of compensating for human error, and standards for documenting the step

  14. Nuclear disasters and their consequences

    International Nuclear Information System (INIS)

    Bastian, T.

    1986-01-01

    The book is intended to serve as a source of information and a line of orientation for all people afraid of or angry about the consequences of the Chernobyl disaster. The author describes the effects of nuclear disasters that might happen as a result of military or 'peaceful' application of nuclear energy; he explains the situation people will have to cope with, gives advice on protective means and methods and topical information with reference to institutions or authorities where assistance might be available, also including a list of addresses and telephone numbers that has been issued by the governments after the Chernobyl accident. (orig.) [de

  15. CryoSat SAR/SARin Level1b products: assessment of BaselineC and improvements towards BaselineD

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Bouffard, Jerome; Parrinello, Tommaso

    2017-04-01

    CryoSat was launched on the 8th April 2010 and is the first European ice mission dedicated to the monitoring of precise changes in the thickness of polar ice sheets and floating sea ice. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvements in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. The current IPF, Baseline C, was released in operation in April 2015 and the second CryoSat reprocessing campaign was jointly initiated, taking benefit of the upgrade implemented in the IPF1 processing chain but also of some specific configurations for the calibration corrections. In particular, the CryoSat Level1b BaselineC products generated in the framework of the second reprocessing campaign include refined information for what concerns the mispointing angles and the calibration corrections. This poster will thus detail thus the evolutions that are currently planned for the CryoSat BaselineD SAR/SARin Level1b products and the corresponding quality improvements that are expected.

  16. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  17. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  18. 76 FR 21935 - Hawaii Disaster #HI-00022

    Science.gov (United States)

    2011-04-19

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12503 and 12504] Hawaii Disaster HI-00022 AGENCY: U.S. Small Business Administration. ACTION: Amendment 1. SUMMARY: This is an amendment to the Administrative declaration of a disaster for the State of Hawaii dated 03/29/2011. Incident: Honshu Tsunami...

  19. 76 FR 24554 - Hawaii Disaster # HI-00022

    Science.gov (United States)

    2011-05-02

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12503 and 12504] Hawaii Disaster HI-00022 AGENCY: U.S. Small Business Administration. ACTION: Amendment 2. SUMMARY: This is an amendment to the Administrative declaration of a disaster for the State of HAWAII dated 03/29/2011. Incident: Honshu Tsunami...

  20. 77 FR 25010 - Hawaii Disaster # HI-00026

    Science.gov (United States)

    2012-04-26

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13065 and 13066] Hawaii Disaster HI-00026 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Hawaii (FEMA-4062- DR), dated 04...

  1. 76 FR 18613 - Hawaii Disaster #HI-00022

    Science.gov (United States)

    2011-04-04

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12503 and 12504] Hawaii Disaster HI-00022 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Hawaii dated 03/29/2011. Incident: Honshu Tsunami...

  2. 76 FR 21935 - Hawaii Disaster #HI-00023

    Science.gov (United States)

    2011-04-19

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12526 and 12527] Hawaii Disaster HI-00023 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Hawaii (FEMA-1967- DR), dated 04...

  3. Connecting care competencies and culture during disasters

    Science.gov (United States)

    Chhabra, Vivek

    2009-01-01

    Connecting care Competencies and Culture are core fundamentals in responding to disasters. Thick coordination between professionals, communities and agencies in different geographical areas is crucial to the happening of appropriate preparedness and thus efficient response and mitigation of a disaster. In the next few articles, we present diverse examples related to the preparedness and recovery process to adverse disasters across the globe PMID:19561968

  4. 75 FR 22167 - Minnesota Disaster #MN-00024

    Science.gov (United States)

    2010-04-27

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12132 and 12133] Minnesota Disaster MN-00024 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of MINNESOTA (FEMA- 1900-DR), dated...

  5. 78 FR 36010 - Iowa Disaster #IA-00052

    Science.gov (United States)

    2013-06-14

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13605 and 13606] Iowa Disaster IA-00052 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-4119- DR), dated 05/31...

  6. 76 FR 54522 - Iowa Disaster #IA-00037

    Science.gov (United States)

    2011-09-01

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12760 and 12761] Iowa Disaster IA-00037 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-4016- DR), dated 08/24...

  7. 76 FR 27738 - Iowa Disaster #IA-00030

    Science.gov (United States)

    2011-05-12

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12541 and 12542] Iowa Disaster IA-00030 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Iowa dated 05/04/2011. Incident: Severe storms and tornadoes...

  8. 78 FR 28939 - Iowa Disaster #IA-00050

    Science.gov (United States)

    2013-05-16

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13567 and 13568] Iowa Disaster IA-00050 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-4114- DR), dated 05/06...

  9. 76 FR 52042 - Iowa Disaster #IA-00035

    Science.gov (United States)

    2011-08-19

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12734 and 12735] Iowa Disaster IA-00035 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Iowa Dated. Incident: Severe Storms and Flash Flooding. Incident...

  10. 76 FR 55721 - Iowa Disaster #IA-00038

    Science.gov (United States)

    2011-09-08

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12772 and 12773] Iowa Disaster IA-00038 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-4018- DR), dated 08/30...

  11. 75 FR 47035 - Iowa Disaster # IA-00026

    Science.gov (United States)

    2010-08-04

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12258 and 12259] Iowa Disaster IA-00026 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance only for the State of Iowa (FEMA-1930- DR), dated 07/29...

  12. 75 FR 51507 - Iowa Disaster #IA-00024

    Science.gov (United States)

    2010-08-20

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12279 and 12280] Iowa Disaster IA-00024 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Iowa (FEMA-1930-DR), dated 08/14/2010. Incident: Severe...

  13. 75 FR 10329 - Iowa Disaster #IA-00022

    Science.gov (United States)

    2010-03-05

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12053 and 12054] Iowa Disaster IA-00022 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of IOWA (FEMA--1877-- DR), dated 02...

  14. 75 FR 11582 - IOWA Disaster # IA-00023

    Science.gov (United States)

    2010-03-11

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12062 and 12063] IOWA Disaster IA-00023 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-1880- DR), dated 03/02...

  15. 78 FR 42147 - Iowa Disaster #IA-00054

    Science.gov (United States)

    2013-07-15

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13645 and 13646] Iowa Disaster IA-00054 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance only for the State of Iowa (FEMA-4126- DR), dated 07/02...

  16. 76 FR 29284 - Iowa Disaster #IA-00031

    Science.gov (United States)

    2011-05-20

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12568 and 12569] Iowa Disaster IA-00031 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-1977- DR), dated 05/05...

  17. 75 FR 45681 - Iowa Disaster #IA-00025

    Science.gov (United States)

    2010-08-03

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12252 and 12253] Iowa Disaster IA-00025 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-1928- DR), dated 07/27...

  18. 76 FR 66768 - Iowa Disaster #IA-00033

    Science.gov (United States)

    2011-10-27

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12895 and 12896] Iowa Disaster IA-00033 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Iowa (FEMA-1998-DR), dated 10/18/2011. Incident: Flooding...

  19. 78 FR 48762 - Iowa Disaster #IA-00053

    Science.gov (United States)

    2013-08-09

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13699 and 13700] Iowa Disaster IA-00053 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA-4135- DR), dated 07/31...

  20. 75 FR 53006 - Iowa Disaster #IA-00026

    Science.gov (United States)

    2010-08-30

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12258 and 12259] Iowa Disaster IA-00026 AGENCY: U.S. Small Business Administration. ACTION: Amendment 2. SUMMARY: This is an amendment of the Presidential declaration of a major disaster for Public Assistance Only for the State of Iowa (FEMA- 1930-DR...

  1. DISASTER MANAGEMENT CYCLE – A THEORETICAL APPROACH

    Directory of Open Access Journals (Sweden)

    Himayatullah KHAN

    2008-01-01

    Full Text Available The present study explains the various concepts used in disastermanagement. The concepts explained include: Disaster, Hazard,Vulnerability, Capacity, Risk and Disaster Management Cycle. In addition tothe terminologies, the study also seeks to explain various types of disasters.

  2. 75 FR 7637 - Arkansas Disaster #AR-00040

    Science.gov (United States)

    2010-02-22

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12031 and 12032] Arkansas Disaster AR-00040 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Arkansas dated 02/10/2010. Incident: Severe Storms and...

  3. 76 FR 42155 - Arkansas Disaster #AR-00051

    Science.gov (United States)

    2011-07-18

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12680 and 12681] Arkansas Disaster AR-00051 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Arkansas (FEMA- 4000-DR), dated 07...

  4. 75 FR 7636 - Arkansas Disaster #AR-00042

    Science.gov (United States)

    2010-02-22

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12034 and 12035] Arkansas Disaster AR-00042 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Arkansas (FEMA-- 1872--DR), dated...

  5. 76 FR 42154 - Arkansas Disaster #AR-00050

    Science.gov (United States)

    2011-07-18

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12678 and 12679] Arkansas Disaster AR-00050 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Arkansas (FEMA-4000-DR), dated 07/08/2011. Incident: Severe...

  6. 75 FR 30872 - Arkansas Disaster # AR-00043

    Science.gov (United States)

    2010-06-02

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12196 and 12197] Arkansas Disaster AR-00043 AGENCY: U.S. Small Business Administration. ACTION: Notice SUMMARY: This is a notice of an Administrative declaration of a disaster for the State of Arkansas dated 05/26/2010. Incident: Severe storms, tornadoes and...

  7. 78 FR 39821 - Arkansas Disaster #AR-00064

    Science.gov (United States)

    2013-07-02

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13637 and 13638] Arkansas Disaster AR-00064 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Arkansas (FEMA- 4124-DR), dated 06...

  8. 76 FR 27140 - Arkansas Disaster # AR-00049

    Science.gov (United States)

    2011-05-10

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12562 and 12563] Arkansas Disaster AR-00049 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Arkansas (FEMA- 1975-DR), dated 05...

  9. 78 FR 9448 - Arkansas Disaster #AR-00061

    Science.gov (United States)

    2013-02-08

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13473 and 13474] Arkansas Disaster AR-00061 AGENCY: U.S. Small Business Administration. ACTION: Notice SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Arkansas (FEMA- 4100-DR), dated 01...

  10. 76 FR 27139 - Arkansas Disaster #AR-00048

    Science.gov (United States)

    2011-05-10

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12560 and 12561] Arkansas Disaster AR-00048 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for the State of Arkansas (FEMA-1975-DR), dated 05/02/2011. Incident: Severe...

  11. Performance of District Disaster Management Teams after ...

    African Journals Online (AJOL)

    Introduction: Uganda is vulnerable to several natural, man-made and a hybrid of disasters including drought, famine, floods, warfare, and disease outbreaks. We assessed the district disaster team's performance, roles and experiences following the training. Findings: The disasters most commonly experienced by the district ...

  12. 76 FR 64419 - Pennsylvania Disaster #PA-00045

    Science.gov (United States)

    2011-10-18

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12879 and 12880] Pennsylvania Disaster PA-00045 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the Commonwealth of Pennsylvania...

  13. 78 FR 4967 - Pennsylvania Disaster #PA-00057

    Science.gov (United States)

    2013-01-23

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 13463 and 13464] Pennsylvania Disaster PA-00057 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the State of Pennsylvania (FEMA...

  14. 76 FR 56861 - Pennsylvania Disaster #PA-00043

    Science.gov (United States)

    2011-09-14

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12807 and 12808] Pennsylvania Disaster PA-00043 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the Commonwealth of Pennsylvania...

  15. 76 FR 44646 - Pennsylvania Disaster #PA-00040

    Science.gov (United States)

    2011-07-26

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12697 and 12698] Pennsylvania Disaster PA-00040 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a Notice of the Presidential declaration of a major disaster for Public Assistance Only for the Commonwealth of Pennsylvania...

  16. 75 FR 14331 - Disaster Assistance Loan Program

    Science.gov (United States)

    2010-03-25

    ... SMALL BUSINESS ADMINISTRATION 13 CFR Part 123 RIN 3245-AF98 Disaster Assistance Loan Program...-term disaster loans to homeowners, renters, businesses, and non-profit organizations that have been... to disaster victims by raising the statutory loan limit for loans to businesses, increasing the...

  17. Ethics in disaster management

    Science.gov (United States)

    Parkash, S.

    2012-04-01

    Ethics are basically a minimum level of moral values in a society that one must follow to do justice for honest practices in any profession. Geoscientists have significant roles to play, more particularly in the field of geohazards, to appraise the society about the possibilities of natural hazards like landslides, avalanches, floods, volcanoes, earthquake etc. They can not only assess these hazards but also can estimate the potential consequences if these hazards occur in a given place and a given time. However, sometimes it has been found that the credibility of geoscientist among the society and the governance is lost due to some unethical practices for a short term gain or due to improper understanding of the geological phenomena. Some of the hazards that cannot be predicted with the existing capabilities have been forecasted by some geoscientists to draw social/media's attention, thereby bringing the reputation of the profession down. One must be fair enough to accept the limitations of our profession in informing about natural hazards which are yet not fully well understood by the professionals in this field. More specifically the predictions related to earthquakes have drawn the attention of the society as well as media in the developing world where common people have different perceptions. Most often the popular myths take over the scientific facts among the public and lead to rumours about natural hazards. The paper attempts to cite some cases of rumours about natural disasters, particularly earthquakes and response of the society, media and governance. It emphasizes the role of geoscientists as the ethical responsibility to inform the public about the factual situations on the geohazards, to avert the panic caused by rumours from non-specialists or hyper-active pseudo experts. The paper points out the recent rumours about lake outburst, flash-floods and volcanic activities after a moderate earthquake (M6.8, 18 September 2011) in the Sikkim State, India

  18. Ethics in disaster management

    Directory of Open Access Journals (Sweden)

    Surya Parkash

    2012-07-01

    Full Text Available In any profession, a basic set of moral values needs to be followed to comply with what we call ethics. Geoscientists have significant roles to play, more particularly in the field of geohazards, to appraise society about the possibilities of natural hazards such as landslides, avalanches, floods, volcanoes, and earthquakes. Geoscientists cannot only assess these hazards, but they can also estimate the potential consequences if these hazards occur in a given place and at a given time. However, sometimes it has been found that the credibility of geoscientists among society and government is lost, due to some unethical practices for short-term gain, or due to incorrect understanding of geological phenomena. Some of the hazards that cannot be predicted with the existing capabilities have been forecast by some pseudo-geoscientists, to draw social/ media attention, thereby bringing the reputation of the profession into disrepute. There is the need to be fair enough to accept the limitations of our profession in providing information about natural hazards that are not yet fully understood by the professionals themselves. More specifically, the predictions related to earthquakes have drawn the attention of society as well as media in the developing countries where the ‘common’ people have different perceptions. Most often, popular myths take over scientific facts among the public, and this can lead to rumors about natural hazards. This article will mention some cases of rumors about natural disasters, and particularly earthquakes, and the response of society, media and government. It emphasizes the role of geoscientists as the ethical responsibility to inform the public about the actual situations and the geohazards, to avoid panic caused by rumors from non-specialists or hyperactive pseudo experts. This article indicates the recent rumors about a lake outburst, flash floods, and volcanic activities after a moderate earthquake (M 6.9, September 18

  19. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  20. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  1. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  2. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  3. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  4. Disasters and development: natural disasters, credit constraints, and economic growth

    NARCIS (Netherlands)

    McDermott, T.K.J.; Barry, F.; Tol, R.S.J.

    2014-01-01

    Using a simple two-period model of the economy, we demonstrate the potential effects of natural disasters on economic growth over the medium to long term. In particular, we focus on the effect of such shocks on investment. We examine two polar cases: an economy in which agents have unconstrained

  5. [Disaster nursing and primary school teachers' disaster-related healthcare knowledge and skills].

    Science.gov (United States)

    Lai, Fu-Chih; Lei, Hsin-Min; Fang, Chao-Ming; Chen, Jiun-Jung; Chen, Bor-An

    2012-06-01

    The World Bank has ranked Taiwan as the 5th highest risk country in the world in terms of full-spectrum disaster risk. With volatile social, economic, and geologic environments and the real threat of typhoons, earthquakes, and nuclear disasters, the government has made a public appeal to raise awareness and reduce the impact of disasters. Disasters not only devastate property and the ecology, but also cause striking and long-lasting impacts on life and health. Thus, healthcare preparation and capabilities are critical to reducing their impact. Relevant disaster studies indicate children as a particularly vulnerable group during a disaster due to elevated risks of physical injury, infectious disease, malnutrition, and post-traumatic stress disorder. Primary school teachers are frontline educators, responders, and rehabilitators, respectively, prior to, during, and after disasters. The disaster prevention project implemented by the Taiwan Ministry of Education provides national guidelines for disaster prevention and education. However, within these guidelines, the focus of elementary school disaster prevention education is on disaster prevention and mitigation. Little guidance or focus has been given to disaster nursing response protocols necessary to handle issues such as post-disaster infectious diseases, chronic disease management, and psychological health and rehabilitation. Disaster nursing can strengthen the disaster healthcare response capabilities of school teachers, school nurses, and children as well as facilitate effective cooperation among communities, disaster relief institutes, and schools. Disaster nursing can also provide healthcare knowledge essential to increase disaster awareness, preparation, response, and rehabilitation. Implementing proper disaster nursing response protocols in Taiwan's education system is critical to enhancing disaster preparedness in Taiwan.

  6. An introduction to neglected disasters

    Directory of Open Access Journals (Sweden)

    Ben Wisner

    2009-04-01

    Full Text Available This theme issue of Jàmbá takes up the question of neglected disasters. It is an important topic because the world is changing, disasters are changing, and theory is changing. All these changes call for a re-assessment of why some human suffering and social disruption receive attention from authorities, donors, researchers and the media, while some does not. Recent progress in both development studies and disaster studies provides tools for answering this question. Development and disaster studies date in their current forms to ways of thinking that were current in academic and policy circles in the late 1950s and 1960s. At that time the world was recovering from world war and former colonies of Europe were gaining independence. It was a world in which (with some exceptions conflict was held in check in an uneasy cold war balance. It was also a world where a growing UN system held the promise of meeting humanitarian needs when they arose. That world is no more. ‘Development’ has changed.

  7. Disaster Rescue and Response Workers

    Science.gov (United States)

    ... of disaster responders. Preventive Medicine, 75, 70-74. doi:10.1016/j.ypmed.2015.03.017 Pietrzak, R. H., ... effort.. Journal of Psychiatric Research, 46, 835-842. doi:10.1016/j.jpsychires.2012.03.011 Pietrzak, R. H., ...

  8. Planning in emergencies and disasters

    African Journals Online (AJOL)

    surgical training - although this mainly comprises the clinical aspect of it. A disaster is a large-scale emergency and thus involves many other disciplines other than medical. In the last .... old, refugees and migrants .... Thought should be put into the preservation, dignity ... especially rescue workers and volunteers, working in.

  9. Dealing with death and disaster

    NARCIS (Netherlands)

    Veere, van der H.

    2011-01-01

    The triple disaster of earthquake, tsunami and nuclear fallout has done great damage. From the perspective of the ritual system and worldview, veneration of ancestors and ritual duties, the damage is even greater although hard to imagine for outsiders to the specifics of Japanese culture. This

  10. Longitudinal health effects of disasters.

    NARCIS (Netherlands)

    IJzermans, C.J.; Donker, G.

    2003-01-01

    Background and Aim: We are involved in research on the possible health effects of three disasters in the Netherlands: a plane crash in an Amsterdam neighbourhood, the explosion of a firework factory in the city of Enschede and a fire in a discotheque in Volendam. Which methodologies were used and

  11. Natural disasters and agricultural protection

    NARCIS (Netherlands)

    Klomp, Jeroen; Hoogezand, Barry

    2018-01-01

    We explore the impact of natural disasters on the degree of agricultural protection using data from 76 countries thereby covering more than 70 of the most traded agricultural commodities. Theoretically, the direction of this effect is not a priori directly clear as it balances the trade-off

  12. Information flow through the disaster circle

    DEFF Research Database (Denmark)

    Egedorf, Maren Marie; Villanueva Holm-Nielsen, Pablo

    The traditional view of the disaster circle is phase based. Disaster and development professionals recognize that the actions carried out in the various phases of the disaster management cycle are overlapping and build upon each other, having resilience as the overall goal. However information does...... not necessarily flow across the phases of the circle in an effective manner. This is particularly true for the information that crosses the disaster point of the circle. Organisations carry out assessments, surveys and baselines for various purposes, at various points of time in the disaster circle. Output...

  13. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  14. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  15. Global Asbestos Disaster

    Directory of Open Access Journals (Sweden)

    Sugio Furuya

    2018-05-01

    European Union, and equivalent of 0.70% of the Gross Domestic Product or 114 × 109 United States Dollars. Intangible costs could be much higher. When applying the Value of Statistical Life of 4 million EUR per cancer death used by the European Commission, we arrived at 410 × 109 United States Dollars loss related to occupational cancer and 340 × 109 related to asbestos exposure at work, while the human suffering and loss of life is impossible to quantify. The numbers and costs are increasing practically in every country and region in the world. Asbestos has been banned in 55 countries but is used widely today; some 2,030,000 tons consumed annually according to the latest available consumption data. Every 20 tons of asbestos produced and consumed kills a person somewhere in the world. Buying 1 kg of asbestos powder, e.g., in Asia, costs 0.38 United States Dollars, and 20 tons would cost in such retail market 7600 United States Dollars. Conclusions: Present efforts to eliminate this man-made problem, in fact an epidemiological disaster, and preventing exposures leading to it are insufficient in most countries in the world. Applying programs and policies, such as those for the elimination of all kind of asbestos use—that is banning of new asbestos use and tight control and management of existing structures containing asbestos—need revision and resources. The International Labor Organization/World Health Organization Joint Program for the Elimination of Asbestos-Related Diseases needs to be revitalized. Exposure limits do not protect properly against cancer but for asbestos removal and equivalent exposure elimination work, we propose a limit value of 1000 fibres/m3.

  16. For establishment on nuclear disaster prevention system

    International Nuclear Information System (INIS)

    Anon.

    2000-01-01

    For increasing requirement of peoples for review of nuclear disaster countermeasure at a chance of the JCO critical accident, the Japanese Government newly established the 'Special Measure Act on Nuclear Disaster Countermeasure', which was enacted on July 16, 2000. The nuclear business relatives such as electric power company and so forth established the Business program on nuclear disaster prevention in nuclear business relatives' after their consultation with local communities at their construction, under their co-operation. Simultaneously, the electric power industry field decided to intend to provide some sufficient countermeasures to incidental formation of nuclear accident such as start of the Co-operative agreement on nuclear disaster prevention among the nuclear business relatives' and so forth. Here were described on nuclear safety and disaster prevention, nuclear disaster prevention systems at the electric power industry field, abstract on 'Business program on nuclear disaster prevention in nuclear business relatives', preparation of technical assistance system for nuclear disaster prevention, executive methods and subjects on nuclear disaster prevention at construction areas, recent business on nuclear disaster prevention at the Nuclear Technical Center, and subjects on establishment of nuclear disaster prevention system. (G.K.)

  17. Field Organization and Disaster Medical Assistance Teams

    Directory of Open Access Journals (Sweden)

    Ibrahim ARZIMAN

    2015-10-01

    Full Text Available SUMMARY: Disasters cause an acute deterioration in all stages of life. An area affected by the disaster in which the normal activities of life are disrupted is described as a “Field” in disaster terminology. Although it is not easy to define the borders of this zone, the area where there is normally functioning society is accepted as the boundary. Disaster management is the responsibility of the local government. However, in many large disaster responses many non-governmental and international organizations play a role. A Disaster Medical Team is a trained, mobile, self-contained, self-sufficient, multidisciplinary medical team that can act in the acute phase of a sudden-onset disaster (48 to 72 hours after its occurrence to provide medical treatment in the affected area. The medical team can include physicians, nurses, paramedics and EMTS, technicians, personnel to manage logistics, security and others. Various models of Disaster Medical Teams can be observed around the world. There is paucity of evidence based literature regarding DMTs. There is a need for epidemiological studies with rigorous designs and sampling. In this section of the special edition of the journal, field organizations in health management during disasters will be summarized, with emphasis on preparedness and response phases, and disaster medical teams will be discussed. Keywords: Field organization, disaster, medical team, DMAT

  18. InaSAFE applications in disaster preparedness

    Science.gov (United States)

    Pranantyo, Ignatius Ryan; Fadmastuti, Mahardika; Chandra, Fredy

    2015-04-01

    Disaster preparedness activities aim to reduce the impact of disasters by being better prepared to respond when a disaster occurs. In order to better anticipate requirements during a disaster, contingency planning activities can be undertaken prior to a disaster based on a realistic disaster scenario. InaSAFE is a tool that can inform this process. InaSAFE is a free and open source software that estimates the impact to people and infrastructure from potential hazard scenarios. By using InaSAFE, disaster managers can develop scenarios of disaster impacts (people and infrastructures affected) to inform their contingency plan and emergency response operation plan. While InaSAFE provides the software framework exposure data and hazard data are needed as inputs to run this software. Then InaSAFE can be used to forecast the impact of the hazard scenario to the exposure data. InaSAFE outputs include estimates of the number of people, buildings and roads are affected, list of minimum needs (rice and clean water), and response checklist. InaSAFE is developed by Indonesia's National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction (AIFDR), in partnership with the World Bank - Global Facility for Disaster Reduction and Recovery (GFDRR). This software has been used in many parts of Indonesia, including Padang, Maumere, Jakarta, and Slamet Mountain for emergency response and contingency planning.

  19. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  1. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  2. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  3. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  4. Monitoring and reporting attacks on education in the Democratic Republic of the Congo and Somalia.

    Science.gov (United States)

    Bennouna, Cyril; van Boetzelaer, Elburg; Rojas, Lina; Richard, Kinyera; Karume, Gang; Nshombo, Marius; Roberts, Leslie; Boothby, Neil

    2018-04-01

    The United Nations' Monitoring and Reporting Mechanism is charged with documenting six grave violations against children in a time of conflict, including attacks on schools. Many of these incidents, however, remain unreported across the globe. This study explores whether or not a local knowledge base of education and child protection actors in North and South Kivu Provinces, Democratic Republic of the Congo, and in Mogadishu, Somalia, could contribute to a more complete record of attacks on education in those areas. Hundreds of semi-structured interviews were conducted with key informants across the three settings, and in total 432 attacks on education were documented. Purposive samples of these reports were verified and a large majority was confirmed. Local non-governmental organisations and education institutions were most knowledgeable about these incidents, but most never reported them to a monitoring authority. The study concludes that attack surveillance and response were largely insufficient, and recommends investing in mechanisms that utilise local knowledge to address these shortcomings. © 2018 The Author(s). Disasters © Overseas Development Institute, 2018.

  5. Children's Cognitive Functioning in Disasters and Terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Noffsinger, Mary A; Jacobs, Anne K; Varma, Vandana

    2016-05-01

    A growing literature has begun to address the cognitions that influence children's disaster reactions as well as the effects of disasters on children's cognitions. These cognitions must be viewed in the context of developmental and cultural considerations as well as disaster-related factors such as exposure and secondary stressors. This review examines the extant literature on children's cognitions related to disasters and terrorism including threat appraisal, beliefs, attention and concentration, memory, academic achievement, and executive functioning. The review highlights areas where research is lacking such as the effect of disasters on children's attention, concentration, content of disaster memories, and executive functioning. It also notes findings that may advance post-disaster screening and intervention.

  6. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  7. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  8. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  9. Indispensable disaster countermeasures and resiliency in the age of complex disasters

    International Nuclear Information System (INIS)

    Hirose, Hirotada

    2012-01-01

    We live in the age of complex disasters. One disaster brings about new disaster in succession like dominoes. Disaster chain does not always stand in a line and propagate in two-dimensional extend to focus on social fragility. Later disaster would cause larger damages. The East Japan disaster was a typical complex one derived from hazards of earthquakes, tsunamis and reactor accidents, which would have significant effects on Japanese society for the future. Disaster countermeasures and resilience were important especially for 'slow onset type disaster' such as tsunami or reactor accident, which had lead-time to cause damage after initiation of hazard. Hazard simulation was beneficial for disaster countermores but not well developed to use for hazard prediction. It would be wrong and eventually lose public's trust to appear safe in uncertain state of disaster not so as to cause panic to the society. When facing a danger, people enter a 'normal bias' state and fail to adequately prepare for a disaster. People could not respond without imagination of disaster. It was highly important for coping with a disaster to perceive a hazard definitely in the age of complex disasters. (T. Tanaka)

  10. Disaster mitigation science for Earthquakes and Tsunamis -For resilience society against natural disasters-

    Science.gov (United States)

    Kaneda, Y.; Takahashi, N.; Hori, T.; Kawaguchi, K.; Isouchi, C.; Fujisawa, K.

    2017-12-01

    Destructive natural disasters such as earthquakes and tsunamis have occurred frequently in the world. For instance, 2004 Sumatra Earthquake in Indonesia, 2008 Wenchuan Earthquake in China, 2010 Chile Earthquake and 2011 Tohoku Earthquake in Japan etc., these earthquakes generated very severe damages. For the reduction and mitigation of damages by destructive natural disasters, early detection of natural disasters and speedy and proper evacuations are indispensable. And hardware and software developments/preparations for reduction and mitigation of natural disasters are quite important. In Japan, DONET as the real time monitoring system on the ocean floor is developed and deployed around the Nankai trough seismogenic zone southwestern Japan. So, the early detection of earthquakes and tsunamis around the Nankai trough seismogenic zone will be expected by DONET. The integration of the real time data and advanced simulation researches will lead to reduce damages, however, in the resilience society, the resilience methods will be required after disasters. Actually, methods on restorations and revivals are necessary after natural disasters. We would like to propose natural disaster mitigation science for early detections, evacuations and restorations against destructive natural disasters. This means the resilience society. In natural disaster mitigation science, there are lots of research fields such as natural science, engineering, medical treatment, social science and literature/art etc. Especially, natural science, engineering and medical treatment are fundamental research fields for natural disaster mitigation, but social sciences such as sociology, geography and psychology etc. are very important research fields for restorations after natural disasters. Finally, to realize and progress disaster mitigation science, human resource cultivation is indispensable. We already carried out disaster mitigation science under `new disaster mitigation research project on Mega

  11. Emergency Preparedness for Disasters and Crises in the Hotel Industry

    Directory of Open Access Journals (Sweden)

    Ahmad Rasmi AlBattat

    2013-09-01

    Full Text Available Safety and security are the most important issues to tourist while traveling and the first aspect they consider is to be protected from hazards. Emergency planning and preparedness for a crisis are the most significant components of dealing with disasters. Hospitality practitioners noticed a rising number of natural and man-made crises that harm the hospitality industry, regarding its vulnerability to crisis and internal and external hazards. By using secondary data, this study aims to shed some light on this issue, contributing to knowledge and awareness on emergency preparedness for the hospitality industry. Moreover, the study aims to explain the management’s commitment to adopt, develop, and update emergency plans. The results of this study explain that tourism as an international mobile industry must respond to internal and external hazards such as disease movement and terrorist attacks. Marketing safety is important to promote hotels and tourist destinations to the guests and holiday advisors. Hotels have a long history of being a soft target for terrorist attacks, as can be seen in several accidents that have shaken the hotel industry in the past few decades. Hotels invest a lot to install protective techniques, but terrorists are becoming more organized. Practitioners propose disaster management frameworks using several measurements. Recovery from crisis and learning help business retention that minimizes negative impacts and prevent losses. Finally, evaluation and feedback are very important to overcome the hazards and return to normal, as well as adopting new ideas to deal with emergencies. Single- and double-loop organizational learning should benefit proactive preparedness.

  12. Disaster Mythology and Availability Cascades

    Directory of Open Access Journals (Sweden)

    Lisa Grow Sun

    2013-04-01

    Full Text Available Sociological research conducted in the aftermath of natural disasters has uncovered a number of “disaster myths” – widely shared misconceptions about typical post-disaster human behavior. This paper discusses the possibility that perpetuation of disaster mythology reflects an “availability cascade,” defined in prior scholarship as a “self-reinforcing process of collective belief formation by which an expressed perception triggers a chain reaction that gives the perception increasing plausibility through its rising availability in public discourse.” (Kuran and Sunstein 1999. Framing the spread of disaster mythology as an availability cascade suggests that certain tools may be useful in halting the myths’ continued perpetuation. These tools include changing the legal and social incentives of so-called “availability entrepreneurs” – those principally responsible for beginning and perpetuating the cascade, as well as insulating decision-makers from political pressures generated by the availability cascade. This paper evaluates the potential effectiveness of these and other solutions for countering disaster mythology. Las investigaciones sociológicas realizadas tras los desastres naturales han hecho evidentes una serie de “mitos del desastre”, conceptos erróneos ampliamente compartidos sobre el comportamiento humano típico tras un desastre. Este artículo analiza la posibilidad de que la perpetuación de los mitos del desastre refleje una “cascada de disponibilidad”, definida en estudios anteriores como un “proceso de auto-refuerzo de la formación de una creencia colectiva, a través del que una percepción expresada produce una reacción en cadena que hace que la percepción sea cada vez más verosímil, a través de una mayor presencia en el discurso público” (Kuran y Sunstein 1999. Enmarcar la propagación de los mitos del desastre como una cascada de disponibilidad sugiere que ciertas herramientas pueden ser

  13. Global rhetorics of disaster: media constructions of Bataclan and the “Colectiv Revolution” in the wake of 9/11

    Directory of Open Access Journals (Sweden)

    Maria-Sabina DRAGA ALEXANDRU

    2017-07-01

    Full Text Available This article examines the recent global emergence of a rhetoric of disaster that connects violent events such as terrorist attacks and destructive accidents under an assumption of similarity based on their equally resulting in tragedy and mourning. I will compare discursive constructions of the terrorist attacks on 9/11, often considered the archetypal terrorist act of the new millennium, the Club Colectiv fire in Bucharest (October 30, 2015, followed by the “Colectiv Revolution” that led to a change of government in Romania, and the Bataclan terrorist attack in Paris (November 13, 2016. In a dialogue with Noemi Marin's concept of rhetorical space, I argue that, within the horizon of expectation created by 9/11, Bataclan and Colectiv have given rise to a specific rhetoric of mourning and revolt in reaction to disaster, which has an important public dimension, but, through a strong emotional appeal, is directed at every member of the audience in a personal way.

  14. Network resilience to real-world disasters: Eyjafjallajökull and 9/11

    Science.gov (United States)

    Woolley, Olivia; Thiemann, Christian; Grady, Daniel; Brockmann, Dirk

    2011-03-01

    We investigate the resilience of the the world-wide air transportation network (WAN) to the 9/11 terrorist attacks and the recent eruption of the volcano Eyjafjallajökull. Although both disasters caused wide-spread disruption, the number of airports that were closed and the volume of interrupted traffic were well below the percolation threshold predicted by the classical theory. In order to quantify and visualize network deformation before breakdown, we introduce a framework based on the increase in shortest-path distance and homogenization of shortest-path structure. These real-world disasters are a new type of disruption because the removal of all vertices (airports) is geographically compact. Our framework incorporates the dual perspective of individual airports and geopolitical regions to capture how the impact interacts with the sub-network structure.We find that real-world events have an impact signature which is qualitatively different from that of random or high-centrality attacks. Furthermore, we find that the network is more resilient to the 9/11 disaster, although it removed more airports and traffic than the volcanic ash-cloud. This is due to the network roles of Europe and North America. We discuss how regional roles influence resilience to a region's removal.

  15. HOUSEHOLD EXPENDITURE IN RESPONSE TO NATURAL DISASTERS

    Directory of Open Access Journals (Sweden)

    Eny Sulistyaningrum

    2015-09-01

    Full Text Available Natural disasters have increased in their frequency, and the intensity of their destruction over the last ten years in Indonesia. Households usually respond to these difficulties by cutting their consump-tion, especially for non-essential goods. Arguably natural disasters are exogenous events, so this paper uses the exogenous variation from natural disasters as a natural experiment design to estimate the effect of disasters on household expenditure. When a certain group is exposed to the causal variable of interest, such as a disaster, and other groups are not, the Difference In Difference model (DID can be used for estimation. Using a micro level survey data set from the Indonesian Family Life Survey (IFLS which covers approximately 83 percent of the Indonesian population within the survey area, this paper examines the effects of natural disasters on household expenditure. This paper also examines whether there are any different impacts from different types of disasters. The finding is there are no significant effects of disasters on total household expenditure for households living in disaster regions, whether they are affected directly or not by the disaster.

  16. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  17. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  18. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  19. Effects of low-level exposure to sarin and cyclosarin during the 1991 Gulf War on brain function and brain structure in US veterans.

    Science.gov (United States)

    Chao, Linda L; Rothlind, Johannes C; Cardenas, Valerie A; Meyerhoff, Dieter J; Weiner, Michael W

    2010-09-01

    Potentially more than 100,000 US troops may have been exposed to the organophosphate chemical warfare agents sarin (GB) and cyclosarin (GF) when a munitions dump at Khamisiyah, Iraq was destroyed during the Gulf War (GW) in 1991. Although little is known about the long-term neurobehavioral or neurophysiological effects of low-dose exposure to GB/GF in humans, recent studies of GW veterans from the Devens Cohort suggest decrements in certain cognitive domains and atrophy in brain white matter occur individuals with higher estimated levels of presumed GB/GF exposure. The goal of the current study is to determine the generalizability of these findings in another cohort of GW veterans with suspected GB/GF exposure. Neurobehavioral and imaging data collected in a study on Gulf War Illness between 2002 and 2007 were used in this study. We focused on the data of 40 GW-deployed veterans categorized as having been exposed to GB/GF at Khamisiyah, Iraq and 40 matched controls. Magnetic resonance images (MRI) of the brain were analyzed using automated and semi-automated image processing techniques that produced volumetric measurements of gray matter (GM), white matter (WM), cerebrospinal fluid (CSF) and hippocampus. GW veterans with suspected GB/GF exposure had reduced total GM and hippocampal volumes compared to their unexposed peers (p< or =0.01). Although there were no group differences in measures of cognitive function or total WM volume, there were significant, positive correlations between total WM volume and measures of executive function and visuospatial abilities in veterans with suspected GB/GF exposure. These findings suggest that low-level exposure to GB/GF can have deleterious effects on brain structure and brain function more than decade later. Copyright © 2010 Elsevier Inc. All rights reserved.

  20. Disaster Preparedness Among University Students in Guangzhou, China: Assessment of Status and Demand for Disaster Education.

    Science.gov (United States)

    Tan, Yibing; Liao, Xiaolan; Su, Haihao; Li, Chun; Xiang, Jiagen; Dong, Zhaoyang

    2017-06-01

    This study had 2 aims. First, we evaluated the current levels of disaster preparedness among university students in southern China. Second, we assessed students' demands for future disaster education. In addition, we examined the influence of demographic factors on current disaster preparedness status and demand. A cross-sectional design was used. The data were collected from 1893 students in 10 universities in the Guangzhou Higher Education Mega (GHEM) center. A self-administered questionnaire developed for this study was administered to assess the current status and demand for disaster education. The results are based on 1764 valid questionnaires. Among the participants, 77.8% reported having had disaster education experiences before, 85.5% indicated their desire for a systematic disaster course, and 75.4% expressed their willingness to take such a course upon its availability. The total mean score for demand for disaster course content (5-point Likert scale) was 4.17±0.84, with items relating to rescue skills given the highest scores. These results suggested that students had high desires for disaster preparedness knowledge, especially knowledge concerning rescue skills. We observed significant differences in disaster education experiences between male and female students and across programs, school years, and home locations. Furthermore, we observed significant differences in demand for disaster course content between male and female students and across universities, student programs, years of school, and students' majors. A systematic disaster course focused on rescue skills is needed by all types of universities. To improve the disaster education system in universities, disaster drills should be performed on a semester basis as a refresher and to enhance disaster preparedness. The government and universities should support building a simulated disaster rescue center and recruit faculty from the emergency department, especially those who have had disaster

  1. Optimism following a tornado disaster.

    Science.gov (United States)

    Suls, Jerry; Rose, Jason P; Windschitl, Paul D; Smith, Andrew R

    2013-05-01

    Effects of exposure to a severe weather disaster on perceived future vulnerability were assessed in college students, local residents contacted through random-digit dialing, and community residents of affected versus unaffected neighborhoods. Students and community residents reported being less vulnerable than their peers at 1 month, 6 months, and 1 year after the disaster. In Studies 1 and 2, absolute risk estimates were more optimistic with time, whereas comparative vulnerability was stable. Residents of affected neighborhoods (Study 3), surprisingly, reported less comparative vulnerability and lower "gut-level" numerical likelihood estimates at 6 months, but later their estimates resembled the unaffected residents. Likelihood estimates (10%-12%), however, exceeded the 1% risk calculated by storm experts, and gut-level versus statistical-level estimates were more optimistic. Although people believed they had approximately a 1-in-10 chance of injury from future tornadoes (i.e., an overestimate), they thought their risk was lower than peers.

  2. Natural hazard and disaster tourism

    Directory of Open Access Journals (Sweden)

    Rucińska Dorota

    2014-03-01

    Full Text Available An observed trend, which can be defined as tourist interest in natural hazards and disasters, has persuaded the authors to attempt to research several issues, including tourist motivations and specific tourism properties and functions of this form of activity. The objective also covered the allocation of this social and natural process in the general structure of tourism. This interest has a long history, and a new stage is currently forming, which partly results from factors affecting society, such as information and education, which provoke antagonistic reactions. Extreme natural phenomena entail a common reduction of tourist interest in the destination which hosted the event; however, it never drops to zero. Differences are visible depending on the type of phenomenon. On the other hand, natural hazards and disasters are considered to hold a specific tourism value. This article discusses the allocation of this human activity in the tourism forms known to scientists, accounting for its diversity and relating to ethics.

  3. Disaster Debris Recovery Database - Landfills

    Science.gov (United States)

    The US EPA Region 5 Disaster Debris Recovery Database includes public datasets of over 6,000 composting facilities, demolition contractors, transfer stations, landfills and recycling facilities for construction and demolition materials, electronics, household hazardous waste, metals, tires, and vehicles in the states of Illinois, Indiana, Iowa, Kentucky, Michigan, Minnesota, Missouri, North Dakota, Ohio, Pennsylvania, South Dakota, West Virginia and Wisconsin.In this update, facilities in the 7 states that border the EPA Region 5 states were added to assist interstate disaster debris management. Also, the datasets for composters, construction and demolition recyclers, demolition contractors, and metals recyclers were verified and source information added for each record using these sources: AGC, Biocycle, BMRA, CDRA, ISRI, NDA, USCC, FEMA Debris Removal Contractor Registry, EPA Facility Registry System, and State and local listings.

  4. Disaster Debris Recovery Database - Recovery

    Science.gov (United States)

    The US EPA Region 5 Disaster Debris Recovery Database includes public datasets of over 6,000 composting facilities, demolition contractors, transfer stations, landfills and recycling facilities for construction and demolition materials, electronics, household hazardous waste, metals, tires, and vehicles in the states of Illinois, Indiana, Iowa, Kentucky, Michigan, Minnesota, Missouri, North Dakota, Ohio, Pennsylvania, South Dakota, West Virginia and Wisconsin.In this update, facilities in the 7 states that border the EPA Region 5 states were added to assist interstate disaster debris management. Also, the datasets for composters, construction and demolition recyclers, demolition contractors, and metals recyclers were verified and source information added for each record using these sources: AGC, Biocycle, BMRA, CDRA, ISRI, NDA, USCC, FEMA Debris Removal Contractor Registry, EPA Facility Registry System, and State and local listings.

  5. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  6. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  7. 78 FR 36556 - Oklahoma; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-06-18

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42... Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to...

  8. 78 FR 45549 - Iowa; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-07-29

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42... Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and Households In Presidentially...

  9. 77 FR 73490 - Delaware; Major Disaster and Related Determinations

    Science.gov (United States)

    2012-12-10

    ... Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford Act''), as follows: I... warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance..., Disaster Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing...

  10. 78 FR 45549 - New York; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-07-29

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42... Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and Households in...

  11. 76 FR 61730 - Texas; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-10-05

    .... Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford Act''), as... disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C..., Disaster Housing Assistance to Individuals and Households in Presidentially Declared Disaster Areas; 97.049...

  12. 77 FR 20043 - Indiana; Major Disaster and Related Determinations

    Science.gov (United States)

    2012-04-03

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... and magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and... Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to...

  13. 78 FR 72918 - Nebraska; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-12-04

    ... Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford Act''), as follows: I... and magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and..., Disaster Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing...

  14. 78 FR 36557 - Iowa; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-06-18

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance....046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  15. 76 FR 44031 - Vermont; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-07-22

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq..., Disaster Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing...

  16. 78 FR 41943 - Arkansas; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-07-12

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance....046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  17. 78 FR 51202 - Minnesota; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-08-20

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency....046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  18. 76 FR 44031 - Arkansas; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-07-22

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance....046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  19. 77 FR 44648 - Florida; Major Disaster and Related Determinations

    Science.gov (United States)

    2012-07-30

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C... Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to...

  20. 76 FR 61731 - New York; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-10-05

    ... Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford Act''), as follows: I... major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42...; 97.048, Disaster Housing Assistance to Individuals and Households In Presidentially Declared Disaster...

  1. 78 FR 32415 - South Dakota; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-05-30

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance... Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to...

  2. 76 FR 34090 - Missouri; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-06-10

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance... (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  3. 76 FR 72964 - Virginia; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-11-28

    ... Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford... and magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and..., Disaster Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing...

  4. 78 FR 25462 - Oklahoma; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-05-01

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42... Grant; 97.048, Disaster Housing Assistance to Individuals and Households In Presidentially Declared...

  5. 77 FR 66859 - Florida; Major Disaster and Related Determinations

    Science.gov (United States)

    2012-11-07

    ... Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford Act''), as follows: I... disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C..., Disaster Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing...

  6. 78 FR 45547 - North Dakota; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-07-29

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42... Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to...

  7. 75 FR 45144 - Kentucky; Major Disaster and Related Determinations

    Science.gov (United States)

    2010-08-02

    ... Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford Act''), as follows: I... magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency..., Disaster Housing Assistance to Individuals and Households In Presidentially Declared Disaster Areas; 97.049...

  8. 76 FR 32984 - Arkansas; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-06-07

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency... (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  9. 76 FR 61729 - Massachusetts; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-10-05

    ... Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford... severity and magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief..., Disaster Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing...

  10. 78 FR 51203 - Iowa; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-08-20

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C... Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to...

  11. 75 FR 30419 - Kentucky; Major Disaster and Related Determinations

    Science.gov (United States)

    2010-06-01

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency....046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  12. 76 FR 33775 - Tennessee; Major Disaster and Related Determinations

    Science.gov (United States)

    2011-06-09

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... and magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief and....046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to Individuals and...

  13. 78 FR 50436 - Missouri; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-08-19

    ... President issued a major disaster declaration under the authority of the Robert T. Stafford Disaster Relief... severity and magnitude to warrant a major disaster declaration under the Robert T. Stafford Disaster Relief... Unemployment Assistance (DUA); 97.046, Fire Management Assistance Grant; 97.048, Disaster Housing Assistance to...

  14. Designing for resistance to disaster

    International Nuclear Information System (INIS)

    1970-01-01

    Tsunami is a Japanese word from a double root: tsu, meaning port or harbour, and nami, meaning wave. The word looks innocuous in simple translation, but to those who live on the rim of the Pacific it can spell disaster. The designers of nuclear installations at coastal sites, in particular, must take the possibility of occurrence of a tsunami into account in their work. (author)

  15. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  16. Differences in mental health outcomes by acculturation status following a major urban disaster.

    Science.gov (United States)

    Adams, Richard E; Boscarino, Joseph A

    2013-01-01

    A number of studies have assessed the association between acculturation and psychological outcomes following a traumatic event. Some suggest that low acculturation is associated with poorer health outcomes, while others show no differences or that low acculturation is associated with better outcomes. One year after the terrorist attacks on the World Trade Center, we surveyed a multi-ethnic population of New York City adults (N= 2,368). We assessed posttraumatic stress disorder (PTSD), major depression, panic attack, anxiety symptoms, and general physical and mental health status. We classified study respondents into "low," "moderate," or "high" acculturation, based on survey responses. Bivariate results indicated that low acculturation individuals were more likely to experience negative life events, have low social support, and less likely to have pre-disaster mental health disorders. Those in the low acculturation group were also more likely to experience post-disaster perievent panic attacks, have higher anxiety, and have poorer mental health status. However, using logistic regression to control for confounding, and adjusting for multiple comparisons, we found that none of these outcomes were associated with acculturation status. Thus, our study suggests that acculturation was not associated with mental health outcomes following a major traumatic event.

  17. The impact of disasters on small business disaster planning: a case study.

    Science.gov (United States)

    Flynn, David T

    2007-12-01

    A major flood in 1997 forced the evacuation of Grand Forks, North Dakota and caused damage of USD 1 billion. Despite this recent disaster there is only marginal evidence of an increase in disaster recovery planning by businesses that experienced the flood. This finding is consistent with the results of other business-related disaster research. Statistical tests of survey results from 2003 indicate that there is a significantly higher rate of disaster recovery planning in businesses started since the 1997 flood than in businesses started before the flood and still in business. Such an outcome indicates a need for public policy actions emphasizing the importance of disaster planning. Improved disaster planning is an aid to business recovery and the results demonstrate the need for more widespread efforts to improve disaster recovery planning on the part of smaller businesses, even in areas that have recently experienced disasters.

  18. Invasive fungal infections after natural disasters.

    Science.gov (United States)

    Benedict, Kaitlin; Park, Benjamin J

    2014-03-01

    The link between natural disasters and subsequent fungal infections in disaster-affected persons has been increasingly recognized. Fungal respiratory conditions associated with disasters include coccidioidomycosis, and fungi are among several organisms that can cause near-drowning pneumonia. Wound contamination with organic matter can lead to post-disaster skin and soft tissue fungal infections, notably mucormycosis. The role of climate change in the environmental growth, distribution, and dispersal mechanisms of pathogenic fungi is not fully understood; however, ongoing climate change could lead to increased disaster-associated fungal infections. Fungal infections are an often-overlooked clinical and public health issue, and increased awareness by health care providers, public health professionals, and community members regarding disaster-associated fungal infections is needed.

  19. Historical and projected costs of natural disasters

    Energy Technology Data Exchange (ETDEWEB)

    Engi, D.

    1995-04-01

    Natural disasters cause billions of dollars of damage and thousands Of deaths globally each year. While the magnitude is clear, the exact costs (in damage and fatalities) are difficult to clearly identify. This document reports on the results of a survey of data on the costs associated with significant natural disasters. There is an impressive amount of work and effort going into natural disaster research, mitigation, and relief. However, despite this effort, there are surprisingly few consistent and reliable data available regarding the effects of natural disasters. Even lacking consistent and complete data, it is clear that the damage and fatalities from natural disasters are increasing, both in the United States, and globally. Projections using the available data suggest that, in the United States alone, the costs of natural disasters between 1995 and 2010 will be in the range of $90 billion (94$) and 5000 lives.

  20. Natural disaster and mental health in Asia.

    Science.gov (United States)

    Kokai, Masahiro; Fujii, Senta; Shinfuku, Naotaka; Edwards, Glen

    2004-04-01

    The purpose of the present article was to review the literature on disaster mental health in relation to natural disasters such as earthquakes, volcanic eruptions, typhoons and cyclones throughout Asia. Articles reviewed show that disaster psychiatry in Asia is beginning to emerge from and leave behind the stigma attached to mental health. The emergence of the acceptance of disaster mental health throughout Asia can be attributed in part to the acceptance of the notion of post-traumatic stress disorder (PTSD). This has allowed greater involvement of mental health professionals in providing ongoing support to survivors of natural disasters as well as providing greater opportunities for further research. Also, articles reviewed in the present paper commonly suggested the need for using standardized diagnostic tools for PTSD to appropriately interpret the discrepancy of results among studies. The importance of post-disaster support services and cultural differences is highlighted.

  1. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  2. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  3. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  4. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  5. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  6. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  7. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  8. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  9. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  10. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  11. Ecosystem Approach To Flood Disaster Risk Reduction

    OpenAIRE

    RK Kamble; Abhinav Walia; MG Thakare

    2013-01-01

    India is one of the ten worst disaster prone countries of the world. The country is prone to disasters due to number of factors; both natural and anthropogenic, including adverse geo-climatic conditions, topographical features, environmental degradation, population growth, urbanisation, industrlisation, non-scientific development practices etc. The factors either in original or by accelerating the intensity and frequency of disasters are responsible for heavy toll of human lives and disruptin...

  12. Is your automated system disaster proof?

    International Nuclear Information System (INIS)

    Baird, P.W.; Priest, S.A.

    1990-01-01

    Disaster-proofing a system has four basic steps: (1) development of a disaster recovery plan; (2) creation and enforcement of procedures for developing and maintaining off-site back-ups for data, vital records, and documentation; (3) a performance test of the disaster recovery plan; and (4) the on-going maintenance of a plans currency and the periodic testing of the plant. The development of a complete disaster recovery plan has many elements: the operating environment for the system; the criteria under which an off-site recovery would be initiated; the back-up schedule and locations of all data; vital records and documentation; the steps required to recover the system; and any modifications necessitated by the off-site operating environment. Creation and enforcement of procedures for developing and maintaining current backups for all data, vital records, and documentation in a designated off-site location represent the second and most crucial step for ensuring an automated system can successfully survive a disaster. To effectively test any plan, a disaster scenario must be developed and performed by a disaster recovery team required to recover and operate the system in the off-site environment using nothing more than the disaster recovery plan and off-site information and data. Finally, the last step for ensuring that a system can survive a disaster is the maintenance of the plans currency and the continued performance of disaster recovery tests. As the environment surrounding a system changes a disaster recovery plan must be updated to reflect these changes. Equally important to the maintenance of currency is the on-going performance of disaster recovery tests on a periodic basis

  13. Gender-Sensitive Post-Disaster Assessments

    OpenAIRE

    World Bank

    2012-01-01

    This note on gender-sensitive post-disaster assessments is the eighth in a series of guidance notes on gender issues in disaster risk management (DRM) in the East Asia and the Pacific region. Targeting World Bank staff, clients and development partners, this note gives an overview of the main reasons for assessing gender impacts as part of a post-disaster needs assessment, identifies the k...

  14. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  15. Emergency Preparedness and Role Clarity among Rescue Workers during the Terror Attacks in Norway July 22, 2011.

    Directory of Open Access Journals (Sweden)

    May Janne Botha Pedersen

    Full Text Available Few studies address preparedness and role clarity in rescue workers after a disaster. On July 22, 2011, Norway was struck by two terror attacks; 77 people were killed and many injured. Healthcare providers, police officers and firefighters worked under demanding conditions. The aims of this study were to examine the level of preparedness, exposure and role clarity. In addition, the relationship between demographic variables, preparedness and exposure and a role clarity during the rescue operations and; b achieved mastering for future disaster operations.In this cross-sectional study, healthcare providers (n = 859, police officers (n = 252 and firefighters (n = 102 returned a questionnaire approximately 10 months after the terror attacks.The rescue personnel were trained and experienced, and the majority knew their professional role (healthcare providers M = 4.1 vs. police officers: M = 3.9 vs. firefighters: M = 4.2, p 5 fatalities (OR 1.6, p < .05 were all associated with role clarity, together with a feeling of control, not being obstructed in work and perceiving the rescue work as a success. Moreover, independent predictors of being more prepared for future operations were arousal during the operation (OR 2.0, p < .001 and perceiving the rescue work as a success (OR 1.5, p < .001.Most of the rescue workers were experienced and knew their professional role. Training and everyday-work-experience must be a focal point when preparing rescue workers for disaster.

  16. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  17. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  18. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  19. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  20. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  1. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  2. The role of the organisational psychologist in disasters and emergency situations.

    Science.gov (United States)

    San Juan Guillén, César

    2011-04-01

    Interventions in extreme situations, such as natural or technological disasters, terrorist attacks or emergencies in general, take place in settings of great uncertainty and are always accompanied by extraordinary circumstances. For this reason, there are various processes related to implementing intervention protocols that must be carefully examined, including an evaluation of work scenarios, personnel selection, within-group relationships in work teams, decision-making processes, or certain peculiarities of burnout among emergency personnel. In the view of this author, an ad hoc review of the role of the organisational psychologist can highlight interesting analysis and performance possibilities that could make work in emergency and disasters contexts more effective. The aim of this paper is to provide an overview of the role of the organisational psychologist pre-and post-disaster. Furthermore, it supports the idea that professional profiles must be designed that take into account specific knowledge and skills, as well as certain aptitudes and values. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  3. Emergency housing after natural disaster; Shizen saigaigo no oukyu kyoju kankyo seibi sisutemu ni kansuru kenkyu

    Energy Technology Data Exchange (ETDEWEB)

    Kobayashi, Masami [Kyoto University, Kyoto (Japan). Graduate School of Engineering

    1998-12-16

    In Japan, there were some serious disasters in recent years. In 1991, Unzen-Fugendake erupted and more than 1,000 people were forced to take refuge from their houses. In 1993, Hokkaido-Nanseioki earthquake attacked the south-east area of Hokkaido and more than 3,557 houses were destroyed. In Japan, the government supplies the temporary housing to those who lost house from the natural disasters. The purpose of supplying temporary houses mentioned in the disaster relief law (established in 1947) prescribes the purpose of temporary housing that to rescue the poor who can not afford getting a shelter with their own funds. But actual condition of temporary housing is completely different. Government supplies temporary housing to all those who request temporary housing. The term of using temporary house tend to become longer. The regulation about temporary housing has not been yet up to dated. Many problems concerning about temporary housing originate in outdated regulation. The temporary housing have to be ranked in the part of restoration process from natural disaster. (author)

  4. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  5. FEMA Individual Assistance Open Disaster Statistics

    Data.gov (United States)

    Department of Homeland Security — Individual Assistance (IA) is provided by the Federal Emergency Management Agency to individuals and families who have sustained losses due to disasters. Homeowners,...

  6. Center for Disaster & Humanitarian Assistance Medicine

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Disaster and Humanitarian Assistance Medicine (CDHAM) was formally established at the Uniformed Services University of the Health Sciences (USUHS) by...

  7. 75 FR 10330 - Nebraska Disaster #NE-00033

    Science.gov (United States)

    2010-03-05

    ..., Madison, Morrill, Nance, Nemaha, Otoe, Pawnee, Rock, Saline, Saunders, Seward, Stanton, Thayer, Thurston... Domestic Assistance Numbers 59002 and 59008) James E. Rivera, Associate Administrator for Disaster...

  8. [Common pediatric infectious diseases following natural disasters].

    Science.gov (United States)

    Yao, Kai-Hu

    2013-06-01

    Natural disasters may lead to the outbreaks of infectious diseases because they increase the risk factors for infectious diseases. This paper reviews the risk factors for infectious diseases after natural disasters, especially earthquake, and the infectious diseases following disasters reported in recent years. The infectious diseases after earthquake include diarrhea, cholera, viral hepatitis, upper respiratory tract infection, tuberculosis, measles, leptospirosis, dengue fever, tetanus, and gas gangrene, as well as some rare infections. Children are vulnerable to infectious diseases, so pediatricians should pay more attention to the research on relationship between infectious diseases and natural disasters.

  9. 77 FR 52379 - Disaster Declaration #13239 and #13240; OHIO Disaster # H-00030

    Science.gov (United States)

    2012-08-29

    ... SMALL BUSINESS ADMINISTRATION Disaster Declaration 13239 and 13240; OHIO Disaster H-00030 AGENCY... declaration of a major disaster for Public Assistance Only for the State of OHIO (FEMA-4077- DR), dated 08/20..., Perry, Pickaway, Pike, Putnam, Shelby, Van Wert, Washington. The Interest Rates are: Percent For...

  10. Towards a politics of disaster response: presidential disaster instructions in China, 1998-2012.

    Science.gov (United States)

    Tao, Peng; Chen, Chunliang

    2018-04-01

    China's disaster management system contains no law-based presidential disaster declarations; however, the national leader's instructions (pishi in Chinese) play a similar role to disaster declarations, which increase the intensity of disaster relief. This raises the question of what affects presidential disaster instructions within an authoritarian regime. This research shows that China's disaster politics depend on a crisis threshold system for operation and that the public and social features of disasters are at the core of this system. China's political cycle has no significant impact on disaster politics. A change in the emergency management system has a significant bearing on presidential disaster instructions, reflecting the strong influence of the concept of rule of law and benefiting the sustainable development of the emergency management system. In terms of disaster politics research, unlocking the black box of China's disaster politics and increasing the number of comparative political studies will benefit the development of empirical and theoretical study. © 2018 The Author(s). Disasters © Overseas Development Institute, 2018.

  11. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  12. Vulnerabilities of the security of nuclear material due to cyber attacks

    International Nuclear Information System (INIS)

    Daschil, F.

    2002-01-01

    Full text: The spread of new communication and computer technologies is now the potential for a dedicated, sophisticated adversary to conduct coordinated strikes against the computers, communications systems, and databases of nuclear material security systems. All weapons of cyber war, like viruses, Trojans, access to computer systems are potential risks for the security of nuclear material. New forms of destruction of electronic devices, e.g. Transient Electromagnetic Devices (TED), that could, in the hands of enemies, criminals, or terrorist pose a significant threat to nuclear safety infrastructure components that are based on micro-circuits and computer or micro-processor control. These examples shows the necessity to clearly identify possible risks as: information and communication based disorders and other disruptions and attacks; partial or complete failure of systems causing the risk of unexpected reaction or unmanageable situations; cracking of access codes and elimination of alarm equipment could give easy access to nuclear material; computer manipulation or complete computer and system takeover due to brute force attacks, viruses, Trojans and worms could lead to malfunctions, disruptions and nuclear disasters; computer spying and brute force attacks could give detailed information about technical, organizational and organizational data; combined actions of physical, electronic and computer attacks. The paper gives an overview of potential computer and communication safety gaps and points out strategic implications as the identification of the critical infrastructure, surveillance of computer systems, data access and communication paths. The basic necessity of the development of computer and communication breakdown backup systems as well as measures of precaution against cyber attacks is shown in the paper. (author)

  13. 75 FR 68393 - Puerto Rico Disaster # PR-00011

    Science.gov (United States)

    2010-11-05

    ... SMALL BUSINESS ADMINISTRATION [Disaster Declaration 12366 and 12367] Puerto Rico Disaster PR-00011 AGENCY: U.S. Small Business Administration. ACTION: Notice. SUMMARY: This is a notice of an Administrative declaration of a disaster [[Page 68394

  14. civil-military relations in disaster rescue and relief activities

    African Journals Online (AJOL)

    Abel

    made disaster must ... use of foreign military assets in disaster response. To balance concerns, the .... 5 In the literature, disaster response pertains to actions undertaken during emergency ... These changes also reflected the underlying shift in the.

  15. 78 FR 72919 - Illinois; Major Disaster and Related Determinations

    Science.gov (United States)

    2013-12-04

    ... Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121 et seq. (the ``Stafford Act''), as follows: I... a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance... Assistance Grant; [[Page 72920

  16. Helping Children with Disabilities Cope with Disaster and Traumatic Events

    Science.gov (United States)

    ... Events General Information Caring for Children in a Disaster This web site from CDC has information for families, schools, and healthcare providers during and after crises and disasters. Children and Youth—SAMHSA Disaster Behavioral Health Information ...

  17. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  18. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  19. Land Use Planning and Disaster: A European Perspective From Spain

    Directory of Open Access Journals (Sweden)

    Juli Ponce

    2013-04-01

    Full Text Available The study deals with the role of EU and EU Member States in relation to disasters and land use planning. It considers how land use planning can evaluate and manage risks to avoid disasters, paying special attention to the European use of precautionary principle, sometimes explained with the sentence “Better safe than Sorry”. The analysis uses especially, but not only, the example of the Spanish legal system taking into account its inclusion in the more general EU legal system. The study also considers public responsibility in preventing disasters and possible consequences of maladministration when taking planning decisions, using real Spanish cases. Finally, the article explores the possibilities of planning as a tool to prevent disasters in relation to two specific areas: location of nuclear plants and new developments regarding the prevention of crime and terrorist attacks by means of urban planning (the so called Crime Prevention Through Environmental Design. El estudio analiza el papel de la Unión Europea (UE y los Estados miembros de la UE en relación con los desastres y la planificación del uso del suelo. Se describe cómo la planificación del uso del suelo puede evaluar y gestionar los riesgos para evitar desastres, prestando especial atención al uso europeo del principio de precaución, a veces resumido en la frase “Más vale prevenir que curar”. El análisis utiliza especialmente, pero no sólo, el ejemplo del sistema jurídico español, teniendo en cuenta su inclusión en el sistema legal general de la UE. El estudio también tiene en cuenta la responsabilidad pública en la prevención de desastres y las posibles consecuencias de la mala administración cuando se toman decisiones de planificación, a través de casos reales españolas. Por último, el artículo explora las posibilidades de la planificación como una herramienta para prevenir desastres en relación a dos áreas específicas: la ubicación de centrales

  20. Health after disaster: A perspective of psychological/health reactions to disaster

    Directory of Open Access Journals (Sweden)

    Ursula Martin

    2015-12-01

    Full Text Available Superstorm Sandy, which affected millions of people in 2012, was a disaster in structural, financial, medical, and emotional terms. Many survivors experienced post-storm health psychology impacts. Depression levels increased by 25%, and physician visits were elevated by a significant amount. Clearly, large-scale disasters have a profound effect on the physical and emotional health of survivors. Understanding these effects can improve future disaster relief programs and policies. Exploration of post-disaster issues can inform government entities and non-government organizations to assist communities and individuals left in the aftermath of natural disasters.

  1. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  2. Smart disaster mitigation in Thailand

    Science.gov (United States)

    Aimmanee, S.; Ekkawatpanit, C.; Asanuma, H.

    2016-04-01

    Thailand is notoriously exposed to several natural disasters, from heavy thunder storms to earthquakes and tsunamis, since it is located in the tropical area and has tectonic cracks underneath the ground. Besides these hazards flooding, despite being less severe, occurs frequently, stays longer than the other disasters, and affects a large part of the national territory. Recently in 2011 have also been recorded the devastating effects of major flooding causing the economic damages and losses around 50 billion dollars. Since Thailand is particularly exposed to such hazards, research institutions are involved in campaigns about monitoring, prevention and mitigation of the effects of such phenomena, with the aim to secure and protect human lives, and secondly, the remarkable cultural heritage. The present paper will first make a brief excursus on the main Thailand projects aimed at the mitigation of natural disasters, referring to projects of national and international relevance, being implemented, such as the ESCAP1999 (flow regime regulation and water conservation). Adaptable devices such as foldable flood barriers and hydrodynamically supported temporary banks have been utilized when flooding. In the second part of the paper, will be described some new ideas concerning the use of smart and biomimicking column structures capable of high-velocity water interception and velocity detection in the case of tsunami. The pole configuration is composite cylindrical shell structure embedded with piezoceramic sensor. The vortex shedding of the flow around the pole induces the vibration and periodically strains the piezoelectric element, which in turn generates the electrical sensorial signal. The internal space of the shell is filled with elastic foam to enhance the load carrying capability due to hydrodynamic application. This more rigid outer shell inserted with soft core material resemble lotus stem in nature in order to prolong local buckling and ovalization of column

  3. Disaster medicine: the caring contradiction.

    Science.gov (United States)

    Crippen, David; Krin, Charles; Lorich, Dean; Mattox, Ken

    2010-01-01

    The nature of mankind is a concern for those in need. Disasters, both natural and manmade, have been with us since the beginning of recorded history but media coverage of them is a relatively new phenomenon. When these factors come together, there is great potential to both identify and serve the sick and injured. However, the mass media by its nature tends to enhance the humanistic aspect of rescue while minimizing the practical problems involved. We describe a recent scenario in Haiti that puts some of these complications into a practical perspective.

  4. Emergency and Disaster Information Service

    Science.gov (United States)

    Boszormenyi, Zsolt

    2010-05-01

    The Hungarian National Association of Radio Distress-Signalling and Infocommunications (RSOE) operates Emergency and Disaster Information Service (EDIS) within the frame of its own website which has the objective to monitor and document all the events on the Earth which may cause disaster or emergency. Our service is using the speed and the data spectrum of the internet to gather information. We are monitoring and processing several foreign organisation's data to get quick and certified information. The EDIS website operated together by the General-Directorate of National Disaster Management (OKF) and RSOE, in co-operation with the Crisis Management Centre of the Ministry of Foreign Affairs, provides useful information regarding emergency situations and their prevention. Extraordinary events happening in Hungary, Europe and other areas of the World are being monitored in 24 hours per day. All events processed by RSOE EDIS are displayed real time - for the sake of international compatibility - according to the CAP protocol on a secure website. To ensure clear transparency all events are categorized separately in the RSS directory (e.g. earthquake, fire, flood, landslide, nuclear event, tornado, vulcano). RSOE EDIS also contributes in dissemination of the CAP protocol in Hungary. Beside the official information, with the help of special programs nearly 900-1000 internet press publication will be monitored and the publication containing predefined keywords will be processed. However, these "news" cannot be considered as official and reliable information, but many times we have learnt critical information from the internet press. We are screening the incoming information and storing in a central database sorted by category. After processing the information we are sending it immediately via E-Mail (or other format) for the organisations and persons who have requested it (e.g. National Disaster Management, United Nations etc.). We are aspiring that the processed data

  5. Appropriate Natural Disaster Handling Policy To Guarantee Effectiveness Of Post-Disaster Assistance

    Directory of Open Access Journals (Sweden)

    Widyawati Boediningsih

    2017-09-01

    Full Text Available Indonesia is a very rich country fascinating the beauty of the panoramic so attract much foreign tourists to come and see its beauty. Furthermore Indonesia is a country that often experience natural disasters ranging from floods mount erupted until to Tsunami Indonesia Located in a geographical location that is prone to disaster. Disasters can be caused by both natural and behavioral factors that are not responsible for utilizing and managing natural resources and the environment. In some areas of Indonesia disasters examples that hit the country. So far there are available disaster management regulation tools namely Law Number 24 Year 2007 which provides disaster management framework Pre-disaster comprehend emergency response and post-disaster. Although the law has outlined comprehensive disaster management provisions so far is still focused on the emergency response period. Further actions such as mitigation rehabilitation and reconstruction appear not to be a top priority of disaster management activities. Other issues that are still scattered are coordination rescue aid appropriateness of assistance and distribution spread evenly. Institutional On the mandate of Law 242007 also institutional had been formed National Disaster Management Agency BNPB at the local level throughout and Indonesia.BNPB also set up a technically existing technical unit UPTD of 12 units. A BNPB Institution supported by trained human resources HR trained to be deployed to even the most difficult terrain.

  6. How assessment and evaluation is interlinked with disaster governance? A case of the Tohoku Disaster

    International Nuclear Information System (INIS)

    Shimizu, Mika

    2014-01-01

    The linkage of governance, disaster management and policy are not well established both in terms of conceptual basis and practices and require more in-depth analysis for better disaster management and governance (disaster governance). The weak linkage may prevent effective disaster management. The 2011 Tohoku Disaster posed many governance-related challenges, including processes or institutions of disaster management or decision-making. Especially, the analysis of the challenges turns out that many of core problems are interlinked with assessment and evaluation. The research problems the paper addresses are two-fold given the existing studies and practices: First, there is few conceptual foundation for linking disaster management and governance especially in light of assessment and evaluation. Second, while assessment or evaluation lends to be taken for panted at practices, few analytical research or discussions exist about how it is interlinked with disaster governance. This paper aims at filling in the above gap and attempts to elucidate analytically the linkage of assessment and evaluation with disaster governance through a case of the 2011 Tohoku Disaster in Japan for better disaster governance and actionable policies. (author)

  7. Effects of low-level sarin and cyclosarin exposure and Gulf War Illness on brain structure and function: a study at 4T.

    Science.gov (United States)

    Chao, Linda L; Abadjian, Linda; Hlavin, Jennifer; Meyerhoff, Deiter J; Weiner, Michael W

    2011-12-01

    More than 100,000 US troops were potentially exposed to chemical warfare agents sarin (GB) and cyclosarin (GF) when an ammunition dump at Khamisiyah, Iraq was destroyed during the 1991 Persian Gulf War (GW). We previously found reduced total gray matter (GM) volume in 40 GW veterans with suspected GB/GF exposure relative to 40 matched, unexposed GW veterans on a 1.5T MR scanner. In this study, we reexamine the relationship between GB/GF exposure and volumetric measurements of gross neuroanatomical structures in a different cohort of GW veterans on a 4T MR scanner. Neuropsychological and magnetic resonance imaging (MRI) data from a cross sectional study on Gulf War Illness performed between 2005 and 2010 were used in this study. 4T MRI data were analyzed using automated image processing techniques that produced volumetric measurements of gray matter (GM), white matter (WM) and cerebrospinal fluid (CSF). Binary comparisons of 64 GB/GF exposed veterans and 64 'matched', unexposed veterans revealed reduced GM (p=0.03) and WM (p=0.03) volumes in the exposed veterans. Behaviorally, exposed veterans committed more errors of omission (p=0.02) and tended to have slower responses (p=0.05) than unexposed veterans on the Continuous Performance Test (CPT), a measure sustained and selective attention. Regression analyses confirmed that GB/GF exposure status predicted GM (β=-0.11, p=0.02) and WM (β=-0.14, p=0.03) volumes, and number of CPT omission errors (β=0.22, p=0.02) over and above potentially confounding demographic, clinical, and psychosocial variables. There was no dose-response relationship between estimated levels of GB/GF exposure and brain volume. However, we did find an effect of Gulf War Illness/Chronic Multisymptom Illness on both GM and WM volume in the GB/GF exposed veterans. These findings confirm previous reports by our group and others of central nervous system pathology in GW veterans with suspected exposure to low levels of GB/GF two decades after the

  8. Bridging international relations and disaster studies: the case of disaster-conflict scholarship.

    Science.gov (United States)

    Hollis, Simon

    2018-01-01

    International relations and disaster studies have much to gain by thinking critically about their respective theoretical and epistemological assumptions. Yet, few studies to date have sought to assess the potential value of linking these two disciplines. This paper begins to address this shortfall by examining the relationship between disasters and conflict as a research sphere that intersects international relations and disaster studies. Through an analysis of whether or not disasters contribute to intra-national and international conflict, this paper not only provides a review of the state of the art, but also serves to invite scholars to reflect on related concepts from other fields to strengthen their own approaches to the study of disasters in an international setting. An evaluation of the conceptual and theoretical contributions of each subject area provides useful heuristics for the development of disaster-conflict scholarship and encourages alternative modes of knowledge production through interdisciplinarity. © 2018 The Author(s). Disasters © Overseas Development Institute, 2018.

  9. Disaster Reintegration Model: A Qualitative Analysis on Developing Korean Disaster Mental Health Support Model

    Directory of Open Access Journals (Sweden)

    Yun-Jung Choi

    2018-02-01

    Full Text Available This study sought to describe the mental health problems experienced by Korean disaster survivors, using a qualitative research method to provide empirical resources for effective disaster mental health support in Korea. Participants were 16 adults or elderly adults who experienced one or more disasters at least 12 months ago recruited via theoretical sampling. Participants underwent in-depth individual interviews on their disaster experiences, which were recorded and transcribed for qualitative analysis, which followed Strauss and Corbin’s (1998 Grounded theory. After open coding, participants’ experiences were categorized into 130 codes, 43 sub-categories and 17 categories. The categories were further analyzed in a paradigm model, conditional model and the Disaster Reintegration Model, which proposed potentially effective mental health recovery strategies for disaster survivors, health providers and administrators. To provide effective assistance for mental health recovery of disaster survivors, both personal and public resilience should be promoted while considering both cultural and spiritual elements.

  10. Disaster waste management: a review article.

    Science.gov (United States)

    Brown, Charlotte; Milke, Mark; Seville, Erica

    2011-06-01

    Depending on their nature and severity, disasters can create large volumes of debris and waste. The waste can overwhelm existing solid waste management facilities and impact on other emergency response and recovery activities. If poorly managed, the waste can have significant environmental and public health impacts and can affect the overall recovery process. This paper presents a system overview of disaster waste management based on existing literature. The main literature available to date comprises disaster waste management plans or guidelines and isolated case studies. There is ample discussion on technical management options such as temporary storage sites, recycling, disposal, etc.; however, there is little or no guidance on how these various management options are selected post-disaster. The literature does not specifically address the impact or appropriateness of existing legislation, organisational structures and funding mechanisms on disaster waste management programmes, nor does it satisfactorily cover the social impact of disaster waste management programmes. It is envisaged that the discussion presented in this paper, and the literature gaps identified, will form a basis for future comprehensive and cohesive research on disaster waste management. In turn, research will lead to better preparedness and response to disaster waste management problems. Copyright © 2011 Elsevier Ltd. All rights reserved.

  11. Plastic Surgery Response in Natural Disasters.

    Science.gov (United States)

    Chung, Susan; Zimmerman, Amanda; Gaviria, Andres; Dayicioglu, Deniz

    2015-06-01

    Disasters cause untold damage and are often unpredictable; however, with proper preparation, these events can be better managed. The initial response has the greatest impact on the overall success of the relief effort. A well-trained multidisciplinary network of providers is necessary to ensure coordinated care for the victims of these mass casualty disasters. As members of this network of providers, plastic surgeons have the ability to efficiently address injuries sustained in mass casualty disasters and are a valuable member of the relief effort. The skill set of plastic surgeons includes techniques that can address injuries sustained in large-scale emergencies, such as the management of soft-tissue injury, tissue viability, facial fractures, and extremity salvage. An approach to disaster relief, the types of disasters encountered, the management of injuries related to mass casualty disasters, the role of plastic surgeons in the relief effort, and resource management are discussed. In order to improve preparedness in future mass casualty disasters, plastic surgeons should receive training during residency regarding the utilization of plastic surgery knowledge in the disaster setting.

  12. Records and Information Disaster Preparedness in Selected ...

    African Journals Online (AJOL)

    This study looked at the availability of rules and regulations governing access to and use of records; threats to records management; disaster response plan; extent to which organizations are committed in four major stages of disaster management in organizations in Uganda. In gathering the data, structured questionnaire ...

  13. Mental and social health in disasters

    DEFF Research Database (Denmark)

    Henderson, Silja; Elsass, Peter; Berliner, Peter

    2016-01-01

    The article presents a study of important themes in relation to the Sphere standards of psycho-social interventions in disasters.......The article presents a study of important themes in relation to the Sphere standards of psycho-social interventions in disasters....

  14. Challenges of communication system during emergency disaster ...

    African Journals Online (AJOL)

    pc

    2017-10-05

    Oct 5, 2017 ... 3.2.3.Satellite-Based Communication. Satellite-based communication is another alternative for communication in the event of disaster. Japan, United States of America and Russia are the countries that have utilised the system to disseminate emergency messages during previous disasters. Satellite-based.

  15. Imagery for Disaster Response and Recovery

    Science.gov (United States)

    Bethel, G. R.

    2011-12-01

    Exposing the remotely sensed imagery for disaster response and recovery can provide the basis for an unbiased understanding of current conditions. Having created consolidated remotely sensed and geospatial data sources documents for US and Foreign disasters over the past six years, availability and usability are continuing to evolve. By documenting all existing sources of imagery and value added products, the disaster response and recovery community can develop actionable information. The past two years have provided unique situations to use imagery including a major humanitarian disaster and response effort in Haiti, a major environmental disaster in the Gulf of Mexico, a killer tornado in Joplin Missouri and long-term flooding in the Midwest. Each disaster presents different challenges and requires different spatial resolutions, spectral properties and/or multi-temporal collections. The community of data providers continues to expand with organized actives such as the International Charter for Space and Major Disasters and acquisitions by the private sector for the public good rather than for profit. However, data licensing, the lack of cross-calibration and inconsistent georeferencing hinder optimal use. Recent pre-event imagery is a critial component to any disaster response.

  16. New Map Symbol System for Disaster Management

    Science.gov (United States)

    Marinova, Silvia T.

    2018-05-01

    In the last 10 years Bulgaria was frequently affected by natural and man-made disasters that caused considerable losses. According to the Bulgarian Disaster Management Act (2006) disaster management should be planned at local, regional and national level. Disaster protection is based on plans that include maps such as hazard maps, maps for protection, maps for evacuation planning, etc. Decision-making and cooperation between two or more neighboring municipalities or regions in crisis situation are still rendered difficult because the maps included in the plans differ in scale, colors, map symbols and cartographic design. To improve decision-making process in case of emergency and to reduce the number of human loss and property damages disaster management plans at local and regional level should be supported by detailed thematic maps created in accordance with uniform contents, map symbol system and design. The paper proposes a new symbol system for disaster management that includes a four level hierarchical classification of objects and phenomena according to their type and origin. All objects and phenomena of this classification are divided into five categories: disasters; infrastructure; protection services and infrastructure for protection; affected people and affected infrastructure; operational sites and activities. The symbols of these categories are shown with different background colors and shapes so that they are identifiable. All the symbols have simple but associative design. The new symbol system is used in the design of a series of maps for disaster management at local and regional level.

  17. Monitoring and prediction of natural disasters

    International Nuclear Information System (INIS)

    Kondratyev, K. Ya; Krapivin, V. F.

    2004-01-01

    The problems of natural disaster predicting and accomplishing a synthesis of environmental monitoring systems to collect, store, and process relevant information for their solution are analysed. A three-level methodology is proposed for making decisions concerning the natural disaster dynamics. The methodology is based on the assessment of environmental indicators and the use of numerical models of the environment

  18. Disaster waste management: A review article

    International Nuclear Information System (INIS)

    Brown, Charlotte; Milke, Mark; Seville, Erica

    2011-01-01

    Depending on their nature and severity, disasters can create large volumes of debris and waste. The waste can overwhelm existing solid waste management facilities and impact on other emergency response and recovery activities. If poorly managed, the waste can have significant environmental and public health impacts and can affect the overall recovery process. This paper presents a system overview of disaster waste management based on existing literature. The main literature available to date comprises disaster waste management plans or guidelines and isolated case studies. There is ample discussion on technical management options such as temporary storage sites, recycling, disposal, etc.; however, there is little or no guidance on how these various management options are selected post-disaster. The literature does not specifically address the impact or appropriateness of existing legislation, organisational structures and funding mechanisms on disaster waste management programmes, nor does it satisfactorily cover the social impact of disaster waste management programmes. It is envisaged that the discussion presented in this paper, and the literature gaps identified, will form a basis for future comprehensive and cohesive research on disaster waste management. In turn, research will lead to better preparedness and response to disaster waste management problems.

  19. Managing Post-Disaster Needs Assessments (PDNA)

    OpenAIRE

    Jones, Brett

    2010-01-01

    This knowledge note provides an overview of the post-disaster assessment process, extracting lessons learned in the East Asia Pacific Region (EAP) and presenting best practices from recent assessments. The note explains the Post-Disaster Needs Assessment (PDNA) methodology, and outlines: (i) the assessment triggers, (ii) key steps in assessment planning, and (iii) dos and don'ts in assessm...

  20. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  1. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. The NASA Applied Science Program Disasters Area: Disaster Applications Research and Response

    Science.gov (United States)

    Murray, J. J.; Lindsay, F. E.; Stough, T.; Jones, C. E.

    2014-12-01

    The goal of the Natural Disaster Application Area is to use NASA's capabilities in spaceborne, airborne, surface observations, higher-level derived data products, and modeling and data analysis to improve natural disaster forecasting, mitigation, and response. The Natural Disaster Application Area applies its remote sensing observations, modeling and analysis capabilities to provide hazard and disaster information where and when it is needed. Our application research activities specifically contribute to 1) Understanding the natural processes that produce hazards, 2)Developing hazard mitigation technologies, and 3)Recognizing vulnerability of interdependent critical infrastructure. The Natural Disasters Application area selects research projects through a rigorous, impartial peer-review process that address a broad spectrum of disasters which afflict populations within the United States, regionally and globally. Currently there are 19 active projects in the research portfolio which address the detection, characterization, forecasting and response to a broad range of natural disasters including earthquakes, tsunamis, volcanic eruptions and ash dispersion, wildfires, hurricanes, floods, tornado damage assessment, oil spills and disaster data mining. The Disasters team works with federal agencies to aid the government in meeting the challenges associated with natural disaster response and to transfer technologies to agencies as they become operational. Internationally, the Disasters Area also supports the Committee on Earth Observations Working Group on Disasters, and the International Charter on Space and Disasters to increase, strengthen, and coordinate contributions of NASA Earth-observing satellites and applications products to disaster risk management. The CEOS group will lead pilot efforts focused on identifying key systems to support flooding, earthquake, and volcanic events.

  4. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  5. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  6. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  7. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  8. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  9. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  10. Cyber Surveillance for Flood Disasters

    Directory of Open Access Journals (Sweden)

    Shi-Wei Lo

    2015-01-01

    Full Text Available Regional heavy rainfall is usually caused by the influence of extreme weather conditions. Instant heavy rainfall often results in the flooding of rivers and the neighboring low-lying areas, which is responsible for a large number of casualties and considerable property loss. The existing precipitation forecast systems mostly focus on the analysis and forecast of large-scale areas but do not provide precise instant automatic monitoring and alert feedback for individual river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image processing methods, in order to obtain instant flooding and waterlogging event feedback. The intrusion detection mode of these surveillance systems is used in this study, wherein a flood is considered a possible invasion object. Through the detection and verification of flood objects, automatic flood risk-level monitoring of specific individual river segments, as well as the automatic urban inundation detection, has become possible. The proposed method can better meet the practical needs of disaster prevention than the method of large-area forecasting. It also has several other advantages, such as flexibility in location selection, no requirement of a standard water-level ruler, and a relatively large field of view, when compared with the traditional water-level measurements using video screens. The results can offer prompt reference for appropriate disaster warning actions in small areas, making them more accurate and effective.

  11. Disaster and hazard prevention research

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Bok Youn; Kang, Chang Hee; Jo, Young Do; Lim, Sang Taek [Korea Institute of Geology Mining and Materials, Taejon (Korea, Republic of)

    1996-12-01

    It is third project year on `Application of mobile diesel equipment in underground mines` for providing appropriate measures to improve underground working environment contaminated by the diesel exhaust pollutants. The result of disaster and hazard prevention research is as follows ; 1) There are three categories of possible disaster of hazard in workings where diesel equipment are operating : a) exhausting pollutants, b) mine fire, c) other causes. 2) Workings employing diesel equipment should be properly ventilated all the time to maintain the gas concentration bellow the permissible level. 3) Major cause of fire is known as the high engine temperature by heavy duty and rupture of hydraulic hoses or fuel pipes and fuel spillage. So, sound engine maintenance and workers` train is essential matter to prevent fire outbreak. 4) By simulating the expected mine fire, The proper measures can be provided in actual fire. 5) Fuel and other are recommended to be stored at surface and, when the storage installed in underground, all the safety regulation should be kept strictly. (author). 6 tabs., 3 figs.

  12. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  13. Satellite Application for Disaster Management Information Systems

    Science.gov (United States)

    Okpanachi, George

    Abstract Satellites are becoming increasingly vital to modern day disaster management activities. Earth observation (EO) satellites provide images at various wavelengths that assist rapid-mapping in all phases of the disaster management cycle: mitigation of potential risks in a given area, preparedness for eventual disasters, immediate response to a disaster event, and the recovery/reconstruction efforts follo wing it. Global navigation satellite systems (GNSS) such as the Global Positioning System (GPS) assist all the phases by providing precise location and navigation data, helping manage land and infrastructures, and aiding rescue crews coordinate their search efforts. Effective disaster management is a complex problem, because it involves many parameters, which are usually not easy to measure and even identify: Analysis of current situation, planning, optimum resource management, coordination, controlling and monitoring current activities and making quick and correct decisions are only some of these parameters, whose complete list is very long. Disaster management information systems (DMIS) assist disaster management to analyse the situation better, make decisions and suggest further actions following the emergency plans. This requires not only fast and thorough processing and optimization abilities, but also real-time data provided to the DMIS. The need of DMIS for disaster’s real-time data can be satisfied by small satellites data utilization. Small satellites can provide up-to-data, plus a better media to transfer data. This paper suggests a rationale and a framework for utilization of small Satellite data by DMIS. DMIS should be used ‘’before’’, ‘’during’’ and ‘’after’’ the disasters. Data provided by the Small Satellites are almost crucial in any period of the disasters, because early warning can save lives, and satellite data may help to identify disasters before they occur. The paper also presents’ ‘when’’,

  14. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  15. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  16. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  17. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  18. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  19. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  20. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)