WorldWideScience

Sample records for security force personnel

  1. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  2. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  3. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  4. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  5. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  6. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  7. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  8. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  9. Investigation of Shift Work Disorders among Security Personnel

    OpenAIRE

    Zahra Zamanian; Mansooreh Dehghani; Heidar Mohammady; Mohammadtaghi Rezaeiani; Hadi Daneshmandi

    2012-01-01

    In today’s advanced world resulting from the improvement of technology, societies tend to encounter a large number of problems and accidents. As we know, university’s security personnel are classified as shift workers and are exposed to health disturbing factors. The aim of this study was investigation of shiftwork disorders among security personnel of the hospitals Affiliated to Shiraz University of Medical Sciences, Central. This case-control study was conducted among 130 security personnel...

  10. Basic legal provisions concerning the activities of industrial security personnel

    International Nuclear Information System (INIS)

    Eberstein, H.H.

    1980-01-01

    The author confines himself to sabotage and espionage. Necessary counter-measures are determined by the respective type of activities. Sect. 618 of the German Civil Code and Sect. 120 a of the Industrial Code give basic legal provisions for the protection of industrial personnel. The legal position held by owner or occupant forms the legal basis for 'vulnerable point protection'. The owner's rights are assigned to the industrial police and are exercised in correspondence with the service or employment contract set up according to Sect. 611 and the following sections of the German Civil Code. Outside guards work according to the performance contract given int the Sections 675, 611, 631 of the German Civil Code. The security personnel has the common right of self-help: self-defence, civil rights concerning the state of national emergency and self-defence under criminal law, rights derived from ownership and property. The author critically argues views held by Mr. Hoffmann-Riem who thinks that police powers have been assigned to private persons. He definitely answers in the negative to the execution of, or encroachment on, sovereign (police) powers by industrial security personnel. A special legal regulation is not necessary, since private protection in form of professional selfdefence is admissible under the law in force. (HSCH) [de

  11. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  12. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  13. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  14. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  15. Analysis of Specific Features of International Standards of Personnel Security of an Enterprise

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P.

    2014-03-01

    Full Text Available The article marks out components of personnel security of an enterprise, outlines processes of personnel management, which correspond with conditions of security of life and labour, competent, socially protected professional activity, availability of the acting system of motivation and stimulation, and possibilities for corporate conflicts resolution. The article presents basic standards, rules and legislative acts that regulate ensuring personnel security. It analyses specific features of application of standards with respect to: life security and labour protection culture at an enterprise, including managerial systems and practice, behaviour of personnel at working places and also intellectual component of personnel security, which envisages that personnel has knowledge and competences that assist in achievement of strategic goals of an enterprise.

  16. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  17. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  18. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  19. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  20. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  1. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources , and...national security clearance? What type of clearances do people typically have (e.g., Secret, Top Secret, TS/SCI, SAP , etc.)? (2) Does [the

  2. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  3. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    Science.gov (United States)

    2013-11-12

    to capture and transmit fingerprints . • Accurate Biometrics , a commercial Livescan fingerprinting provider, also received fingerprints electronically...FOUO). Monterey, CA: Defense Personnel Security Research Center. Herbig, K. L. (2008). Changes in espionage by American citizens , 1947-2007. (Tech...by American citizens , 1947-2001. (Tech. Rep. 02-05). Monterey, CA: Defense Personnel Security Research Center. Heuer, Jr., R. J., Crawford, K. S

  4. Lack of skilled personnel as threat to HR security of industrial enterprises

    Directory of Open Access Journals (Sweden)

    Ozernikova Tatiana

    2017-01-01

    Full Text Available The article assesses the needs of Russian industrial enterprises for skilled labor. The authors consider deficiency in qualified personnel as a threat to the human resources security of industrial enterprises, and analyze its causes. The study includes the criteria to distinguish highly skilled employees in the labor force (education level, occupation, correspondence of performed work to education, and analysis of the dynamics of their number. It identifies the internal and external factors that have a significant influence on the number of qualified personnel. The external factors include the size of the salary, population growth due to migration, the regional level of the socio-economic development. The applied methods of analysis are single-factor analysis of variance (F-test, multiple regression and descriptive statistics. The analysis is based on the materials of the Russian Federal State Statistics Service, as well as on the Russian Longitudinal Monitoring Survey - Higher School of Economics.

  5. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.

    Science.gov (United States)

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.

  6. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  7. Assessing Psycho-Social Resilience in Diplomatic, Civilian & Military Personnel Serving in a High-Threat Security Environment during Counter-Insurgency and Counter-Terrorism Operations in Iraq

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2012-08-01

    Full Text Available Currently thousands of military, diplomatic and civilian personnel are deployed under NATO, UN, and other multi-national, as well as national auspices in high-threat security environments, including active conflict zones such as Iraq and Afghanistan.  Soldiers are generally well trained and prepared psychologically to face armed conflict. Civilian contractors and diplomats, on the other hand, often are not.  Moreover in today’s high-threat security environments terrorists, insurgents and even child soldiers may be the opposing force, creating a more uncertain and anxiety provoking environment and more difficult to identify security threat. These facts have serious implications for the psycho-social resilience of diplomatic, civilian and military personnel deployed in such environments.  This article investigates psycho-social resilience in a small exploratory sample of US embassy staff, contractors and US forces serving in Iraq during 2007, a time when Improvised Explosive Devices (IEDs, roadside bombings, mortar attacks, kidnappings, murders and sniper fire were an everyday occurrence in Iraq.

  8. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  9. Health consequences of shift-work: the case of iranian hospital security personnel.

    Science.gov (United States)

    Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes

    2015-01-01

    Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.

  10. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  11. 32 CFR 632.4 - Deadly force.

    Science.gov (United States)

    2010-07-01

    ..., is substantially important to national security. (See paragraph (b) of this section.) (iii) Escape of... security or an essential national defense mission. (2) Substantially important to national security based... INVESTIGATIONS USE OF FORCE BY PERSONNEL ENGAGED IN LAW ENFORCEMENT AND SECURITY DUTIES § 632.4 Deadly force. (a...

  12. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  13. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  14. OPTIMIZATION OF FINANCIAL PERSONNEL NUMBER IN ARMED FORCES OF THE REPUBLIC OF BELARUS

    Directory of Open Access Journals (Sweden)

    A. V. Bolshakova

    2014-01-01

    Full Text Available The paper considers a problem pertaining to reduction of the Armed Forces of the Republic of Belarus and necessity to carry out economically reasonable reforms optimizing strength of financial personnel with the purpose to decrease its number but without undermining financial and operational activities of the Armed Forces as a whole. It has been proposed to optimize strength of financial personnel in the Armed Forces while executing organizational staff transformations such as introduction of a centralized accounting system for service personnel by an example of the Ministry of Defense of the Russian Federation.Normative for financial personnel strength of the supposed unified financial centre which is involved in accounting recordings on salary and other payments has been calculated on the basis of inter-branch standards. While taking as an example a conventional organization “B” with staff strength which is equal to the strength of the Armed Forces of the Republic of Belarus the possible efficiency in introduction of the centralized accounting system for service personnel has been determined in the paper. According to represented calculations reduction of financial personnel dealing with accounting recordings on salary and other payments in the whole organization “B” can constitute up to 60 persons with more than 200 branches which are carrying out independent payment accounting for personnel concerned.Dependence of strength normative on number of financial bodies, percentage of personnel receiving payments through a unified financial centre and concentration of financial and economic document circulation has been determined in the paper. It has been pointed out that it is not sufficient to determine quantitative indices in order to ensure an objective reflection of the efficiency of possible introduction of the centralized accounting system for service personnel in the Armed Forces. In order to obtain complete information it is

  15. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  16. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  17. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  18. Families of returned defence force personnel: a changing landscape of challenges.

    Science.gov (United States)

    Berle, David; Steel, Zachary

    2015-08-01

    This paper aims to identify the key challenges experienced by the families of defence force personnel following deployment. We undertook a selective review of four post-deployment challenges to the families of defence force personnel: (1) changes to relationships; (2) changes to family member roles and responsibilities; (3) adjustment of children and parenting challenges; and (4) anger, family conflict and violence. Emerging issues in the area of post-deployment adjustment are also discussed. Empirical studies of post-deployment family adjustment are lacking. Each of the reviewed challenges can contribute to psychological difficulties and precipitate contact with mental health services. The challenges faced by defence force personnel when returning from deployment arise within a family context. Clinicians should thoroughly assess these factors in families following deployment, but also recognise family strengths and resilience to these challenges. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  19. 28 CFR 16.132 - Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records...

    Science.gov (United States)

    2010-07-01

    ... System—Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ-006. 16.132...

  20. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  1. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  2. Results of nuclear security culture survey on personnel at nuclear power plants

    International Nuclear Information System (INIS)

    Yoo, Hosik; Lee, Jeong-Ho

    2015-01-01

    Highlights: • A new surveying questionnaire for evaluating the security awareness of personnel was developed. • The developed surveying tools consist of four categories and 44 questions in total. • The surveying tools developed in this study can be used in other countries. - Abstract: A survey to evaluate awareness of the nuclear security culture of personnel at nuclear facilities was developed. The survey was made up of a series of questionnaires that were divided into four categories, beliefs and attitude, operating systems, leadership behaviors and staff behaviors. Each category contained six to 16 questions. The category on beliefs and attitude was composed of questions that asked plant workers on how much consideration facility personnel give to issues of security when doing his/her work. The section pertaining to operating systems for nuclear security consisted of questions on guidance documents, information security, and education and training. The questions on leadership behaviors were separated into two parts, one for managers and another for staff. These include questions relating to communication between management and staff, surveillance work related to nuclear security and the sharing of information. The last category of questions concerned staff behaviors. It consisted of questions on knowledge, procedures and implementation related to nuclear security. A survey was conducted on 858 people who worked at nuclear power plants using the questionnaire that was developed in this study. The survey was performed between October 7 to 17, 2014. The survey results were collected and analyzed. A numerical value was given to each question, so that the results of the survey were represented as a score. The data revealed that awareness of the nuclear security culture increased with age. This increase stopped when staff members entered their 50s. It is believed that a person in his/her 50s has a greater degree of experience and passion for their work than

  3. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  4. 14 CFR 1203b.106 - Use of deadly force.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Use of deadly force. 1203b.106 Section... AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.106 Use of deadly force. Deadly force shall be used only in those circumstances where the security force officer reasonably believes that...

  5. Joint force protection advanced security system (JFPASS) "the future of force protection: integrate and automate"

    Science.gov (United States)

    Lama, Carlos E.; Fagan, Joe E.

    2009-09-01

    The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.

  6. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  7. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  8. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  9. Pattern of skin diseases among civil population and armed forces personnel at Pune

    Directory of Open Access Journals (Sweden)

    Sayal S

    1997-01-01

    Full Text Available The pattern of skin disorders among 11393 civil and 8123 defence service personnel who attended out-patient department (OPD from January 1989 to December 1994 is presented. Infective dermatoses were more common in civil population (41.2% as compared to defence service personnel (36.3%. Fungal infection was common in both groups (15.1% and 17.2% whereas parasitic infestations and pyoderma were more common in civil population (12.8% and 6.1% as compared to service personnel (7.8% and 3.6%. Among non-infective dermatoses eczemas were more common in civil population (17.3% as compared to Armed Forces personnel (11.7%, whereas papulosquamous disorders, pigmentary disorders, acne and alopecia were more common in Armed Forces personnel (13.5%, 13.4% 8.7% and 6.2% as compared to civil population (10.8%, 10.1%, 6.4% and 4.1%. The incidence of other skin disorders did not differ much between the two groups.

  10. Air Force Integrated Personnel and Pay System (AFIPPS)

    Science.gov (United States)

    2016-03-01

    Technical Guidance to include Information Technolgy (IT) Standards identified in the Technical View One (1) (TV-1) and implementation guidance of GIG...Compliant with Global Information Grid (GIG) Technical Guidance to include Information Technolgy (IT) Standards identified in the Technical View One...2016 Major Automated Information System Annual Report Air Force Integrated Personnel and Pay System (AFIPPS) Defense Acquisition Management

  11. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  12. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  13. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  14. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  15. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  16. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  17. The Politics of Security Deployment of Security Operatives to Jos Metropolis, Plateau State, Nigeria 2001-2014

    Directory of Open Access Journals (Sweden)

    Dantani Umar

    2017-01-01

    Full Text Available The paper examines the politics of security deployment by the Federal Government of Nigeria to Jos, metropolis. A cross-sectional study was conducted and Public Opinion Theory adopted. Methodologically, mixed methods of data collection were conducted that involved the administration of 377 questionnaires to adult respondents, six In-Depth Interviews with religious and community leaders while three Key Informant Interviews with security personnel working with Special Task Force. The survey reveals that, the deployment of Mobile Police from 2001-2010 and the formation of Special Task Force in 2010 has generated mixed reactions and divergent perceptions among the residents of Jos metropolis. Majority of the ethnic groups that are predominantly Christians were more contented with the deployment of the Mobile Police whereas ethnic groups that are dominantly Muslims questioned the neutrality, capability, performance and strength of the Nigerian Police Force in managing the crises. The study recommends that, security personnel should display high degree of neutrality in order to earn the confidence of the residents and change their perceptions.

  18. Air Force Personnel Research: Recommendations for Improved Alignment

    Science.gov (United States)

    2014-01-01

    cornerstone of such work.2 We then used a snowball sampling technique and our knowledge of Air Force personnel research efforts to identify other...importance of this type of data is explained in detail in Chapter Two. 3 Snowball sampling is a technique of using new information collected during a...that the text includes information regarding some organizations we discovered at the end of our snowball sampling period that we did not pursue

  19. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  20. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  1. A Health-Risk Appraisal of Naval Special Operations Forces Personnel Executive Summary

    National Research Council Canada - National Science Library

    Johnson, K

    2000-01-01

    The relationship between exposure to extreme physical and mental activities and adverse environments to the susceptibility to injuries, disease, and death has not been examined for Special Operations Forces (SOF) personnel...

  2. A review of video security training and assessment-systems and their applications

    International Nuclear Information System (INIS)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups

  3. CHANGE@CERN:Task Force 4: Matching personnel to activities

    CERN Multimedia

    2002-01-01

    Our series on the work of the Task Forces moves on to Human Ressources at CERN. Staff mobility and topics related to contract policy were the main personnel issues to be considered by Task Force 4, led by John Ferguson, head of AS Division. The aim, as with the other Task Forces, was to find ways to focus resources on the LHC, and once again the recommendations recognise the opportunity to make constructive changes, in this case in Human Resources policy at CERN. Movement of staff between divisions at CERN has generally not been easy, with 'staff complements' (total numbers) set for each sector (research, accelerator, technical and administration). However, the restructuring of the accelerator sector (proposed by Task Force 5 and already agreed in principle) should allow some staff to move to LHC activities. More generally, Task Force 4 recommends that the Laboratory carries out a review of all activities, at a relatively detailed level, so as to identify the resources required to achieve specific goals (t...

  4. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  5. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  6. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  7. Evaluation of scattered radiation emitted from X-ray security scanners on occupational dose to airport personnel

    International Nuclear Information System (INIS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-01-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits. - Highlights: • Backscattered radiation emitted from the airport security scanners is estimated. • Inverse relation observed between backscattered radiation and scanners distance. • Occupational dose for personnel inspecting the scanners were up to 2.04 mSv/y. • The projected dose of security and engineering staff are well within dose limits.

  8. Military personnel recognition system using texture, colour, and SURF features

    Science.gov (United States)

    Irhebhude, Martins E.; Edirisinghe, Eran A.

    2014-06-01

    This paper presents an automatic, machine vision based, military personnel identification and classification system. Classification is done using a Support Vector Machine (SVM) on sets of Army, Air Force and Navy camouflage uniform personnel datasets. In the proposed system, the arm of service of personnel is recognised by the camouflage of a persons uniform, type of cap and the type of badge/logo. The detailed analysis done include; camouflage cap and plain cap differentiation using gray level co-occurrence matrix (GLCM) texture feature; classification on Army, Air Force and Navy camouflaged uniforms using GLCM texture and colour histogram bin features; plain cap badge classification into Army, Air Force and Navy using Speed Up Robust Feature (SURF). The proposed method recognised camouflage personnel arm of service on sets of data retrieved from google images and selected military websites. Correlation-based Feature Selection (CFS) was used to improve recognition and reduce dimensionality, thereby speeding the classification process. With this method success rates recorded during the analysis include 93.8% for camouflage appearance category, 100%, 90% and 100% rates of plain cap and camouflage cap categories for Army, Air Force and Navy categories, respectively. Accurate recognition was recorded using SURF for the plain cap badge category. Substantial analysis has been carried out and results prove that the proposed method can correctly classify military personnel into various arms of service. We show that the proposed method can be integrated into a face recognition system, which will recognise personnel in addition to determining the arm of service which the personnel belong. Such a system can be used to enhance the security of a military base or facility.

  9. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  10. Response to nuclear and radiological terrorism - the viewpoint from the security forces

    International Nuclear Information System (INIS)

    Baciu, A.

    2005-01-01

    Full text: A threat of a malevolent act may be deemed to exist when information has been received that terrorists, criminals or other persons intend to: manufacture, use, transport, dispose radioactive materials in order to hide the nature of material; perpetrate a deliberate act to irradiate a person or persons; perpetrate a deliberate act to contaminate food or water supplies with radioactive materials; create and deploy a radiation dispersal device; perpetrate a deliberate act to contaminate a site or the environment with radioactive materials; or mount a sabotage attack upon a nuclear facility aimed at causing an uncontrolled release of radioactive materials. Security forces will be involved in all aspects of the response: at the scene, to lead, to control the crime scene and preserve evidence; at the hospitals, to identify and manage witnesses who may assist in the ensuing investigation, and to protect emergency medical personnel if perpetrators are part of the casualties; and at the regional and national coordination level, to manage the overall criminal investigation; to take under physical protection the seized materials. Law enforcement response: key considerations to all police (security and investigating) personnel at the scene of a terrorist act will include the following: do not approach the scene without proper radiological support; be aware of the possible presence of other radiological hazards; the radiological team will seek the removal of safety hazards. Work with that team to minimize hazards while not compromising the investigation. Minimize traffic through the scene: this will help reduce the spread of radioactive contamination, if present; people present at the scene need to be held for questioning. However, they will also have fears due to the presence of radiation. Work with the radiological team to minimize radiological hazards and fears while not compromising the investigation procedure. (author)

  11. Task Force Report, Safety of Personnel in LHC underground areas following the accident of 19th September 2008

    CERN Document Server

    Delille, B; Inigo-Golfin, J; Lindell, G; Roy, G; Tavian, L; Thomas, E; Trant, R; Völlinger, C

    2009-01-01

    In January 2009, the Task Force on Safety of Personnel in the LHC underground areas following the accident in sector 3-4 of 19th September 2008 (Safety Task Force) received from the CERN Director General the mandate to investigate the impact of the accident of 19th September 2008 on the safety of personnel working in the LHC underground areas. This mandate includes the elaboration of preventive and/or corrective measures, if deemed necessary. This report gives the conclusions and recommendations of the Safety Task Force which have been reviewed by an external advisory committee of safety experts.

  12. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  13. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  14. Contribution of Security Forces Personnel to Deter Migration and Improve Stability in West Africa

    Science.gov (United States)

    2017-06-09

    response, cybersecurity analyst, chemical facility inspector, and others.19 Limitations There are several limitations to this research. The time...basins and artificial lakes. This is one of the greatest achievements because agriculture represents one of the main economic activities of the...on intelligence to fill the gap in personnel. However, due to the level of poverty, human intelligence assets are the most preferred. Therefore, in

  15. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    culture, morale, and job satisfaction levels of employees .28 Gerstein argues the development of a Homeland Security personnel system and career maps...and culture, low morale, and job satisfaction levels of employees . DHS has been following a similar approach to the DOD in terms of professional...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  16. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-01-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur

  17. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-07-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur. 2 refs

  18. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Reasons for medical evacuations of soldiers serving in International Security Assistance Force (ISAF) operation in Afghanistan.

    Science.gov (United States)

    Korzeniewski, Krzysztof; Gregulski, Robert

    2014-01-01

    The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for battle injuries, non-battle injuries and diseases. Each medically evacuated Polish soldier was subjected to statistical analysis. The study population comprised 25,974 soldiers assigned to the Polish Military Contingent Afghanistan in the given period. From 2007 to 2013, 1.9% of the Polish military personnel (n = 485) participating in the ISAF operation in Afghanistan were evacuated for medical reasons before the scheduled termination of their contract. 40.6% of all medical evacuations were due to battle injuries, 32.4% due to non-battle injuries, and 27.0% due to diseases. ISAF is an example of a combat operation, in which battle injuries remain the leading health problem in mission participants. 3 of 4 Polish soldiers who were medically evacuated from Afghanistan were no longer fit for military service in the area of operations due to the traumas they had suffered.

  1. Utilization of psychiatric services by female military personnel changes since admission of women to all German Armed Forces military careers.

    Science.gov (United States)

    Zimmermann, Peter; Ströhle, Andreas; Langner, Franziska; Lanczik, Mario

    2010-07-01

    In 2001, women were admitted to all military careers in the German Armed Forces. This study examines whether the utilization of psychiatric services of female military personnel has changed since then. The central medical database of German military personnel for the years 2000 and 2006 was analyzed. Between 2000 and 2006, the percentage (based on the average totals of male and female military personnel) of consultations of primary care unit surgeons for psychiatric problems increased significantly for both male and female military personnel, this increase being more apparent for women than for men. Stress-related disorders showed the greatest rise. In 2006, as opposed to 2000, the total proportion of both outpatient and inpatient mental health treatment provided to female military personnel was significantly higher than for males, particularly regarding stress-related, affective and personality disorders. Gender-specific aspects should be considered more intensely in preventive and therapeutic psychiatric supply in the German Armed Forces.

  2. Personnel Investigations and Clearance Tracking (OPI)

    Data.gov (United States)

    Office of Personnel Management — Security file-related information for the U.S. Office of Personnel Management (OPM)'s employee and contractor personnel. The data is OPM-specific, not government-wide.

  3. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  4. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  5. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  6. Operational Stress and Correlates of Mental Health Among Joint Task Force Guantanamo Bay Military Personnel.

    Science.gov (United States)

    Webb-Murphy, Jennifer A; De La Rosa, Gabriel M; Schmitz, Kimberly J; Vishnyak, Elizabeth J; Raducha, Stephanie C; Roesch, Scott C; Johnston, Scott L

    2015-12-01

    Military personnel deployed to Joint Task Force Guantanamo Bay (JTF-GTMO) faced numerous occupational stressors. As part of a program evaluation, personnel working at JTF-GTMO completed several validated self-report measures. Personnel were at the beginning, middle, or end of their deployment phase. This study presents data regarding symptoms of posttraumatic stress disorder, alcohol abuse, depression, and resilience among 498 U.S. military personnel deployed to JTF-GTMO in 2009. We also investigated individual and organizational correlates of mental health among these personnel. Findings indicated that tenure at JTF-GTMO was positively related to adverse mental health outcomes. Regression models including these variables had R2 values ranging from .02 to .11. Occupation at JTF-GTMO also related to mental health such that guards reported poorer mental health than medical staff. Reluctance to seek out mental health care was also related to mental health outcomes. Those who reported being most reluctant to seek out care tended to report poorer mental health than those who were more willing to seek out care. Results suggested that the JTF-GTMO deployment was associated with significant psychological stress, and that both job-related and attitude-related variables were important to understanding mental health symptoms in this sample. Copyright © 2015 International Society for Traumatic Stress Studies.

  7. Two 'hot buttons' in gas contracting: security performance and force majeure

    International Nuclear Information System (INIS)

    Park, J.J.

    1996-01-01

    Two important developments in gas contracting issues are the 'force majeure' provisions and security for performance clauses. 'Force majeure' was defined as any acts of God or any acts of omission by a transporter of gas, which is excused by any event not within the control of the party claiming suspension. 'Force majeure' provisions need to be specifically negotiated in every case. These issues often arise in gas contracting situations, but the nature of Canada's non-litigious oil and gas industry is such that we have had little or no Canadian case law to assist in interpreting what these clauses mean. The 'force majeure' clause is basically meant to protect the parties from events outside normal business risk. The security of performance issue arises when the obligation of a supplier of gas to perform, and the obligation of a buyer of gas to pay, is unsecured, as would be the case for example, if one of the parties becomes bankrupt

  8. Towards a new approach to the labour law applicable to contractors’ personnel

    CERN Multimedia

    Corinne Pralavorio

    2010-01-01

    On 18 October, CERN and its two Host States will sign agreements on the labour law applicable to the personnel of contractors operating on the CERN site. Once they have entered into force, the agreements will facilitate execution of service contracts for both firms and CERN, and will provide the personnel concerned with better security and more stability.   On 18 October 2010, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. A site that straddles the French-Swiss border makes CERN unique among international organizations. Although this unique characteristic is a fine symbol of international collaboration, it also entails some legal and administrative difficulties. On 18 October, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. This agreement will be supplemented by a bilateral agreement between France and Switzerland amending the 1...

  9. Catalyst for Change: The Department of Defense as a Forcing Function for the Whole-of-Government Approach

    Science.gov (United States)

    2011-05-24

    Huffingtonpost (24 September 2009). 24 Obama, 3. 13 services, Special Forces, and security personnel. The estimated total number of forces for the...Will Be Required Over Five Years in Afghanistan.” Huffingtonpost , September 12, 2009. Bankus, Brent C., and James Kievit. “The Army and Marines and

  10. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Science.gov (United States)

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  11. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  12. Reprint of 'Evaluation of Scattered Radiation Emitted From X-ray Security Scanners on Occupational Dose to Airport Personnel'

    Science.gov (United States)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-11-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits.

  13. Codetermination of the works council in matterss of a security screening of personnel

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If the licensing authority issues a licence to the operator of a nuclear installation subject to the obligation to have personnel to be employed or to be kept on screened for security purposes by the licensing authority, the works council of the nuclear installation is not in the position to demand refrainment from screening activities unless the works council has given consent. (BAGE 58, 297 = NZA 1988, 811 = AP Paragraph 87 BetrVG 1972 - Ordnung des Betriebes - Nr. 14). Decision of the Federal Labour Court of July 9, 1991 - 1 ABR 57/90 (lower instance: LAG Koeln, decision dated June 12, 1990 - 4 TaBV 2/90). (orig.) [de

  14. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  15. Weapons of Mass Destruction and Domestic Force Protection: Basic Response Capability for Military, Police & Security Forces

    National Research Council Canada - National Science Library

    Manto, Samuel

    1999-01-01

    ... actions to improve preparedness. This paper examines what a minimum basic response capability for all military, police and security forces should be to ensure at least some chance for their own survival and possible early warning...

  16. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  17. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  18. Urinary biomarkers of occupational jet fuel exposure among Air Force personnel.

    Science.gov (United States)

    Smith, Kristen W; Proctor, Susan P; Ozonoff, A L; McClean, Michael D

    2012-01-01

    There is a potential for widespread occupational exposure to jet fuel among military and civilian personnel. Urinary metabolites of naphthalene have been suggested for use as short-term biomarkers of exposure to jet fuel (jet propulsion fuel 8 (JP8)). In this study, urinary biomarkers of JP8 were evaluated among US Air Force personnel. Personnel (n=24) were divided a priori into high, moderate, and low exposure groups. Pre- and post-shift urine samples were collected from each worker over three workdays and analyzed for metabolites of naphthalene (1- and 2-naphthol). Questionnaires and breathing-zone naphthalene samples were collected from each worker during the same workdays. Linear mixed-effects models were used to evaluate the exposure data. Post-shift levels of 1- and 2-naphthol varied significantly by a priori exposure group (levels in high group>moderate group>low group), and breathing-zone naphthalene was a significant predictor of post-shift levels of 1- and 2-naphthol, indicating that for every unit increase in breathing-zone naphthalene, there was an increase in naphthol levels. These results indicate that post-shift levels of urinary 1- and 2-naphthol reflect JP8 exposure during the work-shift and may be useful surrogates of JP8 exposure. Among the high exposed workers, significant job-related predictors of post-shift levels of 1- and 2-naphthol included entering the fuel tank, repairing leaks, direct skin contact with JP8, and not wearing gloves during the work-shift. The job-related predictors of 1- and 2-naphthol emphasize the importance of reducing inhalation and dermal exposure through the use of personal protective equipment while working in an environment with JP8.

  19. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    Science.gov (United States)

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  20. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (l) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper discusses the various types of security applications that are presently being considered for the above areas and briefly describes a few examples of the application of this technology

  1. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  2. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  3. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  4. 49 CFR 1542.219 - Supplementing law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Supplementing law enforcement personnel. 1542.219 Section 1542.219 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.219 Supplementing law...

  5. Evaluation of the Nutrition of the Bulgarian Army Military Personnel During the Preparation for Participation in Expeditionary Operations

    Directory of Open Access Journals (Sweden)

    Nichev Nikolay

    2017-12-01

    Full Text Available The development of the military art and of the rapidly changing security environment, define the developing and the formation of new capabilities for their management. The increasing importance of the Expeditionary Forces of NATO demands the developing of the national legislation, connected with the nutrition of the Bulgarian Army military personnel, participating in expeditionary operations. In response to the tasks, delegated to the armed forces during their participation in expeditionary operations, the provision of the units with food becomes a priority logistic capability.

  6. The health and cost implications of high body mass index in Australian defence force personnel

    Directory of Open Access Journals (Sweden)

    Peake Jonathan

    2012-06-01

    Full Text Available Abstract Background Frequent illness and injury among workers with high body mass index (BMI can raise the costs of employee healthcare and reduce workforce maintenance and productivity. These issues are particularly important in vocational settings such as the military, which require good physical health, regular attendance and teamwork to operate efficiently. The purpose of this study was to compare the incidence of injury and illness, absenteeism, productivity, healthcare usage and administrative outcomes among Australian Defence Force personnel with varying BMI. Methods Personnel were grouped into cohorts according to the following ranges for (BMI: normal (18.5 − 24.9 kg/m2; n = 197, overweight (25–29.9 kg/m2; n = 154 and obese (≥30 kg/m2 with restricted body fat (≤28% for females, ≤24% for males (n = 148 and with no restriction on body fat (n = 180. Medical records for each individual were audited retrospectively to record the incidence of injury and illness, absenteeism, productivity, healthcare usage (i.e., consultation with medical specialists, hospital stays, medical investigations, prescriptions and administrative outcomes (e.g., discharge from service over one year. These data were then grouped and compared between the cohorts. Results The prevalence of injury and illness, cost of medical specialist consultations and cost of medical scans were all higher (p  Conclusions High BMI in the military increases healthcare usage, but does not disrupt workforce maintenance. The greater prevalence of injury and illness, greater healthcare usage and lower productivity in obese Australian Defence Force personnel is not related to higher levels of body fat.

  7. Air Force Personnel Can Improve Compliance With the Berry Amendment and Buy American Act

    Science.gov (United States)

    2016-02-24

    leather, furs,6 apparel , and shoes • FSG 84 – clothing , individual equipment and insignia • FSG 89 – subsistence (food) If these items are purchased...during the audit by completing Buy American Act training and amending standard operating procedures and internal processes to improve compliance with the...Force Personnel Can Improve Compliance With the Berry Amendment and the Buy American Act F E B R U A R Y 2 4 , 2 0 1 6 Report No. DODIG-2016-051

  8. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  9. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  10. 10 CFR 712.16 - DOE security review.

    Science.gov (United States)

    2010-01-01

    ... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file... 10 Energy 4 2010-01-01 2010-01-01 false DOE security review. 712.16 Section 712.16 Energy... Program Procedures § 712.16 DOE security review. (a) A personnel security specialist will perform a...

  11. 48 CFR 225.7703-2 - Determination requirements.

    Science.gov (United States)

    2010-10-01

    ... or services to be used only by the military forces, police, or other security personnel of Iraq or... only by the military forces, police, or other security personnel of Iraq or Afghanistan; and (2... the military forces, police, or other security personnel of Iraq or Afghanistan, the following...

  12. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  13. Guidelines for the training, credentialing, use, and supervision of speech-language pathology assistants. Task Force on Support Personnel.

    Science.gov (United States)

    1996-01-01

    These guidelines are an official statement of the American Speech-Language-Hearing Association. They provide guidance on the training, credentialing, use, and supervision of one category of support personnel in speech-language pathology: speech-language pathology assistants. Guidelines are not official standards of the Association. They were developed by the Task Force on Support Personnel: Dennis J. Arnst, Kenneth D. Barker, Ann Olsen Bird, Sheila Bridges, Linda S. DeYoung, Katherine Formichella, Nena M. Germany, Gilbert C. Hanke, Ann M. Horton, DeAnne M. Owre, Sidney L. Ramsey, Cathy A. Runnels, Brenda Terrell, Gerry W. Werven, Denise West, Patricia A. Mercaitis (consultant), Lisa C. O'Connor (consultant), Frederick T. Spahr (coordinator), Diane Paul-Brown (associate coordinator), Ann L. Carey (Executive Board liaison). The 1994 guidelines supersede the 1981 guidelines entitled, "Guidelines for the Employment and Utilization of Supportive Personnel" (Asha, March 1981, 165-169). Refer to the 1995 position statement on the "Training, Credentialing, Use, and Supervision of Support Personnel in Speech-Language Pathology" (Asha, 37 [Suppl. 14], 21).

  14. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  15. The influence of sexual harassment on mental health among female military personnel of the Republic of Korea Armed Forces

    OpenAIRE

    Kim, Tae Kyung; Lee, H-C; Lee, S G; Han, K-T; Park, E-C

    2016-01-01

    Introduction Reports of sexual harassment are becoming more frequent in Republic of Korea (ROK) Armed Forces. This study aimed to analyse the impact of sexual harassment on mental health among female military personnel of the ROK Armed Forces. Methods Data from the 2014 Military Health Survey were used. Instances of sexual harassment were recorded as ?yes? or ?no?. Analysis of variance (ANOVA) was carried out to compare Kessler Psychological Distress Scale 10 (K-10) scores. Multiple logistic ...

  16. Report on Progress Toward Security and Stability in Afghanistan and United States Plan for Sustaining the Afghanistan National Security Forces

    Science.gov (United States)

    2011-04-01

    105  8.2: INDIA ...2B Afghan Air Force 0 AMoD Education 3 ASOC 0 Gender Integration 0 Personnel Management 2B National Logistics 2B GS G1 2B AMoD AT&L 2B...award nomination package cites her determination to overcome Afghanistan’s cultural stereotypes and to serve in the military “as long as my country

  17. [Radiative and hygienic certification in Armed Forces, problems of its implementation and ways of perfection].

    Science.gov (United States)

    Rusakov, V N; Cherkashin, A V; Shishkanov, A P; Ian'shin, L A; Gracheva, T N

    2010-12-01

    Radiative and hygienic passportization is one of the most actual pattern of socio and hygienic monitoring in Armed Forces. Radiative and hygienic passport is the main document which characterizes the safety control in military unit and uses the sources of ionizing radiation. Sanitary and epidemiologic institutions were imputed to control the formation of radiative and hygienic passports, analysis and generalization of its data, formation of conclusions about the condition of radiation security in the military units. According to radiative and hygienic passportization, which took place in 2009, the radiation security in the Armed Forces and organizations is satisfactory, but there are some problems of providing of radiation security of personnel under the professional and medical radiation. The salvation of its problems requires the effective work of official functionary of radiac object and institutions of state sanitary and epidemiological supervision in Armed Forces of Russian Federation.

  18. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  19. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    Science.gov (United States)

    2008-12-01

    and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin

  20. Kyrgyzstan’s Fragmented Police and Armed Forces

    Directory of Open Access Journals (Sweden)

    Erica Marat

    2011-03-01

    Full Text Available This article is a first attempt to analyze the underlying reasons behind the unprofessional behavior of the Kyrgyz military and police during ethnic conflict in Osh on June 10-14, 2010. It argues that the higher military leadership in Bishkek shares a common distrust of the Tashkent regime and overall uncertainly about power sharing two months after regime change, while lower level personnel may have provoked the Uzbek minority, because of their nationalist feelings (the majority of police and army personnel are ethnic Kyrgyz and overall frustration with the fragmented political leadership. The situation was further exacerbated by the lack of political control over the security forces and their lack of adequate training to deal with civic unrest.

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  2. Epidemiology of HIV among US Air Force Military Personnel, 1996-2011.

    Directory of Open Access Journals (Sweden)

    Shilpa Hakre

    Full Text Available The objectives of this study were to describe the epidemiology of HIV in the United States Air Force (USAF from 1996 through 2011 and to assess whether socio-demographic characteristics and service-related mobility, including military deployments, were associated with HIV infection.We conducted a retrospective cohort analysis of USAF personnel who were HIV-infected during the study period January 1, 1996 through December 31, 2011 and a matched case-control study. Cases were USAF personnel newly-diagnosed with HIV during the study period. Five randomly-selected HIV-uninfected controls were matched to each case by age, length of service, sex, race, service, component, and HIV test collection date. Socio-demographic and service-related mobility factors and HIV diagnosis were assessed using conditional logistic regression.During the study period, the USAF had 541 newly diagnosed HIV-infected cases. HIV incidence rate (per 100,000 person-years among 473 active duty members was highest in 2007 (16.78, among black/ African-American USAF members (26.60 and those aged 25 to 29 years (10.84. In unadjusted analysis restricted to personnel on active duty, 10 characteristics were identified and considered for final multivariate analysis. Of these single (adjusted odds ratio [aOR], 8.15, 95% confidence interval [CI] 5.71-11.6 or other marital status (aOR 4.60, 95% CI 2.72-7.75, communications/ intelligence (aOR 2.57, 95% CI 1.84-3.60 or healthcare (aOR 2.07, 95% CI 1.28-3.35 occupations, and having no deployment in the past 2 years before diagnosis (aOR 2.02, 95% CI 1.47-2.78 conferred higher odds of HIV infection in adjusted analysis.The highest risk of HIV infection in the USAF was among young unmarried deployment-naïve males, especially those in higher risk occupation groups. In an era when worldwide military operations have increased, these analyses identified potential areas where targeted HIV prevention efforts may be beneficial in reducing HIV

  3. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  4. PLC-based search and secure interlock system for the personnel safety in folded tandem ion accelerator

    International Nuclear Information System (INIS)

    Padmakumar, Sapna; Subramanyum, N.B.V.; Bhatt, Jignesh P.; Ware, Shailaja V.; Kansara, M.J.; Gupta, S.K.; Singh, P.

    2006-01-01

    Safety of the personnel is one of the key issues addressed in any accelerator project. The FOTIA facility at BARC is capable of operating under standard operation conditions without any radiation hazard. Even then for a safe and reliable operation of FOTIA a PLC (Programmable logic controller) based interlock system has been implemented. This interlocking system is compact, modular, flexible, robust and easy for troubleshooting. These advantages led to the popularity of PLC rather than using a relay-based system. This paper highlights the salient features of the search and secure interlock for the personal safety of FOTIA. (author)

  5. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    Science.gov (United States)

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  6. Women in combat: The status and roles assigned female personnel in the permanent defence forces.

    OpenAIRE

    Clonan, Thomas Martin

    2000-01-01

    The aim of the PhD study is to examine critically the integration of female personnel within the Permanent Defence Forces (PDF). Their integration is examined in light of the deployment of women in the international military, and in light of a liberal-feminist examination of the workplace in terms of its equality of opportunity agenda. It is argued that the sex-role stereotyping used to recruit young men in to the military in the past along with socio-biological theories of women’s and me...

  7. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  8. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  9. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  10. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  11. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  12. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  13. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  14. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-06-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (1) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper will discuss the various types of security applications that are presently being considered for the above areas and will briefly describe a few examples of the application of this technology. Examples will include ground mobile platforms carrying alarm assessment and/or surveillance sensors and operating either autonomously or with telepresence by a remote operator. An airborne platform performing similar functions will also be discussed. An application of a type of robot sentry that would be fixed and incorporate very simple portable displays will also be described. A third type of robot, an interior robot, that could be used in sensitive or hazardous areas to do detection and assessment functions will be reviewed

  15. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  16. Impact of Population Aging on Military and Security Policy

    Directory of Open Access Journals (Sweden)

    Martina Šimková

    2014-12-01

    Full Text Available Population ageing is among the most important problems of developed European countries and the most frequently discussed social issues. The Czech Republic also faces population ageing and we cannot expect a different trend in the future. Life expectancy has increased due to better health care while current lifestyle often leads to lower natality, resulting in a negative rate of natural increase and a decreasing proportion of young people in population in the future. This problem affects all spheres of life and social and economic development. Population ageing may pose a threat to the security of the population in different ways. The functioning of the security system may be threatened due to decreasing workforce. Population ageing may undercut resources for military budgets. Young recruits represent an important part of military forces and the latter are competing in the labour market with more attractive occupations. Especially ensuring the stability of the personnel needed for securing crisis situations would be a significant problem of near future. This paper presents a demographic perspective on staffing and correct operation of military forces in the context of population ageing. It describes the current situation of human resources in the military policy of the Czech Republic and determines the negative impact of population ageing on recruitment potential. It deals with the sustainability of human resources for security forces.

  17. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  18. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E.

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs

  19. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs.

  20. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    National Research Council Canada - National Science Library

    Atha, Roberto J

    2008-01-01

    .... It reveals how the influence of the military affected the implementation of internal security reforms, influencing the professionalism and effectiveness of police forces in the fight against violence and gangs today...

  1. Characterization of inhalation exposure to jet fuel among U.S. Air Force personnel.

    Science.gov (United States)

    Merchant-Borna, Kian; Rodrigues, Ema G; Smith, Kristen W; Proctor, Susan P; McClean, Michael D

    2012-07-01

    Jet propulsion fuel-8 (JP-8) is the primary jet fuel used by the US military, collectively consuming ~2.5 billion gallons annually. Previous reports suggest that JP-8 is potentially toxic to the immune, respiratory, and nervous systems. The objectives of this study were to evaluate inhalation exposure to JP-8 constituents among active duty United States Air Force (USAF) personnel while performing job-related tasks, identify significant predictors of inhalation exposure to JP-8, and evaluate the extent to which surrogate exposure classifications were predictive of measured JP-8 exposures. Seventy-three full-time USAF personnel from three different air force bases were monitored during four consecutive workdays where personal air samples were collected and analyzed for benzene, ethylbenzene, toluene, xylenes, total hydrocarbons (THC), and naphthalene. The participants were categorized a priori into high- and low-exposure groups, based on their exposure to JP-8 during their typical workday. Additional JP-8 exposure categories included job title groups and self-reported exposure to JP-8. Linear mixed-effects models were used to evaluate predictors of personal air concentrations. The concentrations of THC in air were significantly different between a priori exposure groups (2.6 mg m(-3) in high group versus 0.5 mg m(-3) in low, P fuel distribution/maintenance, though self-reported exposure to JP-8 was an even stronger predictor of measured exposure in models that explained 72% (THC) and 67% (naphthalene) of between-worker variability. In fact, both self-report JP-8 exposure and a priori exposure groups explained more between-worker variability than job categories. Personal exposure to JP-8 varied by job and was positively associated with the relative humidity. However, self-reported exposure to JP-8 was an even stronger predictor of measured exposure than job title categories, suggesting that self-reported JP-8 exposure is a valid surrogate metric of exposure when

  2. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  3. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  4. Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War

    NARCIS (Netherlands)

    Jentzsch, C.

    2017-01-01

    Who rules during the civil war? This article argues that the concept of armed group governance must be expanded to include auxiliary armed forces linked to rebels or the government. Comparing the organization of rebel and government auxiliaries, the article demonstrates that security governance

  5. Comparison of elective lumbar discectomy outcomes between civilians and military personnel

    International Nuclear Information System (INIS)

    Farzanegan, G.; Mohebbi, H.A.; Moharamzad, Y.

    2007-01-01

    To determine the results of discectomy surgery for lumbar disc herniation in military personnel and compare it with civilians. One-hundred and seventeen military patients (54 subjects as combat forces and 63 as office personnel) and 115 civilians, who underwent discectomy surgery were included. In a mean duration of 50.8 months, the ability to return to full duty and resolution of complaints were assessed and satisfaction was measured using a Visual Analog Scale. Inability to return to previous duty was significantly higher in military personnel compared to civilians (p = 0.002); and in combat forces compared to office personnel (p 0.05). Surgical intervention had relatively poor outcomes in military personnel, specifically in combat forces. Prevention of injury to back region should be considered in military training programs and in case of presence of disc herniation related symptoms, efforts should be made to save patients effective function by conservation and medical therapies. (author)

  6. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  7. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Science.gov (United States)

    2010-10-01

    ... information technology (IT) system, as required by the Department of Commerce Security Manual and Department of Commerce Security Program Policy and Minimum Implementation Standards. (b) Insert clause 1352.237... as National Security Contracts that will be performed on or within a Department of Commerce facility...

  8. Supporting the personnel reliability decision-making process with artificial intelligence

    International Nuclear Information System (INIS)

    Harte, D.C.

    1991-01-01

    Recent legislation concerning personnel security has vastly increased the responsibility and accountability of the security manager. Access authorization, fitness for duty, and personnel security access programs require decisions regarding an individual's trustworthiness and reliability based on the findings of a background investigation. While these guidelines provide significant data and are useful as a tool, limited resources are available to the adjudicator of derogatory information on what is and is not acceptable in terms of granting access to sensitive areas of nuclear plants. The reason why one individual is deemed unacceptable and the next acceptable may be questioned and cause discriminatory accusations. This paper is continuation of discussion on workforce reliability, focusing on the use of artificial intelligence to support the decisions of a security manager. With this support, the benefit of previous decisions helps ensure consistent adjudication of background investigations

  9. Exposure to Prescription Drugs Labeled for Risk of Adverse Effects of Suicidal Behavior or Ideation among 100 Air Force Personnel Who Died by Suicide, 2006-2009

    Science.gov (United States)

    Lavigne, Jill E.; McCarthy, Michael; Chapman, Richard; Petrilla, Allison; Knox, Kerry L.

    2012-01-01

    Prescription drugs for many indications are labeled with warnings for potential risk of suicidal ideation or behavior. Exposures to prescription drugs labeled for adverse effects of suicidal behavior or ideation among 100 Air Force personnel who died by suicide between 2006 and 2009 are described. Air Force registry data were linked to…

  10. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  11. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    Science.gov (United States)

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  12. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  13. The influence of sexual harassment on mental health among female military personnel of the Republic of Korea Armed Forces.

    Science.gov (United States)

    Kim, Tae Kyung; Lee, H-C; Lee, S G; Han, K-T; Park, E-C

    2017-04-01

    Reports of sexual harassment are becoming more frequent in Republic of Korea (ROK) Armed Forces. This study aimed to analyse the impact of sexual harassment on mental health among female military personnel of the ROK Armed Forces. Data from the 2014 Military Health Survey were used. Instances of sexual harassment were recorded as 'yes' or 'no'. Analysis of variance (ANOVA) was carried out to compare Kessler Psychological Distress Scale 10 (K-10) scores. Multiple logistic regression analysis was performed to identify associations between sexual harassment and K-10 scores. Among 228 female military personnel, 13 (5.7%) individuals experienced sexual harassment. Multiple logistic regression analysis revealed that sexual harassment had a significantly negative impact on K-10 scores (3.486, psexual harassment were identified in the unmarried (including never-married) group (6.761, pSexual harassment has a negative impact on mental health. Factors associated with worse mental health scores included service classification and length of service. The results provide helpful information with which to develop measures for minimising the negative psychological effects from sexual harassment and promoting sexual harassment prevention policy. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  14. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  15. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  16. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  17. Automating the personnel dosimeter monitoring program

    International Nuclear Information System (INIS)

    Compston, M.W.

    1982-12-01

    The personnel dosimetry monitoring program at the Portsmouth uranium enrichment facility has been improved by using thermoluminescent dosimetry to monitor for ionizing radiation exposure, and by automating most of the operations and all of the associated information handling. A thermoluminescent dosimeter (TLD) card, worn by personnel inside security badges, stores the energy of ionizing radiation. The dosimeters are changed-out periodically and are loaded 150 cards at a time into an automated reader-processor. The resulting data is recorded and filed into a useful form by computer programming developed for this purpose

  18. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  19. 78 FR 35042 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0407] Merchant Marine Personnel... Labor Organization's Maritime Labour Convention, 2006.'' This meeting will be open to the public. DATES... words ``Department of Homeland Security'' and the docket number for this action. Comments received will...

  20. The Intensification of the Personnel Role.

    Science.gov (United States)

    Wangler, Lawrence A.

    1979-01-01

    Discusses personnel profession's increased responsibilities which are due to (1) consolidation of the Equal Employment Opportunity Commission, (2) labor law reform, (3) privacy legislation, (4) social security legislation, (5) open retirement, (6) medical plan costs, (7) codetermination, (8) labor scarcity, (9) top management compensation, and…

  1. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  2. The Report of the Independent Commission on the Security Forces of Iraq

    Science.gov (United States)

    2007-09-06

    Point of Entry Border Station 7. Taji Camp Taji Counterinsurgency Center for Excelence Iraqi Counterinsurgency Academy Iraqi Military Inteligence ...he serves on the North Carolina Military Foundation and as a director with several private and public businesses . General Charles G. Boyd, USAF...Ret.) General Charles G. Boyd, U.S. Air Force (Ret.), became president and CEO of Business Executives for National Security (BENS) in May of 2002

  3. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  4. 2014 Year End Report: Center for Development of Security Excellence

    Science.gov (United States)

    2014-01-01

    Personnel Security Adjudications In August 2014, LT Tetyana Muirhead, a U.S. Navy Nurse , earned her Certificates in Security Leadership and in...website or on the CDSE YouTube channel. Personnel can watch the webinars and download associated job aids and resources. CDSE OPEN ELEARNING COURSES

  5. Legitimacy and Force in International Security : A Regionalist Approach on Multilateralism and the Role of Legitimacy in the Modern World

    OpenAIRE

    Arnesen, Ketil Vike

    2008-01-01

    This thesis will address the issue of legitimacy within international security, with a focus on the use of force by states. Using military force against other actors in the international system will initiate a debate on its perceived legitimacy by several different audiences. This investigation uses the Regional Security Complex Theory of Buzan and Wæver and the assumptions of Idealism to instigate the analytical framework on legitimacy. This thesis will analyse the role and importance of le...

  6. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  7. Dental Health Status and Treatment Needs of Police Personnel of a ...

    African Journals Online (AJOL)

    Background: Oral health is an integral part of general health. Police personnel form the backbone for safety and security of a community hence their health is of utmost importance. Aim: The present study was conducted to assess the oral health status and treatment needs of police personnel employed in police stations of ...

  8. professional status and the personnel functionary in the sadf

    African Journals Online (AJOL)

    PROFESSIONAL STATUS AND THE. PERSONNEL FUNCTIONARY IN THE SADF. By R Adm R. Eberlein*. Introduction. During the last year or so there has developed an increasing awareness among personnel functionaries in the SA Defence Force of a move- ment aimed at obtaining recognition of the pro- fessional ...

  9. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  10. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ

    International Nuclear Information System (INIS)

    Ruiz J, A.

    1999-01-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  11. Impact of a 7-Day Field Training on Oral Health Condition in Japan Ground Self-Defense Force Personnel.

    Science.gov (United States)

    Yamashita, Koji; Nishiyama, Takeshi; Nagata, Emi; Ramadhani, Atik; Kawada-Matsuo, Miki; Komatsuzawa, Hitoshi; Oho, Takahiko

    2017-07-01

    In the Japan Ground Self-Defense Force (JGSDF), personnel periodically perform intensive training that mimics the conditions seen in battle and during natural disasters. Military training involves intensive, stressful conditions, and changes in immune responses have been found in personnel following training. Good oral condition is important for military personnel to fulfill their duties; however, they have difficulty performing daily oral care under training conditions. In this study, we investigated the impact of a 7-day field training on the oral health status of JGSDF personnel by comparing their oral condition before and just after training. The participants were 59 male and 3 female JGSDF personnel undergoing a 7-day field training. All personnel provided informed written consent to participate, and this study was approved by the ethics committee of the Kagoshima University Graduate School of Medical and Dental Sciences. Oral health behaviors before and during the training period were surveyed using a self-administered questionnaire. Dental caries was assessed before training in terms of decayed, missing and filled teeth (DMFT), and periodontal condition was examined before and immediately after training using the community periodontal index (CPI). The presence of eight species of bacteria in dental plaque, including commensal streptococci that are early colonizers on the tooth surface, cariogenic bacteria, and periodontopathic bacteria, was determined using real-time polymerase chain reaction. We also assessed antibacterial factors and a stress marker in saliva samples. Sample collection was performed before and just after training. In addition to difference analysis between groups, logistic regression analysis was performed to examine the association between each health behavior and periodontal deterioration. The frequency of toothbrushing decreased, and snacking increased during the training period. Thirty-five personnel (56.5%) showed an increase in

  12. Forecasting the Demand for Information Security Personnel

    Directory of Open Access Journals (Sweden)

    Anatoliy Alexandrovich Malyuk

    2016-06-01

    Full Text Available During the formation of information society the problem of determining the demand for IS personnel (DfISP, consisting of IS specialists and IS practitioners, is of particular relevance at present. The goal of the paper is to calculate the demand for IS specialists (DfISS. To achieve it we used the informal heuristic methods and introduced some important indicators for DfISP forecast. As a validation of the conceptual approach proposed we show how to apply it on the regional level of one country on one real-world example. All the reasoning and calculations can be narrowed down to the DfISS forecasting within one corporation or IS professionals of a specific profile.

  13. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2012

    2012-01-01

    The labor force is the number of people ages 16 or older who are either working or looking for work. It does not include active-duty military personnel or the institutionalized population, such as prison inmates. Determining the size of the labor force is a way of determining how big the economy can get. The size of the labor force depends on two…

  14. Evaluation of Agency's Public Personnel Administration

    OpenAIRE

    Neal W. Tamayo

    2017-01-01

    As a consultant for a government agency, this paper will design recommendations and improvements for the agency’s public personnel administration. In order to do this, the consultant has to become familiar with the agency, its departments and also understand the key factors. The department chosen from the government for this paper is the Social Security Administration (Kestenbaum, 2014).

  15. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  16. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  17. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  18. From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education

    Science.gov (United States)

    2017-06-09

    support procedures and decision - making processes. Creating awareness that limitations are present creates a natural motivation to want to reduce...law enforcement decision - making ? What cultural norms within Security Forces should be challenged to improve responses of young adults faced with...enforcement and combat decision - making processes is available. However, it is not uncommon for laboratory discoveries to enter clinical practice, not to

  19. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  20. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  1. Independent Auditors Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund

    Science.gov (United States)

    2015-07-31

    Independent Auditor’s Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces...Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund (Report No. DODIG-2015-154) We are providing this...046, “Independent Auditor’s Report on the Examination of DoD Execution of North Atlantic Treaty Organization Contributing Countries’ Donations to

  2. Demonstration of Security Benefits of Renewable Generation at FE Warren Air Force Base

    International Nuclear Information System (INIS)

    Warwick, William M.; Myers, Kurt; Seifert, Gary

    2010-01-01

    Report detailing field demonstration of security benefits of renewable generation at FE Warren Air Force Base. The 2006 National Defense Appropriations Act directed the Department of Defense (DOD) to coordinate the testing of a wind turbine (new to the U.S. market) at an Air Force installation as a follow on to analyses conducted by the Pacific Northwest National Laborabory (PNNL) as part of the 2005 DOD Renewable Assessment. The earlier study simulated the performance of renewable power produced from wind turbines, solar photovoltaics and geothermal energy as part of a Base-wide energy security solution. The simulation concluded that integration of renewable generating resources with emergency generators, typically diesel-fired, could significantly enhance energy security and extend power supplies during prolonged commercial grid power outages. A simulation is insufficient to convince skeptics of the reliability of renewable resources, especially those that produce power only intermittently, like wind and solar. Therefore, Congress requested a field demonstration be performed using a wind turbine because wind power is the most erratic of all renewable resources. Following this direction, the Air Force identified a site for the wind turbine demonstration and contracted with the Idaho National Laboratory (INL) and PNNL to conduct the demonstration and implement other provisions in the appropriation bill. INL identified a wind turbine that met the legislative requirements (the Gamesa G-80), and with the support of PNNL and the Air Force, selected FE Warren Air Force Base for the demonstration. FE Warren has an excellent wind resource and was already a host to two wind turbines and could accommodate a third. The G-80 is rated at 2 MWs versus the two existing 660 kW turbines, consequently wind production would more than double. Procurement, siting, and acceptance testing of the new turbine was completed in early 2010. The field test was conducted in late April 2010

  3. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  4. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  5. Hypothetical requirements on number of personnel in Czechoslovak nuclear power plants

    International Nuclear Information System (INIS)

    Halik, J.

    1990-01-01

    The structural changes of Czechoslovak power prevent prediction of labor force development by extrapolating the existing development trends. Nuclear power demands a different qualification and occupation structure of the labor force than conventional power generation. The prediction of the number of personnel is based on data on the expected installed capacity and on its commissioning. The following organizational structures are envisaged for a nuclear power plant: the divisions of the Director, of production, maintenance, radiation safety and quality control, technology and investment, economics and personnel. A total of 15,654 personnel are envisaged for nuclear power plants in 2005. A brief comparison is submitted of labor demands in nuclear power plants in Czechoslovakia and in the world. (M.D.). 1 fig., 4 tabs., 3 refs

  6. Urinary Polycyclic Aromatic Hydrocarbon (OH-PAH) Metabolite Concentrations and the Effect of GST Polymorphisms Among US Air Force Personnel Exposed to Jet Fuel

    Science.gov (United States)

    Rodrigues, Ema G.; Smith, Kristen; Maule, Alexis L.; Sjodin, Andreas; Li, Zheng; Romanoff, Lovisa; Kelsey, Karl; Proctor, Susan; McClean, Michael D.

    2016-01-01

    Objective To evaluate the association between inhalation exposure to jet propulsion fuel 8 (JP-8) and urinary metabolites among US Air Force (USAF) personnel, and investigate the role of glutathione S-transferase polymorphisms. Methods Personal air samples were collected from 37 full-time USAF personnel during 4 consecutive workdays and analyzed for JP-8 constituents and total hydrocarbons. Pre- and postshift urine samples were collected each day and analyzed for polycyclic aromatic hydrocarbon urinary metabolites. Results Work shift exposure to total hydrocarbons was significantly associated with postshift urinary 1-naphthol (β = 0.17; P = <0.0001), 2-naphthol (β = 0.09; P = 0.005), and 2-hydroxyfluorene concentrations (β = 0.08; P = 0.006), and a significant gene-environment interaction was observed with glutathione S-transferase mu-1. Conclusions USAF personnel experience inhalation exposure to JP-8, which is associated with absorption of JP-8 constituents while performing typical job-related tasks, and in our data the glutathione S-transferase mu-1 polymorphism was associated with differential metabolism of naphthalene. PMID:24806557

  7. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    Science.gov (United States)

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.

  8. The laser Megajoule facility personnel security and safety interlocks

    International Nuclear Information System (INIS)

    Chapuis, J.C.; Arnoul, J.P.; Hurst, A.; Manson, M.

    2012-01-01

    The LMJ (Laser Megajoule) is designed to deliver about 1.4 MJ of 0.35 μm light to targets for high energy density physics experiments. Such an installation entails specific hazards related to the presence of intense laser beams, and high voltage power laser amplifiers. Furthermore, the thermonuclear fusion reactions induced by the experiment also produce different radiations and neutrons burst, and also activate various materials in the chamber environment. All these hazards could be lethal. The SSP (Personnel Safety System) was designed to prevent accidents and protect personnel working in the LMJ. To satisfy at the lowest cost the requirements of safety regulations and those of the operation management, the choice was made to implement a functional architecture built around two independent technological barriers when required by the risk level. Each technical barrier is composed of two subsets, one dedicated to hazard sources management, and the other one dedicated to worker presence management. The two completely independent barriers, even at the sensor or actuator level, are designed with different technologies adapted to the required Safety Integrity Level. The combination of these 2 barriers is equivalent to a unique barrier with a rate of dangerous failure of about 10 -6 per year

  9. A Multi-Objective Decision Support Model for the Turkish Armed Forces Personnel Assignment System

    National Research Council Canada - National Science Library

    Cimen, Zubeyir

    2001-01-01

    .... TAF wants to obtain maximum utilization of its personnel by assigning the right person to the right job at the right time, To accomplish this task, decision-makers and personnel assignment staff...

  10. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  11. Urinary polycyclic aromatic hydrocarbon (OH-PAH) metabolite concentrations and the effect of GST polymorphisms among US Air Force personnel exposed to jet fuel.

    Science.gov (United States)

    Rodrigues, Ema G; Smith, Kristen; Maule, Alexis L; Sjodin, Andreas; Li, Zheng; Romanoff, Lovisa; Kelsey, Karl; Proctor, Susan; McClean, Michael D

    2014-05-01

    To evaluate the association between inhalation exposure to jet propulsion fuel 8 (JP-8) and urinary metabolites among US Air Force (USAF) personnel, and investigate the role of glutathione S-transferase polymorphisms. Personal air samples were collected from 37 full-time USAF personnel during 4 consecutive workdays and analyzed for JP-8 constituents and total hydrocarbons. Pre- and postshift urine samples were collected each day and analyzed for polycyclic aromatic hydrocarbon urinary metabolites. Work shift exposure to total hydrocarbons was significantly associated with postshift urinary 1-naphthol (β = 0.17; P = inhalation exposure to JP-8, which is associated with absorption of JP-8 constituents while performing typical job-related tasks, and in our data the glutathione S-transferase mu-1 polymorphism was associated with differential metabolism of naphthalene.

  12. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2010

    2010-01-01

    The labor force is the number of people aged 16 or older who are either working or looking for work. It does not include active-duty military personnel or institutionalized people, such as prison inmates. Quantifying this total supply of labor is a way of determining how big the economy can get. Labor force participation rates vary significantly…

  13. Essence of the «Enterprise Management through Personnel Management» Paradigm

    OpenAIRE

    Vashchenko Natalia V.

    2013-01-01

    The article proves a necessity of consideration of personnel as a driving force of enterprise development. It studies and generalises the existing approaches of scientists to understanding the "enterprise management" and "personnel management" processes. It marks out problem and positive points of view of scientists with respect to identification of the role of personnel in the process of enterprise management and ensuring its development. It reveals the essence of the "management" and "enter...

  14. Study on Maintenance Personnel Development Plan For The Exported APR1400 Commissioning

    International Nuclear Information System (INIS)

    Cho, Sungbae; Kim, Jongdae; Jun, Hokwang; Hwang, Inok; Kang, Jaeyuel

    2012-01-01

    This paper indicates ways to develop maintenance personnel for the exported APR1400 commissioning. The exported APR1400 has not been experienced ay maintenance yet, and requirements for maintenance personnel have not been clarified yet. Based on sound maintenance experience, KEPCO Plant Service and Engineering Company (KEPCO KPS) has studied on maintenance training and career requirement to establish a development plan of the maintenance personnel for the exported nuclear power plant. By defining manpower and training requirement, and mobilization plan, we expect to secure reliability of the exported APR1400

  15. Method to control the persons permitted to enter plants with increased security requirements and personnel lock for such plants

    International Nuclear Information System (INIS)

    Blaser, E.; Eickhoff, H.; Tretschoks, W.

    1978-01-01

    The personnel lock for a plant with increased security requirements, e.g. a nuclear power plant, has got two lock gates. Only persons whose right to enter has been established by the control equipment will be admitted to the lock chamber. For this purpose an identification recess is built in front of the first access to the lock chamber, where size, weight and the contours of the persons wanting to enter are roughly measured and compared with a code card carried along. The weight is established by a balance forming part of the base of the recess. By means of contact surfaces in the region of knees, upper thigh, chest and shoulder an upright position of the person is guaranteed. Scanning of the physical dimensions is performed with laser, infrared and light barriers. (DG) [de

  16. The mental health and substance misuse needs of male ex-armed forces personnel in prison.

    Science.gov (United States)

    Wainwright, Verity; Lennox, Charlotte; McDonnell, Sharon; Shaw, Jenny; Senior, Jane

    2018-01-01

    Ex-armed forces personnel constitute the largest known occupational group in prison but there is little evidence regarding their mental health, or substance misuse, needs. A total of 105 participants were interviewed and measures assessing symptoms of common mental health (CMH) problems and substance misuse were completed along with a review of their health care records. Forty (38%) participants screened for current CMH problems (CCMH) and high levels of dual symptomology and alcohol misuse were assessed. Thirty-nine (37%) had a mental health diagnosis recorded, most commonly for post-traumatic stress disorder (PTSD), depression and personality disorder. Those who screened for a CCMH problem were more likely to have pre-service vulnerability to negative health outcomes and those with dual symptomology were more likely to have experienced deployment during their service. Findings suggest the mental health needs of this group are similar to the general prison population. Potentially higher prevalences of PTSD and alcohol misuse may direct service provision.

  17. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  18. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  19. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  20. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  1. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  2. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  3. Personnel Risks in Ensuring Safety of Medical Activity

    Directory of Open Access Journals (Sweden)

    O. L. Zadvornaya

    2017-01-01

    Full Text Available Purpose: modern strategies of management of the organization require the formation of special management approaches based on the analysis of the mechanisms and processes of the organization of medical activities related to possible risks in activity of medical personnel. Based on international experience and own research the authors have identified features of a system of management of personnel risk in medical activities, examined approaches showing the sequence and contents of the main practical activities of the formation, maintenance and development of the system of management of personnel risks. Emphasized is the need for further research and implementation of the system of management of personnel risk in health care organizations. Study and assessment of personnel risks affecting the security of medical activities aimed at the development of the system of personnel risk management, development of a system of identification and monitoring of HR risk indicators with a purpose to improve institutional management and increase efficiency of activity of medical organizations. Methods: in the present study, the following methods were used: systemic approach, content analysis, methods of social diagnosis (questionnaires, interviews, comparative analysis, method of expert evaluations, method of statistical processing of information. Results: approaches to predict the occurrence and development of personnel risks have been reviewed and proposed. Conclusions and Relevance: patient safety is a global issue affecting countries at all levels of development. Each year, the WHO identifies a number of systemic and technical aspects and trends in the field of patient safety related to actions of medical workers. Existing imbalances in the staffing of the health system of the Russian Federation increase the probability of potential risks in medical practice. The personnel policy of healthcare of the Russian Federation requires further improvement and

  4. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  5. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    Science.gov (United States)

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  6. Role of U.S. Security Assistance in Modernizing the Portuguese Armed Forces: A Historical Analysis.

    Science.gov (United States)

    1986-09-01

    Portuguese Air Force Fiscal Year 1986 IMET/FMS Training Program Security Assistance Management Manual * "Portuguese Navy: A Naval Fleet that is...of the techniques of fiscal management and, within the limits that he had set for the regime, his program of economic recovery succeeded .... What...1984). Currency: Escudo * Agriculture: generally developed; 8.8,% of GDP; main crops - grains, potatoes, olives, grapes (wine); deficit foods - sugar

  7. From El Billar to Operations Fenix and Jaque: The Colombian Security Force Experience, 1998-2008

    Science.gov (United States)

    2009-12-01

    577–601. ———. Sostenibilidad De La Seguridad Democratica. Bogotá: Fundadcion Seguridad & Democracia, 23 February 2005. Rempe, Dennis M...Security Force Experience, 1998–2008 Robert D. Ramsey III Occasional Paper 34 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be

  8. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  9. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  10. International Affairs Programs: The Air Force Versus the Army

    Science.gov (United States)

    2015-10-01

    individual tutoring programs . Additionally RAS personnel are offered regional enhancement studies opportunities at several facilities.48 RAS personnel...AU/ACSC/2015 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY INTERNATIONAL AFFAIRS PROGRAMS : THE AIR FORCE VERSUS THE ARMY by Robin L...5 COMPARISON: INTERNATIONAL AFFAIRS PROGRAMS AIR FORCE VERSUS ARMY 8

  11. Understrength Air Force Officer Career Fields. A Force Management Approach

    Science.gov (United States)

    2005-01-01

    LtCol John Crown (DPSA). In addition, we had very helpful interviews with Mr. Vaughan Blackstone (DPAPP) and Mr. Dennis Miller (DPPAO). Also at...problems in managing personnel assignments. First, there is a high " tax " for special-duty jobs that requires them to place personnel officers into...targeted year-groups populated above the ideal force- structure line (called TOPLINE), in the run up to the RIF of 1992, the desire to avoid or

  12. Privacy Act System of Records: EPA Personnel Emergency Contact Files, EPA-44

    Science.gov (United States)

    Learn about the EPA Personnel Emergency Contact Files System, including including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedure.

  13. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  14. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi

  15. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  16. 77 FR 11142 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-02-24

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0133] Merchant Marine Personnel... at the Hilton San Francisco Airport Bayfront Hotel, 600 Airport Blvd., Burlingame, CA 94010. For..., we are inviting public comment on the issues to be considered by the working group, which are listed...

  17. 77 FR 65570 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0968] Merchant Marine Personnel... hotel facilities or services for individuals with disabilities or to request special assistance, contact... comment on the issues to be considered by the work group, which are listed in the ``Agenda'' section below...

  18. 32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities

    Science.gov (United States)

    2010-07-01

    ... designee 5. Chairman, Joint Chiefs of Staff and/or designee 6. Directors of the Defense Agencies and/or... personnel for assignment to Presidential Support activities: The Executive Secretary to the Secretary and... of Strategic Target Planning 2. Director, Joint Staff, OJCS 3. Chief of Staff, U.S. Army 4. Chief of...

  19. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  20. Inhalation exposure to jet fuel (JP8) among U.S. Air Force personnel.

    Science.gov (United States)

    Smith, Kristen W; Proctor, Susan P; Ozonoff, Al; McClean, Michael D

    2010-10-01

    As jet fuel is a common occupational exposure among military and civilian populations, this study was conducted to characterize jet fuel (JP8) exposure among active duty U.S. Air Force personnel. Personnel (n = 24) were divided a priori into high, moderate, and low exposure groups. Questionnaires and personal air samples (breathing zone) were collected from each worker over 3 consecutive days (72 worker-days) and analyzed for total hydrocarbons (THC), benzene, toluene, ethylbenzene, xylenes, and naphthalene. Air samples were collected from inside the fuel tank and analyzed for the same analytes. Linear mixed-effects models were used to evaluate the exposure data. Our results show that the correlation of THC (a measure of overall JP8 inhalation exposure) with all other analytes was moderate to strong in the a priori high and moderate exposure groups combined. Inhalation exposure to all analytes varied significantly by self-reported JP8 exposure (THC levels higher among workers reporting JP8 exposure), a priori exposure group (THC levels in high group > moderate group > low group), and more specific job task groupings (THC levels among workers in fuel systems hangar group > refueling maintenance group > fuel systems office group > fuel handling group > clinic group), with task groupings explaining the most between-worker variability. Among highly exposed workers, statistically significant job task-related predictors of inhalation exposure to THC indicated that increased time in the hangar, working close to the fuel tank (inside > less than 25 ft > greater than 25 ft), primary job (entrant > attendant/runner/fireguard > outside hangar), and performing various tasks near the fuel tank, such as searching for a leak, resulted in higher JP8 exposure. This study shows that while a priori exposure groups were useful in distinguishing JP8 exposure levels, job task-based categories should be considered in epidemiologic study designs to improve exposure classification. Finally

  1. Simulation of a force on force exercise

    International Nuclear Information System (INIS)

    Terhune, R.; Van Slyke, D.; Sheppard, T.; Brandrup, M.

    1988-01-01

    The Security Exercise Evaluation System (SEES) is under development for use in planning Force on Force exercises and as an aid in post-exercise evaluation. This study is part of the development cycle where the simulation results are compared to field data to provide guidance for further development of the model. SEES is an event-driven stochastic computer program simulating individual movement and combat within an urban terrain environment. The simulator models the physics of movement, line of sight, and weapon effects. It relies on the controllers to provide all knowledge of security tactics, which are entered by the controllers during the simulation using interactive color graphic workstations. They are able to develop, modify and implement plans promptly as the simulator maintains real time. This paper reports on how SEES will be used to develop an intrusion plan, test the security response tactics and develop observer logistics. A Force on Force field exercise will then be executed to follow the plan with observations recorded. An analysis is made by first comparing the plan and events of the simulation with the field exercise, modifying the simulation plan to match the actual field exercise, and then running the simulation to develop a distribution of possible outcomes

  2. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  3. Energy and Security: future-oriented studies for the Swedish Armed Forces; Energi och saekerhet: framtidsinriktade omvaerldsanalyser foer Foersvarsmakten

    Energy Technology Data Exchange (ETDEWEB)

    Oestensson, Malin; Jonsson, Daniel K.; Magnusson, Roger; Dreborg, Karl Henrik

    2009-01-15

    The report provides a basis for the Armed Forces long-term planning, and how changes in the global energy supply may mean new challenges and threats, as well as the advantages and disadvantages that can be associated with different future energy solutions for Armed Forces own activities, primarily relating to fuel and power during operation. One conclusion is that the potential conflict between energy security and climate-security can lead to far-reaching security implications and that continued global fossil dependency contributes to increased safety of political and military focus on a number of potential conflicts. A new such area may be the Arctic, as in the wake of climate change will become available for exploitation. Large scale global renewable energy can bring greater geographical spread - and reduced pressure on existing 'hot-spots'. Nuclear power is unlikely to be influential in the overall global energy security, but security problems associated with the production of nuclear materials can spread and be strengthened. Furthermore, the energy problems of connected to gaps between rich and poor, which may lead to social friction and conflict. The trend toward increased nationalisation and politicization of the energy is in contrast to free trade and market liberalism and may lead to further militarization of energy resources. Bilateral energy contracts may result in division within the EU and create a hindrance to joint positions and actions, such as in international efforts. As for Armed Forces own future energy solutions, the knowledge of alternative fuels (eg alcohols, diesel variants, gaseous fuels) and energy converters (eg hybrid vehicles, fuel cells) is reviewed. The following alternative principle solutions fuel and power are discussed: 1. Power from small-scale electricity generation via solar cells and small wind farms and power stations with liquid fuel as a supplement. Transport with plug-in hybrid vehicles, i.e. liquid propellants in

  4. Development of an integrated campus security alerting system ...

    African Journals Online (AJOL)

    This work presents an integrated alerting system which uses both the Internet Protocol (IP) cameras and micro-switches for monitoring security situations thereby providing an immediate alerting signal to the security personnel. The system has the input unit, processing unit, control unit and the power supply unit as its ...

  5. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  6. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  7. Administrative Circular No. 11 (Rev. 4) - Categories of members of the personnel

    CERN Multimedia

    HR Department

    2016-01-01

    Administrative Circular No. 11 (Rev. 4) entitled "Categories of members of the personnel", approved by the Director-General following discussion in the Standing Concertation Committee meeting on 29 April 2016, will be available on 1 August 2016 via this following link.    This revised circular cancels and replaces the Administrative Circular No. 11 (Rev. 3) also entitled "Categories of members of the personnel" of September 2014. The main changes concern the status of apprentices and their transfer from the category of employed members of personnel to associated members of personnel. This circular will enter into force on 1 August 2016. Department Head Office

  8. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  9. Manpower, Personnel, and Training Assessment (MPTA) Handbook

    Science.gov (United States)

    2015-11-01

    programs. 8. Target Audience Description ( TAD ) The TAD is the initial description of the number and type of personnel required to operate, maintain...requirements, etc.) describing the Soldiers operating or maintaining the system. In cases where operating a system requires a security clearance, the TAD ...Authority. Milestone Decision Authority Target Audience Description ( TAD ) AR 602-2 AR 611-1 DA Pam 611-21 X X X X X X The TAD lists

  10. Mental Disorder, Psychological Distress, and Functional Status in Canadian Military Personnel.

    Science.gov (United States)

    Sampasa-Kanyinga, Hugues; Zamorski, Mark A; Colman, Ian

    2018-01-01

    We examined the overlap between mood and anxiety disorders and psychological distress and their associations with functional status in Canadian Armed Forces (CAF) personnel. Data on Regular Forces personnel ( N = 6700) were derived from the 2013 Canadian Forces Mental Health Survey, a nationally representative survey of the CAF personnel. Current psychological distress was assessed using the Kessler K10 scale. Past-month mood and anxiety disorders were assessed using the World Health Organization World Mental Health Composite Diagnostic Interview. The prevalence of psychological distress was the same as that of any past-month mood or anxiety disorder (7.1% for each). A total of 3.8% had both distress and past-month mood or anxiety disorder, 3.3% had past-month disorder without psychological distress, while another 3.3% had psychological distress in the absence of a past-month mood or anxiety disorder. After adjusting for age, sex, marital, education, income, language, element, rank, and alcohol use disorder, individuals with both psychological distress and past-month mood and anxiety disorders exhibited the highest levels of disability, days out of role, and work absenteeism relative to those with neither mental disorders nor psychological distress. Relative to individuals with both disorder and distress, those who endured distress in the absence of mental disorder exhibited lower, but meaningful, levels of disability compared with those with neither disorder nor distress. Disability is most severe among CAF personnel with both distress and past-month mood and anxiety disorders. Nevertheless, distress in the absence of disorder is prevalent and is associated with meaningful levels of disability.

  11. [Formula: see text]Determination of the smoking gun of intent: significance testing of forced choice results in social security claimants.

    Science.gov (United States)

    Binder, Laurence M; Chafetz, Michael D

    2018-01-01

    Significantly below-chance findings on forced choice tests have been described as revealing "the smoking gun of intent" that proved malingering. The issues of probability levels, one-tailed vs. two-tailed tests, and the combining of PVT scores on significantly below-chance findings were addressed in a previous study, with a recommendation of a probability level of .20 to test the significance of below-chance results. The purpose of the present study was to determine the rate of below-chance findings in a Social Security Disability claimant sample using the previous recommendations. We compared the frequency of below-chance results on forced choice performance validity tests (PVTs) at two levels of significance, .05 and .20, and when using significance testing on individual subtests of the PVTs compared with total scores in claimants for Social Security Disability in order to determine the rate of the expected increase. The frequency of significant results increased with the higher level of significance for each subtest of the PVT and when combining individual test sections to increase the number of test items, with up to 20% of claimants showing significantly below-chance results at the higher p-value. These findings are discussed in light of Social Security Administration policy, showing an impact on policy issues concerning child abuse and neglect, and the importance of using these techniques in evaluations for Social Security Disability.

  12. 32 CFR 552.109 - Routine security controls.

    Science.gov (United States)

    2010-07-01

    ..., dependent, or DoD civilian identification cards are authorized unimpeded access to Fort Lewis during periods... who desire to visit unit areas, club facilities and other recreational facilities, security personnel...

  13. Nuclear security culture: a generic model for universal application

    International Nuclear Information System (INIS)

    Khripunov, I.

    2005-01-01

    Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that

  14. The WINS Academy Security Certification Programme: The Route to Demonstrable Competence

    International Nuclear Information System (INIS)

    Howsley, Roger

    2014-01-01

    Key Messages: The Nuclear Sector is a long way behind other sectors in certifying personnel with security accountabilities as being competent; We need to do something about it urgently; Attending security awareness courses is simply not enough

  15. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  16. Malaria and mefloquine prophylaxis use among Japan Ground Self-Defense Force personnel deployed in East Timor.

    Science.gov (United States)

    Fujii, Tatsuya; Kaku, Koki; Jelinek, Tomas; Kimura, Mikio

    2007-01-01

    Malaria poses a significant threat to military personnel stationed in endemic areas; therefore, it is important to examine the risks of military operations, particularly in areas where malaria-related data are scarce. The recent deployment of Japan Ground Self-Defense Force (JGSDF) for a peacekeeping operation in East Timor provided an opportunity to investigate these risks. The results of these studies may be translated into chemoprophylactic strategies for travelers. A total of 1,876 members were deployed between April 2002 and September 2003. They consisted of three battalions; each remained for 6 months and was put on mefloquine prophylaxis. Malaria infection was investigated, including exposure to Plasmodium falciparum sporozoites, assessed by seroconversion for anticircumsporozoite (anti-CS) protein antibodies. Adherence to and adverse events (AEs) of mefloquine were studied via questionnaires. Four members were evacuated: one each with optic neuritis, lung cancer with brain metastasis, IgA nephropathy, and psychotic reactions that may have been precipitated by mefloquine. Six clinical episodes of Plasmodium vivax occurred, including one relapse, but there were no clinical cases of P falciparum, yielding a crude malaria attack rate of 0.32% for the 6-month period. Overall, 3.1% of the study population seroconverted for the anti-CS protein antibodies, with some regional differences noted. About 24% of questionnaire respondents, reported AEs; however, none of the AEs was severe. The AEs tended to emerge during the initial doses of chemoprophylaxis. The implementation of mefloquine prophylaxis among JGSDF personnel in East Timor, where P falciparum constitutes a moderate risk, appears to have been a success. Mefloquine prophylaxis was generally safe for Japanese unless predisposed to neuropsychiatric illness. However, given that mefloquine is the only chemoprophylactic agent available, a risk-benefit analysis tailored to the traveler is required for visits to

  17. Psychological help and psychoprophilaxis for the SRF personnel

    International Nuclear Information System (INIS)

    Kurochka, V.K.; Zhur, M.M.; Ratanov, Yu.Z.; Olejnik, S.I.

    1998-01-01

    Due to the growth of mental disorders in military personnel of strategic rocket forces the combined approach is considered to solving this problem connected with occupational exposure to ionizing radiation and electromagnetic radiation as well as to missile fuel. System for the psychoprophilactic measures and psychiatric help is discussed [ru

  18. Technical obstacles to nuclear security - Russian perspective

    International Nuclear Information System (INIS)

    Pshakin, G.

    2005-01-01

    Full text: Present political, economical and social development the world - wide and in particular countries and regions facilitate number of serious and dangerous challenges for people responsible for security of materials and facilities, which could be used as a threat to the humankind in case of unauthorized approach. A number of factors have impact on the security including political, social, financial and technical nature. The security of nuclear materials and facilities where nuclear materials located and under processing is facing a number of problems such as control of the personnel who is handling the materials, access to the materials and the facilities, accounting and control of the materials storage, transportation, transactions, processing, physical protection of the materials. Each aspect of those problems must be taken into account for establishing most efficient way to keep the nuclear materials out of hands of the terrorists. Technical aspects which require serious and intent relation from political and technical communities in Russia (as example) are the following: legal base for nuclear materials protection, control and accounting and export control; personnel for nuclear materials control and accounting - skill, reliability, responsibility, training and new generation education; personnel for physical protection - skill, reliability, responsibility, training; structure of the system and equipment for materials control, verification, accountability; structure of the system and equipment for physical protection; regulatory supervision of the MPC+A system effectiveness. (author)

  19. Smoking among troops deployed in combat areas and its association with combat exposure among navy personnel in Sri Lanka

    Directory of Open Access Journals (Sweden)

    de Silva Varuni

    2012-07-01

    Full Text Available Abstract Background Among military personnel alcohol consumption and binge-drinking have increased but cigarette smoking has declined in the recent past. Although there is a strong association between smoking and PTSD the association between combat exposure and smoking is not clear. Methods This cross sectional study was carried out among representative samples of SLN Special Forces and regular forces deployed in combat areas. Both Special Forces and regular forces were selected using simple random sampling. Only personnel who had served continuously in combat areas during the one year period prior to end of combat operations were included in the study. Females were not included in the sample. The study assessed several mental health outcomes as well as alcohol use, smoking and cannabis use. Sample was classified according to smoking habits as never smokers, past smokers (those who had smoked in the past but not within the past year and current smokers (those smoking at least one cigarette within the past 12 months. Results Sample consisted of 259 Special Forces and 412 regular navy personnel. Prevalence of current smoking was 17.9% (95% CI 14.9-20.8. Of the sample 58.4% had never smoked and 23.7% were past smokers. Prevalence of current smoking was significantly higher among Special Forces personnel compared to regular forces. (OR 1.90 (95% CI 1.20-3.02. Personnel aged ≥35 years had the lowest prevalence of smoking (14.0%. Commissioned officers had a lower prevalence (12.1% than non commissioned officers or other ranks. After adjustment for demographic variables and service type there was significant association between smoking and combat experiences of seeing dead or wounded [OR 1.79 (95%CI 1.08-2.9], handling dead bodies [OR 2.47(95%CI 1.6-3.81], coming under small arms fire [OR 2.01(95%CI 1.28-3.15] and coming under mortar, missile and artillery fire [OR 2.02(95%CI 1.29-3.17]. There was significant association between the number of

  20. SOUTH AFRICA AND THE SADC STAND-BY FORCE

    African Journals Online (AJOL)

    hennie

    Such institutions depict the power relations prevailing at .... ministers responsible for foreign affairs, defence, public security and state security from each ...... 15 Force-to-force ratios measure how big an international force has to be to balance.

  1. 10 CFR Appendix B to Part 73 - General Criteria for Security Personnel

    Science.gov (United States)

    2010-01-01

    .... Fixed site. B. Transportation. VI. Nuclear Power Reactor Training and Qualification Plan for Personnel.... Definitions Introduction Applicants and power reactor licensees subject to the requirements of § 73.55 shall... licensee to investigate into or judge the reading habits, political or religious beliefs, or attitudes on...

  2. Securing Document Warehouses against Brute Force Query Attacks

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2017-04-01

    Full Text Available The paper presents the scheme of data management and protocols for securing document collection against adversary users who try to abuse their access rights to find out the full content of confidential documents. The configuration of secure document retrieval system is described and a suite of protocols among the clients, warehouse server, audit server and database management server is specified. The scheme makes it infeasible for clients to establish correspondence between the documents relevant to different search queries until a moderator won’t give access to these documents. The proposed solution allows ensuring higher security level for document warehouses.

  3. Force Protection Common Operational Picture/Common Tactical Picture

    National Research Council Canada - National Science Library

    Peter, Russell

    1998-01-01

    ... has taken an integrated approach to Force Protection. There is a recognition that Force Protection is not a Security Police operation; but is a Security Force oDeration. This exemplifies a mindset change and a movement away from pure.

  4. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  5. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  6. 5 CFR 930.210 - Reduction in force.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Reduction in force. 930.210 Section 930... § 930.210 Reduction in force. (a) Retention preference regulations. Except as modified by this section, the reduction in force regulations in part 351 of this chapter apply to administrative law judges. (b...

  7. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  8. Authorization gives the personnel he/she gives the center he/she gives Isotopes for the acting he/she gives tied functions with the security and the radiological protection

    International Nuclear Information System (INIS)

    Perez Pijuan, S.; Hernandez Alvarez, R.; Peres Reyes, Y.; Venegas Bernal, M.C.

    1998-01-01

    The conception is described used in a center production labelled compound and radiopharmaceuticals for the authorization to the support, operation and supervision personnel The approaches are exposed used to define the excellent positions for the security the installation. The are described the training programs, designed starting from the indentification the specific competitions for each duty station and with particular emphasis in the development gives abilities you practice. It is used for the administration and evaluation gives the programs training the Automated System Administration Programs Training (GESAT)

  9. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  10. A performance evaluation of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.; Wright, L.J.

    1987-01-01

    Personnel identity verification devices, which are based on the examination and assessment of a body feature or a unique repeatable personal action, are steadily improving. These biometric devices are becoming more practical with respect to accuracy, speed, user compatibility, reliability and cost, but more development is necessary to satisfy the varied and sometimes ill-defined future requirements of the security industry. In an attempt to maintain an awareness of the availability and the capabilities of identity verifiers for the DOE security community, Sandia Laboratories continues to comparatively evaluate the capabilities and improvements of developing devices. An evaluation of several recently available verifiers is discussed in this paper. Operating environments and procedures more typical of physical access control use can reveal performance substantially different from the basic laboratory tests

  11. 5 CFR 359.602 - Agency reductions in force.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Agency reductions in force. 359.602... Appointees as a Result of Reduction in Force § 359.602 Agency reductions in force. (a) Competitive procedures... removed from the SES in any reduction in force of career appointees within the agency. Such competitive...

  12. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  13. ILO Policy Guidelines on the promotion of decent work for early childhood education personnel

    OpenAIRE

    ILO International Labour Office

    2014-01-01

    These Guidelines set out principles for the promotion of decent work for early childhood education (ECE) personnel as a means of ensuring universal access to high-quality ECE services. In this respect they cover conditions of work and employment of ECE personnel and related issues, including ECE financing, curricula and learning practices, social security, professional ethics and ECE governance systems. The Guidelines are meant to serve as a reference tool on principles that should be reflect...

  14. Task team approach to safeguards and security designs

    International Nuclear Information System (INIS)

    Zack, N.R.; Wilkey, D.D.

    1991-01-01

    In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications

  15. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  16. Improved resiliency and well-being among military personnel in a Swedish Naval Force after a counter-piracy operation off the coast of Somalia.

    Science.gov (United States)

    Bäccman, Charlotte; Hjärthag, Fredrik; Almqvist, Kjerstin

    2016-08-01

    The aim of this study was to explore: (1) how the psychological health of the members of the first European Union Naval Force (ME01) was affected by international deployment off the coast of Somalia; and (2) if and how organizational and personal factors (e.g., type of personnel category, previous experiences, and resilience) affected their psychological health and well-being post-deployment. The study had an exploratory longitudinal design, where the participants were assessed both before and after deployment (i.e., T1 and T2). The participants (n = 129, 120 men, 9 women) were equally distributed between officers (n = 68; 64 men, 4 women) and sailors (n = 61; 56 men, 5 women). The members' average age was 31 years, ranging from 20 to 61. For the majority (78%) ME01 was their first international deployment and officers were, in general, more experienced than sailors. The overall results showed that the members' reported a positive experience with improved resilience and well-being (e.g., sense of coherence). However, the result also showed that type of personnel category (i.e., officer or sailor) affected their psychological health. Why and how these differences among military personnel arise is discussed, but deserves further attention. © 2016 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  17. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  18. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  19. development of an integrated campus security alerting system

    African Journals Online (AJOL)

    user

    Keywords: Campus Security, Microcontroller, Internet Protocol Camera, Integrated system, Micro-switches. 1. INTRODUCTION .... personnel can fall back to the information captured/stored ...... Adetoba A. O. "Design and Construction of a Car.

  20. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  1. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  2. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Science.gov (United States)

    2011-10-13

    ... implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and... policies and minimum standards will address all agencies that operate or access classified computer...

  3. [Retrospective study of ALS in French military personnel].

    Science.gov (United States)

    Drouet, A; Desjeux, G; Balaire, C; Thevenin-Garron, V

    2010-01-01

    An apparent increased risk for developing Amyotrophic Lateral Sclerosis (ALS), a multifactorial neurodegenerative disease, is considered to exist in the military population. ALS military and veteran patients were retrospectively recruited in April 2008 by searching medical data (Hippocrate) and repayment data (Erasme) of the French National Military Health Care Fund (Caisse nationale militaire de sécurité sociale, CNMSS) from de January 1991 to December 2007. We report a series of 73 patients, 69 male and four female, average age of 52.5 years (range 27 to 72 years) with a peak of patients in the 50-59 year age class. The branch of military service was Army (n=26 patients), Air force (n=14), Navy (n=10) and State Police Force (n=22). The incidence among male active duty military personnel was stable from 2002 to 2007; it was less than the general population (1.7/100,000 per year in 2007), but higher in the 40-44 and 50-54 year age classes (1.90 and 5.07/100,000 per year in 2007 respectively). Duration of active duty was on average 31 years. The retrospective nature of the data and the incomplete population with loss of retired military personnel without CNMSS affiliation are limitations of our study. Another means of collecting all cases of ALS among French military personnel and veterans would be to conduct a search in the 17 ALS centers in France with analysis by occupational activity for entire career.

  4. Beyond Race and Gender: Motivating Enlisted Personnel to Remain in Today's Military

    National Research Council Canada - National Science Library

    Moore, Brenda

    2001-01-01

    .... Data from the Armed Forces 1996 Equal Opportunity Survey reveal that both the pay and benefits and pride in service variables have stronger effects on the propensity of junior-enlisted personnel...

  5. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  6. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  7. What explains post-traumatic stress disorder (PTSD) in UK service personnel: deployment or something else?

    Science.gov (United States)

    Jones, M; Sundin, J; Goodwin, L; Hull, L; Fear, N T; Wessely, S; Rona, R J

    2013-08-01

    In previous studies an association between deployment to Iraq or Afghanistan and an overall increased risk for post-traumatic stress disorder (PTSD) in UK armed forces has not been found. The lack of a deployment effect might be explained by including, in the comparison group, personnel deployed on other operations or who have experienced traumatic stressors unrelated to deployment. The sample comprised 8261 regular UK armed forces personnel who deployed to Iraq, Afghanistan or other operational areas or were not deployed. Participants completed the PTSD CheckList-Civilian Version (PCL-C) and provided information about deployment history, demographic and service factors, serious accidents and childhood experiences. Deployment to Iraq or Afghanistan [odds ratio (OR) 1.2, 95% confidence interval (CI) 0.6-2.2] or elsewhere (OR 1.1, 95% CI 0.6-2.0) was unrelated to PTSD although holding a combat role was associated with PTSD if deployed to Iraq or Afghanistan (OR 2.7, 95% CI 1.9-3.9). Childhood adversity (OR 3.3, 95% CI 2.1-5.0), having left service (OR 2.7, 95% CI 1.9-4.0) and serious accident (OR 2.1, 95% CI 1.4-3.0) were associated with PTSD whereas higher rank was protective (OR 0.3, 95% CI 0.12-0.76). For the majority of UK armed forces personnel, deployment whether to Iraq, Afghanistan or elsewhere confers no greater risk for PTSD than service in the armed forces per se but holding a combat role in those deployed to Iraq or Afghanistan is associated with PTSD. Vulnerability factors such as lower rank, childhood adversity and leaving service, and having had a serious accident, may be at least as important as holding a combat role in predicting PTSD in UK armed forces personnel.

  8. 5 CFR 359.405 - Removal: Reduction in force.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Removal: Reduction in force. 359.405... Appointees During Probation § 359.405 Removal: Reduction in force. (a) Coverage. This section covers the removal of a career appointee from the SES during the probationary period under a reduction in force. (b...

  9. Mental health status of Sri Lanka Navy personnel three years after end of combat operations: a follow up study.

    Directory of Open Access Journals (Sweden)

    Raveen Hanwella

    Full Text Available The main aim of this study was to assess the mental health status of the Navy Special Forces and regular forces three and a half years after the end of combat operations in mid 2009, and compare it with the findings in 2009. This cross sectional study was carried out in the Sri Lanka Navy (SLN, three and a half years after the end of combat operations. Representative samples of SLN Special Forces and regular forces deployed in combat areas were selected using simple random sampling. Only personnel who had served continuously in combat areas during the one year period prior to the end of combat operations were included in the study. The sample consisted of 220 Special Forces and 275 regular forces personnel. Compared to regular forces a significantly higher number of Special Forces personnel had experienced potentially traumatic events. Compared to the period immediately after end of combat operations, in the Special Forces, prevalence of psychological distress and fatigue showed a marginal increase while hazardous drinking and multiple physical symptoms showed a marginal decrease. In the regular forces, the prevalence of psychological distress, fatigue and multiple somatic symptoms declined and prevalence of hazardous drinking increased from 16.5% to 25.7%. During the same period prevalence of smoking doubled in both Special Forces and regular forces. Prevalence of PTSD reduced from 1.9% in Special Forces to 0.9% and in the regular forces from 2.07% to 1.1%. Three and a half years after the end of combat operations mental health problems have declined among SLN regular forces while there was no significant change among Special Forces. Hazardous drinking among regular forces and smoking among both Special Forces and regular forces have increased.

  10. Mental health status of Sri Lanka Navy personnel three years after end of combat operations: a follow up study.

    Science.gov (United States)

    Hanwella, Raveen; Jayasekera, Nicholas E L W; de Silva, Varuni A

    2014-01-01

    The main aim of this study was to assess the mental health status of the Navy Special Forces and regular forces three and a half years after the end of combat operations in mid 2009, and compare it with the findings in 2009. This cross sectional study was carried out in the Sri Lanka Navy (SLN), three and a half years after the end of combat operations. Representative samples of SLN Special Forces and regular forces deployed in combat areas were selected using simple random sampling. Only personnel who had served continuously in combat areas during the one year period prior to the end of combat operations were included in the study. The sample consisted of 220 Special Forces and 275 regular forces personnel. Compared to regular forces a significantly higher number of Special Forces personnel had experienced potentially traumatic events. Compared to the period immediately after end of combat operations, in the Special Forces, prevalence of psychological distress and fatigue showed a marginal increase while hazardous drinking and multiple physical symptoms showed a marginal decrease. In the regular forces, the prevalence of psychological distress, fatigue and multiple somatic symptoms declined and prevalence of hazardous drinking increased from 16.5% to 25.7%. During the same period prevalence of smoking doubled in both Special Forces and regular forces. Prevalence of PTSD reduced from 1.9% in Special Forces to 0.9% and in the regular forces from 2.07% to 1.1%. Three and a half years after the end of combat operations mental health problems have declined among SLN regular forces while there was no significant change among Special Forces. Hazardous drinking among regular forces and smoking among both Special Forces and regular forces have increased.

  11. Drug Use and Abuse: Background Information for Security Personnel

    Science.gov (United States)

    1994-05-01

    Neurotoxicity of methamphetamine : Mechanisms of action and issues related to aging. In Miller, M. A., & Kozel, N. J., (Eds.), op. cit. 99. Cox et al...lives. This presents a dilemma for clearance adjudicators. If clearance standards are too lax, security may not be protected . If standards are too...strict, many well-adjusted, adventuresome, and creative employees may be screened out. Drug use may weaken judgment and affect ability to protect

  12. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  13. Biometrics in support of special forces medical operations.

    Science.gov (United States)

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.

  14. 76 FR 39887 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2011-07-07

    ... Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... the site visit, TSA personnel complete the CSR form, which asks security-related questions. This...

  15. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  16. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  17. Meeting the healthcare needs of transgender people within the armed forces: putting UK military policy into practice.

    Science.gov (United States)

    Whybrow, Dean; New, Chris; Coetzee, Rik; Bickerstaffe, Paul

    2016-12-01

    To explain how the healthcare needs of transgender personnel are met within the United Kingdom Armed Forces. It may be that when transgender people disclose their gender preference that they are at increased risk of social exclusion. The United Kingdom Armed Forces has an inclusive organisational policy for the recruitment and management of transgender personnel. This is a position paper about how the healthcare needs of transgender military personnel are met by the United Kingdom Armed Forces. United Kingdom Armed Forces policy was placed into context by reviewing current research, discussing medical terminology and describing the policy. This was followed by an account of how UK AF policy is applied in practice. Where armed forces had an inclusive policy for the management of transgender personnel, there seemed to be little cause for secrecy and zero tolerance of discrimination when compared to nations where this was not the case. Medical terminology has changed to reflect a more inclusive, less stigmatising use of language. The United Kingdom Armed Forces policy has been described as progressive and inclusive. The application of this policy in practice may be dependent upon strong leadership and training. The wider United Kingdom Armed Forces seems capable of adopting a pragmatic and flexible approach to meeting the healthcare needs of transgender personnel. The United Kingdom Armed Forces value diversity within their workforce and have a progressive, inclusive policy for the recruitment and management of transgender personnel. When supporting a transgender military person, healthcare professionals, civilian organisations and military line managers should consider referring to United Kingdom Armed Forces policy as early as possible. Other military and uniformed services may wish to examine the United Kingdom Armed Forces exemplar in order to consider the applicability within their own organisational setting. © 2016 John Wiley & Sons Ltd.

  18. Face recognition in securing optical telecom network equipment

    International Nuclear Information System (INIS)

    Ali, N.M.

    2015-01-01

    In this paper, face recognition is used with a microcontroller based hardware module to secure the telecommunication equipments like ONU (optical network units) or any other telecommunication equipment. The face recognition classifier value optimization adaption is deployed and in this scheme by increasing or decreasing the number of images in the database will automatically generate and adopt the classifier value for recognition of known and unknown persons. On recognizing and unknown persons. On recognizing an unknown person, the hardware module will send an SMS to the concerned security personnel for security preventive measures. (author)

  19. DOD PERSONNEL CLEARANCES: Additional OMB Actions Are Needed to Improve the Security Clearance Process

    National Research Council Canada - National Science Library

    2006-01-01

    Our independent analysis of timeliness data showed that industry personnel contracted to work for the federal government waited more than one year on average to receive top secret clearances, longer...

  20. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  1. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  2. Conceptual Design of an Enlisted Force Management System for the Air Force.

    Science.gov (United States)

    1983-08-01

    system will be ected toward qrade restructurisq, personne planniuq, and personnel proqrammiaq. Accossion Por NT1 - rPAS:T LBy- Distribhition/ Availability...used as loss predictors are stable enough that one can assign mean values to a cell in the inventory (for medium-term prediction), and which...characteristics require expansion of the number of cells ? We expect that the first- term force will be divided into more cells than the career force. 5.5. DATA TO

  3. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  4. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  5. Social Security, Cash Payments and Awards to Servicemen of the Red Army Air Force in the Great Patriotic War of 1941–1945

    Directory of Open Access Journals (Sweden)

    Alexander P. Abramov

    2016-07-01

    Full Text Available On the basis of the historical and sociological material presented materials about the Soviet state measures during the Great Patriotic War for the implementation of social policy in respect of the military air force of the Red Army, expressed in monetary incentives, rewards and social guarantees. The author notes that the implementation of social management practices at each stage of warfare timely adjustments depending on acquired combat experience and the strategic objectives of war. Existing wartime monetary awards system and social guarantees in respect of the personnel of the Red Army Air Force was not a major, but significant moral incentive for both pilots, as for representatives of other arms and services.

  6. Homosexuality in the Dutch Armed Forces 2006

    NARCIS (Netherlands)

    Anna Adolfsen; Saskia Keuzenkamp; m.m.v. Linda Mans

    2006-01-01

    Original title: Uniform uit de kast. This study looks at the attitudes of defence personnel to homosexuality. How do members of the military view homosexual colleagues? Can gays and lesbians working in the armed forces be open about their sexual preferences? Do they regard the armed forces as

  7. Special feature article-very urgent nuclear energy personnel training

    International Nuclear Information System (INIS)

    Saito, Shinzo; Tsujikura, Yonezo; Kawahara, Akira

    2007-01-01

    Securing human resources is important for the sustainable development of research, development and utilization of nuclear energy. However, concerns have been raised over the maintenance of human resources due to the decline of public and private investment in research and development of nuclear energy in recent years. To that end, it is essential for the workplace in the field of nuclear energy to be engaging. This special feature article introduced the Government's fund program supporting universities and vocational colleges to develop human resources in the area of nuclear energy. Electric utilities, nuclear industries, nuclear safety regulators and related academia presented respective present status and issues of nuclear energy personnel training with some expectations to the program to secure human resources with professional qualifications. (T. Tanaka)

  8. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  9. What Roles and Missions for Europe’s Military and Security Forces in the 21st Century?

    Science.gov (United States)

    2005-08-01

    Studies Dr. John L. Clarke vi Executive Summary Are armies the dinosaurs of the 21st Century, soon to become extinct in the new security environment? What...and 40-year old weapons systems. Dr. John L. Clarke 6 For many reasons , Europe’s armed forces are in a long-term period of decline, and this trend is...in a reasonable period of time and on a high level of interoperability. The capability of carrying out sophisticated operations with a high operational

  10. EKSISTENSI BANTUAN HUKUM TERHADAP PRAJURIT TNI SEBAGAI PELAKU TINDAK PIDANA DAN PRAKTIKNYA / The Existence And Practice Of Legal Assistance To Indonesian National Armed Forces Personnel As Criminal Offender

    Directory of Open Access Journals (Sweden)

    Tumbur Palti D Hutapea

    2016-11-01

    Full Text Available Bantuan Hukum merupakan bantuan yang diberikan oleh seorang ahli di bidang hukum atau penasihat hukum kepada seorang yang terkena masalah hukum di setiap tahapan pemeriksaan baik di luar maupun di dalam pengadilan. Peranan bantuan hukum bagi Prajurit TNI sangat diperlukan dalam menghadapi permasalahan hukum yang dihadapinya. Peraturan perundang-undangan yang mengatur bantuan hukum di lingkungan TNI sepanjang sejarah berdirinya TNI telah mengutamakan bantuan hukum yang berasal dari internal TNI berdasarkan perintah di mana personilnya belum memiliki akreditasi/sertifikasi, sehingga kalangan eksternal sulit memasuki lingkungan hukum militer sebab harus memperoleh izin Perwira Penyerah Perkara (Papera. Perlunya prioritas percepatan RUU tentang Peradilan Militer yang salah satunya merevisi aturan pemberian bantuan hukum kepada Prajurit TNI. Selanjutnya diperlukan kebebasan memilih dan menetapkan layanan bantuan hukum dari advokat profesional atau dengan menggunakan sarana posbakum, khususnya perkara yang diancam pidana mati dan pidana tambahan berupa pemecatan dari dinas militer.   Legal assistance is an assistance given by an expertise in law area or legal advisors to those who have legal problems at every stage of investigation both outside and inside the court. The role of legal assistance for Indonesian National Armed Forces personnel is important. The Legislation covering legal assistance in the Indonesian National Armed Forces community throughout the history has prioritized internal legal assistance where the personnel itself does not have certification/ accreditation for it. The external is hard to get involve and have to obtain special permission from the Officers hand the case (Papera. Accelerating the Bill on Military Justice to revise the rules on providing legal assistance to Army personnel is priority. Furthermore, the necessary freedom to choose and establish legal assistance services of a professional advocate or by means POSBAKUM

  11. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  12. US Air Force Base Observations

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Hourly observations taken by U.S. Air Force personnel at bases in the United States and around the world. Foreign observations concentrated in the Middle East and...

  13. Analysis of health professional security behaviors in a real clinical setting: an empirical study.

    Science.gov (United States)

    Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis

    2015-06-01

    The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  14. Personnel monitoring

    International Nuclear Information System (INIS)

    1965-01-01

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  15. Personnel monitoring

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1966-12-31

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  16. Health Status of Military Women in the Total Force

    National Research Council Canada - National Science Library

    Bray, Robert

    1997-01-01

    ..., Air Force, and Guard/Reserve components. These data will be combined with comparable data from a Naval Health Research Center survey of active-duty Navy and Marine Corps personnel to form a comprehensive dataset for the Total Force...

  17. Assessing the Effectiveness of Alternative Community-Led Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While many believe the state has a monopoly on the legitimate use of force, realities on the ground challenge this assertion, particularly in conflict and ... It will document alternative sources of governance, security, and justice that urban communities apply when state security forces are weak, unresponsive, or abusive.

  18. Pakistan’s national Centre of Excellence contributes to sustaining nuclear security

    International Nuclear Information System (INIS)

    Dixit, Aabha

    2016-01-01

    Pakistani front line officers and first responders are in a better position to fight illicit trafficking in nuclear and other radioactive materials, as well as to use advanced radiation detection and monitoring equipment, thanks to training they have received at the country’s Centre of Excellence for Nuclear Security. This is just one of the benefits the country has reaped from the Centre, which is collaborating with the growing International Network for Nuclear Security Training and Support Centres (NSSC Network), building national capacity through training and strengthening technical and scientific support programmes. Since the establishment of the Centre of Excellence, Pakistan has organized training courses on nuclear security for personnel from national and regional organizations. The Centre of Excellence also offers technical support to personnel involved in the maintenance and upgrade of facilities, with a focus on enhancing technical and scientific skills and quality control of equipment.

  19. The security system of nuclear installations and its impact on labour law

    International Nuclear Information System (INIS)

    Daeubler, W.

    1984-01-01

    'Hazardous technologies', in particular nuclear technology, are a challenge to labour law because in these branches of industry, selection of personnel and employment conditions are completely governed by government regulations, and codetermination rights often are neutralized due to security regulations. The author investigates ways and means of reconciling the interests of security provisions on the one hand, and of codetermination rights on the other. The crucial points in this context are inevitable measures such as security screening of personnel, surveillance and physical protection measures, secrecy protection. The author discusses the difficult issue of whether there are possibilities to off-set the curtailments of the right of codetermination by new ways and means of participation by employees which ought to be offered on a higher level, i.e. on the authorities level rather than on the level of industrial plants. (HSCH) [de

  20. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  1. Reflections on Africa's Security Situation: An Examination of Nigeria ...

    African Journals Online (AJOL)

    One of the greatest challenges that twenty-first century African states face is that of security. Of the four arms of the state security system, namely, the Army, Air Force, Navy and Police, the latter has been the most taunted. Ordinarily, the Police Force, being the closest of all the forces to civilians, is expected to be the protector ...

  2. Study of computerized spirometric parameters of traffic police personnel of Saurashtra region, Gujarat, India.

    Science.gov (United States)

    Makwana, Amit H; Solanki, Jayesh D; Gokhale, Pradnya A; Mehta, Hemant B; Shah, Chinmay J; Gadhavi, Bhakti P

    2015-01-01

    Air pollution due to road traffic is a serious health hazard and air quality crisis in cities is mainly due to vehicular emission. Thus the persons who are continuously exposed are at an increased risk. The study was carried out to evaluate the extent of impairment in lung function in traffic police personnel compared to matched unexposed control group. A cross-sectional study was conducted to measure the spirometric parameters of 100 traffic police personnel, aged 20-55 years, working in Saurashtra region, as compared to matched control group, consisting of 100 unexposed males. Measurement of lung volumes and capacities was done with SPIROEXCEL. The statistical analysis was carried out with Graph pad instat 3. Traffic police personnel had significantly declined forced vital capacity (FVC), forced expiratory volume in one second (FEV 1), slow vital capacity (SVC) and maximum voluntary ventilation (MVV) when compared with predictive normal values, which is probably due to exposure to vehicular exhaust. Comparison of test values between groups showed significantly reduced FVC, MVV and increased FEV1/FVC ratio and insignificantly declined FEV1 and SVC in cases as compared to controls. Traffic personnel with longer duration of exposure showed significantly reduced lung functions than those with shorter duration. Smokers showed lower test values as compared to non-smokers with significance only in unexposed group. The effect of pollution by vehicular exhausts may be responsible for these pulmonary function impairments and traffic police personnel should be offered personal protective or preventive measures.

  3. A predeployment trauma team training course creates confidence in teamwork and clinical skills: a post-Afghanistan deployment validation study of Canadian Forces healthcare personnel.

    Science.gov (United States)

    McLaughlin, Thomas; Hennecke, Peter; Garraway, Naisan Robert; Evans, David C; Hameed, Morad; Simons, Richard K; Doucet, Jay; Hansen, Daniel; Annand, Siobhan; Bell, Nathaniel; Brown, D Ross

    2011-11-01

    The 10-day Intensive Trauma Team Training Course (ITTTC) was developed by the Canadian Forces (CFs) to teach teamwork and clinical trauma skills to military healthcare personnel before deploying to Afghanistan. This article attempts to validate the impact of the ITTTC by surveying participants postdeployment. A survey consisting of Likert-type multiple-choice questions was created and sent to all previous ITTTC participants. The survey asked respondents to rate their confidence in applying teamwork skills and clinical skills learned in the ITTTC. It explored the relevancy of objectives and participants' prior familiarity with the objectives. The impact of different training modalities was also surveyed. The survey showed that on average 84.29% of participants were "confident" or "very confident" in applying teamwork skills to their subsequent clinical experience and 52.10% were "confident" or "very confident" in applying clinical knowledge and skills. On average 43.74% of participants were "familiar" or "very familiar" with the clinical topics before the course, indicating the importance of training these skills. Participants found that clinical shadowing was significantly less valuable in training clinical skills than either animal laboratory experience or experience in human patient simulators; 68.57% respondents thought that ITTTC was "important" or "very important" in their training. The ITTTC created lasting self-reported confidence in CFs healthcare personnel surveyed upon return from Afghanistan. This validates the importance of the course for the training of CFs healthcare personnel and supports the value of team training in other areas of trauma and medicine.

  4. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  5. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  6. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  7. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  8. Air Force's Transformation to an Expeditionary Culture

    National Research Council Canada - National Science Library

    Anderson, Richard D

    2007-01-01

    .... In response, leadership developed the Air Expeditionary Force (AEF) whereby units and personnel could schedule training, education, and family events such as holidays, vacations, graduations and weddings...

  9. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  10. Force Structure: Capabilities and Cost of Army Modular Force Remain Uncertain

    National Research Council Canada - National Science Library

    2006-01-01

    .... In short, because of uncertainties in cost, equipment, and personnel plans and the absence of a comprehensive approach for assessing modularity results, we do not believe decision makers have sufficient information to assess the capabilities, costs, and risks posed by the transformation to a modular force. I will now turn to our four main issues.

  11. An Investigation of Social Factors Affecting on Personnel Job Satisfaction of Remedial Service Insurance Department

    Directory of Open Access Journals (Sweden)

    Sayyed Yaser Ebrahimian Jolodar

    2012-01-01

    Full Text Available Because of the paramount importance of job satisfaction and due to its main consequences such as reduction of work absence and resignation, personnel promotion and society‟s health, and more importantly, its role in achievement of organization goals, this study aimed at investigating the effects of six social factors including personnel‟s belief, salary and benefits, participation in organizational decision-making, sense of job security, interaction with colleagues and meeting the basic needs of personnel on job satisfaction. The statistical population of this study was the personnel of Remedial Service Insurance Department in Sari and the questionnaire was distributed among them. The results showed that there is a significant and positive correlation among all these factors and they have meaningful effects on personnel job satisfaction based on multiple regression analysis. Furthermore, findings revealed that personnel‟s belief about their job has the most effects on job satisfaction.

  12. Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Sunday S. AKPAN

    2015-10-01

    Full Text Available This paper examined safety and security risk management in tertiary institutions in Nigeria. The frequent attacks at workplace, especially schools, have placed safety and security in the front burner of discussion in both business and political circles. This therefore, forms the imperative for the conduct of this study. The work adopted a cross sectional survey research design and collected data from respondents who are security personnel of the University of Uyo. Analysis of data was done with simple percentage statistics while the research hypotheses were tested with mean and simple regression and correlation statistics. The findings of the study revealed that assassination, kidnappings and bombings were principal risk incidents threatening the safety and security of staff in University of Uyo. A significant positive relationship was found between the funding of security management and workers’ performance. It was discovered specifically that employment screening, regular training of security personnel, regular safety and security meetings and strategic security policy formation were the main strategies for managing safety and security in University of Uyo. The paper concluded that safety and security management and control involves every worker (management and staff of University of Uyo. It was recommended, among others, that management should be more committed to safety and security management in the University by means of making safety and security issues an integral part of University’s strategic plan and also by adopting the management line model – one form of management structure-where safety and security are located, with other general management responsibilities. This way, the resurgent cases of kidnapping, hired assassination, etc. would be reduced if not completely eradicated in the University.

  13. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ; Dosimetria del Personal Ocupacionalmente Expuesto (POE) y no expuesto del INNSZ

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz J, A [Departamento de Medicina Nuclear, Instituto nacional de la nutricion Salvador Zubiran, Mexico D.F. C.P. 14100 (Mexico)

    1999-07-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  14. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  15. Command Inspections - A Self-Evaluation Approach

    Science.gov (United States)

    1988-03-30

    Tool in the Air Force," Air Wa’ Collg •e Report go. AV-A C-85J174, Air University, United States Air Force, Maxwell AFB, Alabama, Kay 1985, r)p. 1-40...Safety and Fire Prevention 3. Physical Security and Crime Prevention 4. Information and Personnel Security 5, Operations 6. Training 7. Nuclear

  16. Assignment Procedures in the Air Force Procurement Management Information System.

    Science.gov (United States)

    Ward, Joe H., Jr.; And Others

    An overview is presented of the procedure for offering jobs in the Air Force Procurement Management Information System (PROMIS), an assignment system which makes possible the use of human resources research findings to improve individual personnel assignments. A general framework for viewing personnel assignment systems is presented; then job…

  17. Theoretical foundations of information security investment security companies

    Directory of Open Access Journals (Sweden)

    G.V. Berlyak

    2015-03-01

    Full Text Available Methodological problems related to the lack of guidance in the provisions (standards of accounting on the reflection in the accounting and financial reporting of the research object. In this connection, it is proposed to amend the provisions (standards of accounting. This will allow to come to the consistency of accounting methods of operations with elements of investment activity. Based on analysis of the information needs of users suggested indicators identikativnye blocks (block corporate finance unit assess the relationship with financial institutions, block the fulfillment of obligations according to the calculations, the investment unit, a science and innovation, investment security and developed forms of internal accounting controls and improvements to existing forms financial statements for the investment activities of the enterprise. Using enterprise data reporting forms provide timely and reliable information on the identity and structure of investment security and enable the company to effectively plan and develop personnel policies for enterprise management.

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    system force and structure reliance – are discovered and tantamount with EU nations. Thusly I indicated reason viewpoints and figures of security of data structures it additionally relates to the reason of estimation of transient dangers of security of frameworks for that I begin my proposal with one of the fundamental class of data security which is Cyber security. Keyword : Cyber Security, IT

  19. Personnel Selection Method Based on Personnel-Job Matching

    OpenAIRE

    Li Wang; Xilin Hou; Lili Zhang

    2013-01-01

    The existing personnel selection decisions in practice are based on the evaluation of job seeker's human capital, and it may be difficult to make personnel-job matching and make each party satisfy. Therefore, this paper puts forward a new personnel selection method by consideration of bilateral matching. Starting from the employment thoughts of ¡°satisfy¡±, the satisfaction evaluation indicator system of each party are constructed. The multi-objective optimization model is given according to ...

  20. Force 2025 and Beyond Strategic Force Design Analytic Model

    Science.gov (United States)

    2017-01-12

    focused thinking , functional hierarchy, task capability matching 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT U 18. NUMBER OF...describe and evaluate current organizational designs in terms of Force Employment and Force Design using the model to offer recommendations and analysis...developed to illuminate the current organizational design structure to better understand how the network of BCTs and enablers function in today’s steady

  1. Air Force Military Personnel Entitlement Pay in Support of Contingency Operations

    Science.gov (United States)

    2010-08-23

    Report No. A-2006-0067- FFM , “Military Pay for Operation Enduring Freedom/Operation Iraqi Freedom Active Components,” April 5, 2006 U.S. Army Audit...Agency Report No. A-2006-0079- FFM , “Material Weakness Closeout on Line of Duty and Incapacitation Pay,” March 8, 2006 22B22BAir Force Air Force

  2. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  3. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  4. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  5. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  6. Packing force data correlations

    International Nuclear Information System (INIS)

    Heiman, S.M.

    1994-01-01

    One of the issues facing valve maintenance personnel today deals with an appropriate methodology for installing and setting valve packing that will minimize leak rates, yet ensure functionality of the the valve under all anticipated operating conditions. Several variables can affect a valve packing's ability to seal, such as packing bolt torque, stem finish, and lubrication. Stem frictional force can be an excellent overall indicator of some of the underlying conditions that affect the sealing characteristics of the packing and the best parameter to use when adjusting the packing. This paper addresses stem friction forces, analytically derives the equations related to these forces, presents a methodology for measuring these forces on valve stems, and attempts to correlate the data directly to the underlying variables

  7. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Science.gov (United States)

    2012-07-23

    ... expatriate security company (the source is 32 CFR 159.3, section (3) of the definition of ``covered contract.... Such firms are, by definition, not small businesses because they are not U.S. firms. In the small... unpredictable high-threat environment where personnel performing security functions may be called upon to use...

  8. 32 CFR 806.28 - Records with special disclosure procedures.

    Science.gov (United States)

    2010-07-01

    ..., Security Police Investigations. (c) AFI 31-501, Personnel Security Program Management. (d) AFI 31-601, Industrial Security Program Management. (e) AFI 36-2603, Air Force Board for Correction of Military Records..., Family Advocacy. (j) AFI 41-210, Patient Administration Functions. (k) AFI 44-109, Mental Health and...

  9. Enviromental Assessment: Security Forces Regional Training Center at Little Rock Air Force Base Arkansas

    Science.gov (United States)

    2004-07-14

    OMB control number. 1. REPORT DATE 14 JUL 2004 2. REPORT TYPE 3. DATES COVERED 00-00-2004 to 00-00-2004 4. TITLE AND SUBTITLE Enviromental ...civil engineers , services, fliers, maintenance, etc.). The numbers of personnel and types of associated equipment vary based on the functional group...streams or wetlands. Section 404 regulates development in streams and wetlands and requires a permit from the United States Army Corps of Engineers

  10. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  11. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  12. Rescuing Joint Personnel Recovery: Using Air Force Capability to Address Joint Shortfalls

    Science.gov (United States)

    2011-06-01

    of an IP, the IP is not successfully reintegrated or the lessons learned are not incorporated into other operations. Adversaries will benefit from...Washington, D.C.: Office of Air Force History , United States Air Force, 1980, 117. 47 Durant , Michael J. In the Company of Heroes, Penguin Group... Lessons Learned, 22 September 2005, 3. 2 US Joint Task Force Katrina. The Federal Response to Hurricane Katrina Lessons Learned, February 2006, 54

  13. Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat

    Science.gov (United States)

    2016-06-10

    personnel, outside of military police and DoD-contracted civilian LE, to provide an additional layer of security in the workplace . Augmented security does...Research, context, and conclusions from this study may prove that seemingly riskier, yet more secure; measures exist to further empower installation...commanders with safeguarding DoD men and women from active shooter attacks. Conclusion DoD leadership and commanders at all levels have the

  14. Study of computerized spirometric parameters of traffic police personnel of Saurashtra region, Gujarat, India

    Directory of Open Access Journals (Sweden)

    Amit H Makwana

    2015-01-01

    Full Text Available Background and Objectives: Air pollution due to road traffic is a serious health hazard and air quality crisis in cities is mainly due to vehicular emission. Thus the persons who are continuously exposed are at an increased risk. The study was carried out to evaluate the extent of impairment in lung function in traffic police personnel compared to matched unexposed control group. Materials and Methods: A cross-sectional study was conducted to measure the spirometric parameters of 100 traffic police personnel, aged 20-55 years, working in Saurashtra region, as compared to matched control group, consisting of 100 unexposed males. Measurement of lung volumes and capacities was done with SPIROEXCEL. The statistical analysis was carried out with Graph pad instat 3. Results: Traffic police personnel had significantly declined forced vital capacity (FVC, forced expiratory volume in one second (FEV 1, slow vital capacity (SVC and maximum voluntary ventilation (MVV when compared with predictive normal values, which is probably due to exposure to vehicular exhaust. Comparison of test values between groups showed significantly reduced FVC, MVV and increased FEV1/FVC ratio and insignificantly declined FEV1 and SVC in cases as compared to controls. Traffic personnel with longer duration of exposure showed significantly reduced lung functions than those with shorter duration. Smokers showed lower test values as compared to non-smokers with significance only in unexposed group. Conclusion: The effect of pollution by vehicular exhausts may be responsible for these pulmonary function impairments and traffic police personnel should be offered personal protective or preventive measures.

  15. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  16. Equipment for radiography in Yugoslavia - security and radiation protection

    International Nuclear Information System (INIS)

    Dobrijevic, R.; Vucina, J.

    1998-01-01

    Nondestructive method of material control by using radioisotopes is developed in Yugoslavia. This method of quality control is professionally performed by 30 firms. This paper presents the overview of the equipment used in the industrial radiography by using radioisotopes. Special attention was devoted to the security during the work and to the radiation protection of the operator and other personnel around the working place. In general it could be concluded that the main drawback which influences the security is the fact that most cases old and whom out equipment is in use. Other factors influencing the security are also discussed. (author)

  17. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  18. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Schwartz, Moshe; Nakamura, Kennon H

    2008-01-01

    .... In Iraq, private firms known as Private Security Contractors (PSCs) serve to protect individuals, transport convoys, forward operating bases, buildings, and other economic infrastructure, and are training Iraqi police and military personnel...

  19. 32 CFR 154.8 - Types and scope of personnel security investigations.

    Science.gov (United States)

    2010-07-01

    ..., benefits, and privileges under Federal programs. Accordingly, personal interviews are an integral part of... forth in the following paragraphs of this section. (1) BI/PR. A personal interview shall be conducted by... security clearability, or be otherwise stigmatizing. (3) Hostage situation. A personal interview shall be...

  20. Guideline related to training and re-training of research reactor personnel

    International Nuclear Information System (INIS)

    1983-01-01

    The guideline, which entered into force on 1 July 1983, lays down training and re-training requirements to be met by research reactor personnel in the framework of the Radiation Protection Ordinance of 26 November 1969, the Regulation related to the Licensing of Nuclear Facilities of 21 June 1979, and the Regulation related to Further Education in the Field of Radiation Protection 27 January 1975. It contains the scope of application; the principles and objectives; the minimum requirements relating to technical qualification of plant managers, shift personnel, and responsible radiation protection officers; appointment and certification; the preservation of the technical qualification; and exceptional and transitional regulations

  1. The injured mind in the UK Armed Forces

    Science.gov (United States)

    Greenberg, N.; Jones, E.; Jones, N.; Fear, N. T.; Wessely, S.

    2011-01-01

    The mental health of the UK Armed Forces is a topic much debated by healthcare professionals, politicians and the media. While the current operations in Afghanistan, and the recent conflict in Iraq, are relevant to this debate, much of what is known about the effects of war upon the psyche still derives from the two World Wars. This paper will examine the historical and contemporary evidence about why it is that some Service personnel suffer psychological injuries during their military service and others do not. The paper will also consider some of the strategies that today's Armed Forces have put in place to mitigate the effects of sending military personnel into danger. PMID:21149361

  2. 77 FR 13206 - Protective Force Personnel Medical, Physical Readiness, Training, and Access Authorization Standards

    Science.gov (United States)

    2012-03-06

    ... reduction in exposure to potential injuries associated with physical readiness qualification running tests... personnel to perform the running tasks required in the current regulation. Furthermore, this shift in... reduce the exposure of the PF population to injuries related to physical readiness testing. They would...

  3. The Gap in Operation and Maintenance of the Afghan National Security Forces Infrastructure

    Science.gov (United States)

    2013-05-22

    organizations. They include the Afghan Border Police ( ABP ), the Afghan Uniform Police (AUP), the Afghan Highway Police (AHP), and the Criminal...other elements under the ANP include the Afghan Border Police ( ABP ), the Afghan Uniformed Police (AUP), the Afghan Highway Police (AHP) and the...delineates the authorized personnel and equipment for the army. The ANP tashkil delineates the authorized personnel and equipment for the AUP, ABP , AHP, and

  4. An analysis of generalised heuristics for vehicle routing and personnel rostering problems

    OpenAIRE

    Mustafa Misir; Pieter Smet; Greet Vanden Berghe

    2015-01-01

    The present study investigates the performance of heuristics while solving problems with routing and rostering characteristics. The target problems include scheduling and routing home care, security and maintenance personnel. In analysing the behaviour of the heuristics and determining the requirements for solving the aforementioned problems, the winning hyper-heuristic from the first International Cross-domain Heuristic Search Challenge (CHeSC 2011) is employed. The completely new applicatio...

  5. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  6. Safeguards through secure automated fabrication

    International Nuclear Information System (INIS)

    DeMerschman, A.W.; Carlson, R.L.

    1982-01-01

    Westinghouse Hanford Company, a prime contractor for the U.S. Department of Energy, is constructing the Secure Automated Fabrication (SAF) line for fabrication of mixed oxide breeder fuel pins. Fuel processing by automation, which provides a separation of personnel from fuel handling, will provide a means whereby advanced safeguards concepts will be introduced. Remote operations and the inter-tie between the process computer and the safeguards computer are discussed

  7. SOR/83-77, Physical Security Regulations

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations establish and require the maintenance of security systems, equipment and procedures to implement Canada's international obligations regarding security at those nuclear facilities. The Regulations, which determine the different areas in a nuclear facility, provide for the establishment of security barriers around the ''protected areas'' occupied by facilities and prescribe that the licensees (operators) are required to keep the facilities for which they hold a licence under constant surveillance. They must also make arrangements for a response force - a local, provincial or federal police force detachment or similar force - to provide assistance where necessary. No person may enter a protected area without written authorization from the licensee concerned. Inspectors appointed under the Atomic Energy Control Regulations or designated under an agreement between Canada and the IAEA may be granted an authorization to enter such areas to discharge their duties. The Regulations have been amended by SOR/84-81 of 12 January 1988 to add certain requirements concerning documentary evidence and the duties of the board; by SOR/85-1016 of 25 October 1985 to revise the definition of response force and provide other clarifications; by SOR/91-585 of 10 October 1991 to clarify wording in French. (NEA)

  8. Research on Evacuation Based on Social Force Model

    Science.gov (United States)

    Liu, W.; Deng, Z.; Li, W.; Lin, J.

    2017-09-01

    Crowded centers always cause personnel casualties in evacuation operations. Stampede events often occur by hit, squeeze and crush due to panic. It is of vital important to alleviate such situation. With the deepening of personnel evacuation research, more and more researchers are committed to study individual behaviors and self-organization phenomenon in evacuation process. The study mainly includes: 1, enrich the social force model from different facets such as visual, psychological, external force to descript more realistic evacuation; 2, research on causes and effects of self - organization phenomenon. In this paper, we focus on disorder motion that occurs in the crowded indoor publics, especially the narrow channel and safety exits and other special arteries. We put forward the improved social force model to depict pedestrians' behaviors, an orderly speed-stratification evacuation method to solve disorder problem, and shape-changed export to alleviate congestion. The result of this work shows an improvement of evacuation efficiency by 19.5 %. Guiding pedestrians' direction to slow down the influence of social forces has a guidance function in improving the efficiency of indoor emergency evacuation.

  9. Transforming the Albanian Armed Forces, Overcoming the Challenges

    National Research Council Canada - National Science Library

    Cahani, Nazmi

    2009-01-01

    The Albanian Armed Forces (AAF) are currently undergoing an extensive defense reform process that consists of transformation of its strategic concept, doctrine, organizational structure, personnel management system, military...

  10. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as... security equipment and systems; (i) Inspection, control, and monitoring techniques; (j) Methods of physical...

  11. Participation in Armed Forces, National, and International Sports Activities

    Science.gov (United States)

    1987-03-09

    American Games , Olympic Games , and other authorized national and international sports competitions (to include qualifying and preparatory events) as long...concerning the participation of Armed Forces personnel in Armed Forces, national, and international sports competitions ; establishes a Senior Military Sports ...program is to ensure that the U.S. Armed Forces are appropriately represented in national and international sports competitions . 3. The purpose of this

  12. Supporting the Future Total Force: A Methodology for Evaluating Potential Air National Guard Mission Assignments

    National Research Council Canada - National Science Library

    Lynch, Kristin F; Drew, John G; Sleeper, Sally; Williams, William A; Masters, James M; Luangkesorn, Louis; Tripp, Robert S; Lichter, Dahlia S; Roll, Charles R

    2007-01-01

    Manpower end-strength reductions of active duty personnel in the U.S. Air Force are making it more difficult to support the air and space expeditionary force construct using current force employment practices...

  13. 77 FR 56632 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-13

    ...) through Chief Master Sergeant (E-9). Air National Guard and Air Force Reserve personnel grades Staff Sergeant (E-5) through Chief Master Sergeant (E- 9).'' * * * * * Retrievability: Delete entry and replace.... Electronic files are only accessed by authorized personnel with a Secure Common Access Card (CAC) and need...

  14. Issues related to choosing a guard force structure

    International Nuclear Information System (INIS)

    Auerback, C.; Cusack, J.; Green, L.; Higinbotham, W.; Indusi, J.; Marcuse, W.; Weinstock, E.

    1975-01-01

    The establishment of a federal security force has been suggested as an additional step to protect nuclear material. The force would be given the responsibility for guarding nuclear facilities and shipments of nuclear materials. This paper summarizes a study to identify the issues that are relevant to choosing between the private guard forces that are presently employed by industry or a guard force under federal authority. To examine the issues which would be relevant, three possible types of security force structures were selected for comparison: a federal force under central authority, a private guard force employed by or under contract to a facility, and a private arrangement to employ local police officers similar to the arrangement for armed guards at airports. The issues were divided into seven categories: (1) Legal Considerations, (2) Liability, (3) Staffing and Operations, (4) Costs, (5) Relationship to Off-site Forces, (6) Management and Control, (7) Transportation

  15. Administrative Circular No. 13 (Rev. 4) - Guarantees for representatives of the personnel

    CERN Multimedia

    Department Head Office - HR Department

    2016-01-01

    Administrative Circular No. 13 (Rev. 4) entitled "Guarantees for representatives of the personnel", approved by the Director-General following discussion in the Standing Concertation Committee meeting on 22 March 2016, will be available on 1st September 2016 via the following link: https://cds.cern.ch/record/2208527.   This revised circular cancels and replaces Administrative Circular No. 13 (Rev. 3) also entitled "Guarantees for representatives of the personnel" of January 2014. This document contains a single change to reflect the terminology under the new career structure: the term "career path" is replaced by "grade". This circular will enter into force on 1st September 2016.

  16. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  17. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  18. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  19. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  20. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  1. Administrative Circular No. 13 (Rev. 3) - Guarantees for representatives of the personnel

    CERN Multimedia

    2014-01-01

    Administrative Circular No. 13 (Rev. 3) entitled “Guarantees for representatives of the personnel”, approved by the Director-General following discussion at the Standing Concertation Committee meeting of 5 December 2013 and entering into force on 1 January 2014, is available on the intranet site of the Human Resources Department (see here).   This circular is applicable to all members of the personnel. It cancels and replaces Administrative Circular No. 13 (Rev. 2) entitled “Guarantees for members of the personnel holding representative office” of November 1992. The circular was revised in order to adapt the time given to the representatives of the personnel to perform their elective mandate and to ensure more transparency in their activities, by indicating, inter alia, the percentage of time worked in the framework of their mandate, as well as the training, activities and ensuing results. Department Head Office HR Department

  2. Comparative analysis of field ration for military personnel of the ukrainian army and armies of other countries worldwide

    Directory of Open Access Journals (Sweden)

    M. Mardar

    2017-04-01

    Full Text Available For the purpose of improvement of the Ukrainian nutritional standards this Article provides comparative analysis of field rations of different countries worldwide to make a proposal on improvement of food-stuff assortment in food ration for military personnel in the Armed Forces of Ukraine, Army of USA, the British Army, Army of Germany, Army of Italy, Army of Canada, Army of France, Army of Belarus, Army of Armenia. In accordance with the comparative analysis it was established that ration composition used for the Armed Forces of Ukraine military personnel lags behind developed countries of the world both in nutrition arrangement and in nutrient composition, especially in relation to assortment and variety of ration food-stuff. Moreover, a field ration is strictly unified and doesn’t consider individual needs of military personnel in calories, proteins, fats, carbohydrates, food fibers. Selection of individual field ration takes to account only age of military personnel, i. e. individual needs related to nutrition composition such as physical abilities, level of physical activity, gender, type of occupation before military conscription and etc. are not consideredThe obtained results confirms practicability of assortment products assortment included to field rations for the purpose to correct nutrition rations towards optimal balance for military efficiency of army, adaptation of military personnel to physical and psychological loads.

  3. Stolen Vehicles for Export: A Major Concern for Domestic and International Security

    Science.gov (United States)

    2018-03-01

    xi LIST OF ACRONYMS AND ABBREVIATIONS AES Automated Export System BEST Border Enforcement Security Task Force CSI Container Security Initiative...motor vehicles, increase inspections of exports, and enhance enforcement capabilities. Unfortunately, this thesis was unable to establish a clear link...and a better understanding could only benefit law enforcement’s efforts to counter it. 14. SUBJECT TERMS Border Enforcement Security Task Force

  4. Administrative circular n°11 (REV. 2) – Categories of members of the personnel

    CERN Multimedia

    2012-01-01

    Administrative Circular No. 11 (Rev. 2) entitled “Categories of members of the personnel”, approved by the Director-General following discussion at the Standing Concertation Committee meeting of 11 May 2012 and entering into force on 1 January 2013, is available on the intranet site of the Human Resources Department. This circular is applicable to all members of the personnel. It cancels and replaces Administrative Circular No. 11 (Rev. 1) entitled “Categories of members of the personnel” of January 1997 as regards all contracts of members of the personnel issued on or after 1 January 2013. The circular was revised in order to take into account developments since the last revision of the categories of personnel in 1997 as well as the needs of the Organization and collaborating institutes. In particular, it introduces a new system for distinguishing categories of associated members of the personnel, namely with regard to the purpo...

  5. Accredited training on radiation protection for the Austrian police

    International Nuclear Information System (INIS)

    Timal, G.

    2009-01-01

    In Austria, radiological emergencies are handled following the Intervention Regulation, in force since 2007. This regulation also defines duration and content for the training of radiation protection personnel, taking advantage of the standard OeNORM S 5207 published in 2005. Radiation protection personnel of the Austrian police are trained at the Federal Security Academy in Traiskirchen near Vienna. The Federal Security Academy is a training centre certified by the Austrian Standards Institute. The poster describes the modular organisation of the training and its duration and content as well as the further trainings available to the radiation protection personnel of the Police. (orig.)

  6. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  7. An automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized

  8. Automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized. 2 refs., 7 figs

  9. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  10. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  11. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  12. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  13. Personnel preferences in personnel planning and scheduling

    OpenAIRE

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations Research, a subfield of applied mathematics, we show that operational efficiency can be achieved while taking personnel preferences into account. In the design of optimization methods, we explicitly con...

  14. Impact of market forces on security of supply; Markedsgoerelse af forsyningssikkerhed

    Energy Technology Data Exchange (ETDEWEB)

    Klinge Jakobsen, H.; Kromann, M.T.; Hoermann, M. (and others)

    2010-05-15

    Marketisation of security of supply can result in efficiency in the overall energy system and cost savings for end users. The analyses show that savings may be gained, particularly in connection with the part of security of supply which is about sufficiency. With modern metering and communication equipment, it is realistic that all consumers have the opportunity to express an upper limit on the price of electricity. In the near future, selected consumption may be turned off at extremely high prices. Those parts of the security of supply, that relates to local networks and that are of the nature of a collective benefit, may be more difficult to make market-oriented. There is, however, already some marketisation, as firms with particularly critical use of electricity invest in backup power plants. The report describes methods for the regulation of grid companies, including cost control, which gives them an incentive to balance the investment in improvements to the security of supply against the cost. Marketisation of security of supply can be done in several steps. Here the following steps are analyzed: a) Cost visibility and reduction; b) Establishment of level of security of supply based on consumer preferences (cost of losses); c) Security of supply varying between consumers, duration and timing; d) Individual level of security of supply. It is at present generally difficult to judge how many of these steps it is appropriate to take. 3 simplistic cases are made of power reserves, transmission and distribution, which indicate how the costs of security of supply can be weighed against advantages. In all three cases it is concluded that supply element has costs for the consumers, but in a magnitude which might well be justified in relation to the benefits. The level of detail in the cases does not, however, justify actual conclusions about the relationship between costs and benefits. It is confirmed in this project through model analysis that savings can be achieved

  15. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  16. Issues related to choosing a guard force structure

    International Nuclear Information System (INIS)

    Averbach, C.; Cusack, J.; Green, L.; Higinbotham, W.; Indusi, J.; Marcuse, W.; Weinstock, E.

    1975-01-01

    The establishment of a federal security force has been suggested as an additional step to protect nuclear material. The force would be given the responsibility for guarding nuclear facilities and shipments of nuclear materials. A study to identify the issues that are relevant to choosing between the private guard forces that are presently employed by industry or a guard force under federal authority is summarized. To examine the issues which would be relevant, three possible types of security force structures were selected for comparison: a federal force under central authority, a private guard force employed by or under contract to a facility, and a private arrangement to employ local police officers similar to the arrangement for armed guards at airports. The issues were divided into seven categories: (1) legal considerations, (2) liability, (3) staffing and operations, (4) costs, (5) relationship to off-site forces, (6) management and control, and (7) transportation. (U.S.)

  17. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  18. Shift work in a security environment

    International Nuclear Information System (INIS)

    Longhouser, G.A. Jr.

    1993-01-01

    Human beings are diurnal species, normally active by day and asleep by night. Yet over thirty million Americans struggle with work schedules that include an off-normal work effort. The railroads, law enforcement, health services, Department of Defense, factory workers, chemical plants and public services, communications and utility workers must provide some form of around-the-clock effort. Shift work has been around since the advent of recorded history. There has always been a need for some type of off-normal service and assistance. The impact of shift work is replete with tales and factual evidence of an increased personnel error rate; disorders, both personal and family, and of course, increased accident events. In recent memory, the Three Mile Island Nuclear Plant incident, Union Carbide's explosion in Bhopal, and the Chernobyl Nuclear Plant catastrophe all occurred during off-normal working hours. Yet management overall has done little to correct the production-driven twelve hour, seven day week shift mentality of the nineteenth century. Most schedules in use today are nothing more than cosmetic variations of the old production schedules. This could be driven by a management consideration of the worker's response to change coupled with a reluctant buy-in of responsibility for the effects of change. Florida Power Corporation has developed for its nuclear security force, a unique work schedule which attempts to employ the sound principles of circadian rhythms coupled with a comprehensive training program to counter the problems associated with shift work. The results over the last four years have seen a marked reduction in the generic problems of personnel errors, absenteeism, unscheduled overtime and turnover rates. Utilization and understanding of this scheduling process for rotational shift work needs to be assessed to determine if the benefits are site specific or provide an expected response to the problems of shift work

  19. A new Brazilian regulation for the security of nuclear material and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Tavares, Renato L.A.; Filho, Josélio S.M.; Torres, Luiz F.B.; Lima, Alexandre R., E-mail: renato.tavares@cnen.gov.br, E-mail: joselio@cnen.gov.br, E-mail: ltorres@cnen.gov.br, E-mail: alexandre.lima@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear; Lima, Fabiano P.C., E-mail: fabianopetruceli@outlook.com [Presidência da República, Brasilia, DF (Brazil). Gabinete de Segurança Institucional

    2017-07-01

    The present paper aims to outline the challenges related to the elaboration and concepts involved in a regulatory transition from a purely prescriptive approach to a combined approach that mixes performance-based concepts and evaluation metrics based on statistical data of equipment and personnel. This methodology might represent an improvement compared to a purely prescriptive approach, in which the regulatory authority defines the measures to be taken by operators of nuclear facilities to prevent theft, sabotage events, and mitigate their consequences. The prescriptive approach, despite having the advantages of clarity in the definition of requirements, simplicity in regulatory terms (inspections to verify compliance), and homogeneity in relation to various facilities, does not allow a clear and effective performance measurement, may provide insufficient or excessive security measures (with excessive expenditure of material and human resources), and the possibility of providing a false sense of security. It is known that, in many countries, the state-sponsored nuclear security regime mixes elements of the two mentioned approaches, prescriptive and based on performance, which is not Brazilian practice nowadays. Such methodological developments happened globally due to the increase of threat level for nuclear facilities and materials. The currently regulation in force is CNEN-NE 2.01, which provides a set of measures intended to implement Physical Protection Systems in Nuclear, Radiological Facilities as well as Transport Operations, and all documents related to security of such issues. The new regulation, named CNEN-NN 2.01, will focus only on Nuclear Material and Facilities (two other regulations specific for Security of Radioactive Sources and Transport Operations are under elaboration process). CNEN NN 2.01 is intended to provide further adherence to new international recommendations, e.g, IAEA INFCIRC 225 Rev.5 (NSS 13), which is currently regarded as the

  20. A new Brazilian regulation for the security of nuclear material and nuclear facilities

    International Nuclear Information System (INIS)

    Tavares, Renato L.A.; Filho, Josélio S.M.; Torres, Luiz F.B.; Lima, Alexandre R.; Lima, Fabiano P.C.

    2017-01-01

    The present paper aims to outline the challenges related to the elaboration and concepts involved in a regulatory transition from a purely prescriptive approach to a combined approach that mixes performance-based concepts and evaluation metrics based on statistical data of equipment and personnel. This methodology might represent an improvement compared to a purely prescriptive approach, in which the regulatory authority defines the measures to be taken by operators of nuclear facilities to prevent theft, sabotage events, and mitigate their consequences. The prescriptive approach, despite having the advantages of clarity in the definition of requirements, simplicity in regulatory terms (inspections to verify compliance), and homogeneity in relation to various facilities, does not allow a clear and effective performance measurement, may provide insufficient or excessive security measures (with excessive expenditure of material and human resources), and the possibility of providing a false sense of security. It is known that, in many countries, the state-sponsored nuclear security regime mixes elements of the two mentioned approaches, prescriptive and based on performance, which is not Brazilian practice nowadays. Such methodological developments happened globally due to the increase of threat level for nuclear facilities and materials. The currently regulation in force is CNEN-NE 2.01, which provides a set of measures intended to implement Physical Protection Systems in Nuclear, Radiological Facilities as well as Transport Operations, and all documents related to security of such issues. The new regulation, named CNEN-NN 2.01, will focus only on Nuclear Material and Facilities (two other regulations specific for Security of Radioactive Sources and Transport Operations are under elaboration process). CNEN NN 2.01 is intended to provide further adherence to new international recommendations, e.g, IAEA INFCIRC 225 Rev.5 (NSS 13), which is currently regarded as the

  1. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  2. Enhancing U.S. Defenses Against Terrorist Air Attacks

    National Research Council Canada - National Science Library

    2004-01-01

    .... Air Force, law enforcement authorities, the Federal Aviation Administration, airport security personnel, and many other agencies share responsibility for closing gaps in our national air defenses...

  3. Inhibiting and driving forces for the digitalization of security systems: security officers’ view on the issue

    OpenAIRE

    Lahtinen, Markus

    2007-01-01

    This memo reports on factors that drive and inhibit the digitalization of security systems. The reported factors are as follows: Technology-push factors • Need to lower costs on the end-user side, i.e. replacing labour with technology • Perceived convenience and ease-of-use of digital systems • Digital products can be connected to the current enterprise network; enabling an expanding set of security features • Firms holding the IP-capability (IP=Internet Protocol) and not h...

  4. Public service electric and gas company technical supervisory skills programs for nuclear power plant personnel

    International Nuclear Information System (INIS)

    Meredith, J.B.

    1985-01-01

    A series of training programs entitled Technical Supervisory Skills Programs for management personnel are described. The first level of this program, TSSP-1, is a seven week program designed for first-line supervisors and other selected management personnel responsible for directing the work forces in the stations. TSSP-1 includes training in PWR/BWR Technology, Supervision, Aberrant Behavior Identification, Labor Relations and Ethics, Technical Administration, Quality Assurance Program, On-the-job Training, and Specific Departmental Training. TSSP-2, TSSP-3, and TSSP-4 courses are described in this paper

  5. All projects related to | Page 430 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2008-11-03

    In 2006, the Institute for Security Studies (ISS) undertook a project entitled Regulation of the Private Security Sector in Africa that was supported by IDRC under project 103396. Start Date: November 3, 2008. End Date: June 25, 2012. Topic: ARMED FORCES, MILITARY PERSONNEL, LEGAL STATUS, REGULATIONS, ...

  6. The prevalence of smoking and its associated factors among military personnel in Kingdom of Saudi Arabia: A national study

    Directory of Open Access Journals (Sweden)

    Hesham I Al-Khashan

    2014-01-01

    Full Text Available Aim: The aim was to measure the prevalence of smoking and identify its potential predictors among military personnel in Kingdom of Saudi Arabia (KSA. Materials and Methods: This cross-sectional study was carried out among military personnel in the five military regions of KSA between January 2009 and January 2011. The sample of 10,500 military personnel in the Saudi Armed Forces was equally divided among the five regions with a ratio 3:7 for officers and soldiers. A multistage stratified random sampling was used to recruit participants in the four services of the armed forces in the five regions. Information on sociodemographic characteristics with a detailed history of smoking was collected by means of a self-administered questionnaire. Bivariate analysis was used to identify the factors associated with smoking, and multiple logistic regression analysis to discover its potential predictors. Results: About 35% of the sample was current smokers, with higher rates among soldiers. The eastern region had the highest rate (43.0%, and the southern region the lowest (27.5%. Navy personnel had a higher risk of being current smokers (40.6%, and the air defense the lowest risk (31.0%. Multivariate analysis identified working in the navy, and low income as positive predictors of current smoking, while residing in the southern region, older age, years of education, being married, and having an officer rank were negative (protective factors. Conclusion: Smoking is prevalent among military personnel in KSA, with higher rates in the Navy and Air Force, among privates, younger age group, lower education and income, and divorced/widowed status. Measures should be taken to initiate programs on smoking cessation that involve changes in the environment that is likely to promote this habit.

  7. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  8. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1981-01-01

    The current state-of-the-art in neutron personnel dosimetry is reviewed. Topics covered include dosimetry needs and alternatives, current dosimetry approaches, personnel monitoring devices, calibration strategies, and future developments

  9. Oral health survey of the military personnel deployed to the southernmost provinces of Thailand.

    Science.gov (United States)

    Sutthavong, Sirikarn; Ukritchon, Supak; Rangsin, Ram

    2014-02-01

    Dental problems are some of the major health problems of deployed miilitaly personnel. There have been no systematically reports of oral health information survey among the deployed military personnel in Thailand. The present study was to determine the oral health problems of the deployed military personnel and effects on personnel fitness. A cross-sectional study and a cluster sampling were conducted during April 2011 and March 2013. The Royal Thai Army (RTA) personnel 12 out of21 task forces in southern most provinces were invited to participate in the study. A standardized questionnaire was used. In total, 2,884 RTA deployed personnel voluntarily participated and completed the questionnaire infonnrmation. Their mean age was 27.8 +/- 9.4 years old. Fifty percent admitted that they had oral problems during the past six months and the most common ones were toothache/hypersensitivity (32.4%), and dental caries (21.5%). The majority of the participants (60.7%) reported that they experienced oral health problems less than 3 times and 2.8% reported sick leave during deployment because of oral conditions. 64.4% reported that their oral problems affected their quality of life and disturbed their duties. A relatively high prevalence oforal health problems was reported by the deployed RTA personnel. The problems affected their quality of life and assigned duties. Most ofthe problems were neglected. In order to keep the RTApersonnel fit for deployment, an effective dental health program should be developed.

  10. Effects of changed working methods on personnel doses at a I-131 and afterloading therapy ward

    International Nuclear Information System (INIS)

    Lange, D.; Wolf, G.; Georgi, P.; Bauer, M.

    1985-01-01

    The external load of the personnel from I-131 therapy can be kept small (almost 'neglectable') by appropriate behaviour without keeping patients 'under-lock and key'. The marked decrease in personnel doses is due to improved radiation protection for afterloading therapy (gynecological Ra-therapy, Cs-137-therapy) by technical equipment. This therapy is now possible but with the door of the application room closed; when the door is opened, the instruments automatically go back to their original position. From 1975 through 1982, there were remote control errors forcing the personnel to withdraw the instruments to the safe manually. Despite working regulations the personnel was able to go into the room without prior instrument withdrawal. The personnel doses so received were within the tolerance limits, however markedly above the inevitable values. Because of regular thyroid gland examination of the personnel there is proof for the fact that the radiation load of this organ from I-131 is probably smaller than 2% (6 mSv/a=600 mrem/a) of the annual limit value of 0.3 Sv (30 rem) which corresponds to 6 times the value of normal load. (orig./HP) [de

  11. Guidelines for Evaluation of Canadian Forces Indoor Firing Ranges

    National Research Council Canada - National Science Library

    Severs, Y

    1999-01-01

    Indoor Firing Ranges (IFR) within DND are typically used by Canadian Forces (CF) personnel, Cadets, RCMP, and civilian organizations for firing small bore weapons in support of both operational/ occupational and recreational requirements...

  12. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  13. Estimated Cost of the Administration's Proposal to Increase the Army's and the Marine Corps's Personnel Levels

    National Research Council Canada - National Science Library

    Schmit, Matt; Wheelock, Jason; Newman, David

    2007-01-01

    .... The Administration also plans to increase the size of the Army Reserve and National Guard. The cost of the Administration's proposal to increase the size of the armed forces depends on the personnel levels it is being measured against...

  14. Military and Security Developments Involving the People’s Republic of China 2015

    Science.gov (United States)

    2015-01-01

    Culture and Arts Bureau and Culture and Sports Bureau; raising the number of Navy, Air Force, and Second Artillery Force personnel relative to the...in future disputes. For example, through trade tariffs, tourism restrictions, and limits on foreign direct investment. > In 2012, China restricted

  15. 32 CFR 1290.8 - Procedures.

    Science.gov (United States)

    2010-07-01

    ... accidents. (C) Operation of motor vehicle while under the influence of intoxicating alcohol or a narcotic or... by the defendant or in his/her custody or control. (D) Reckless driving or speeding. (2) Voluntary... by the violator. (B) Command security officers will provide security force personnel with necessary...

  16. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  17. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  18. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  19. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  20. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  1. Establishing Criteria for Assigning Personnel to Air Force Jobs Requiring Heavy Work

    Science.gov (United States)

    1978-07-01

    loads (for example, carrying meat at the slaughterhouse , carrying of sacks, loading wood by hand) wood cutting in the forest by hand tools, agricultural...8217 factor history. Medical Service Digest (United States Air Force), 27(2), 1976, pp. 14-16. 186 Trimeloni, Col. B.D. The Role of Women in the Air Force...Rahden. Effect of training on maximum oxygen intake and on anaerobic metabolism in man. Int. Z. Angew Physiol., 24(2), 1967, pp. 102-110. 188 Wyndham, C.H

  2. Implementation of a personnel reliability program as a facilitator of biosafety and biosecurity culture in BSL-3 and BSL-4 laboratories.

    Science.gov (United States)

    Higgins, Jacki J; Weaver, Patrick; Fitch, J Patrick; Johnson, Barbara; Pearl, R Marene

    2013-06-01

    In late 2010, the National Biodefense Analysis and Countermeasures Center (NBACC) implemented a Personnel Reliability Program (PRP) with the goal of enabling active participation by its staff to drive and improve the biosafety and biosecurity culture at the organization. A philosophical keystone for accomplishment of NBACC's scientific mission is simultaneous excellence in operations and outreach. Its personnel reliability program builds on this approach to: (1) enable and support a culture of responsibility based on human performance principles, (2) maintain compliance with regulations, and (3) address the risk associated with the insider threat. Recently, the Code of Federal Regulations (CFR) governing use and possession of biological select agents and toxins (BSAT) was amended to require a pre-access suitability assessment and ongoing evaluation for staff accessing Tier 1 BSAT. These 2 new requirements are in addition to the already required Federal Bureau of Investigation (FBI) Security Risk Assessment (SRA). Two years prior to the release of these guidelines, NBACC developed its PRP to supplement the SRA requirement as a means to empower personnel and foster an operational environment where any and all work with BSAT is conducted in a safe, secure, and reliable manner.

  3. Causes and prevention of violence toward emergency personnel by patients and their relatives in a province in Turkey.

    Science.gov (United States)

    Cebeci, Fatma; Sucu, Gülten; Karazeybek, Ebru

    2009-03-23

    STUDY OBJECTIVE: This research was conducted to determine the opinions of the emergency department's personnel about the causes and prevention of violence directed at them by patients and their relatives. METHODS: This research was conducted between 3 February and 15 June, 2006, in Antalya, a province in southern Turkey, with a total of 216 emergency department personnel who work in the emergency departments of three hospitals. A questionnaire developed by researchers was used to collect data for the purpose of determining what kind of violence is directed at emergency personnel by patients and their relatives and the personnel's socio-demographic characteristics and opinions. Pearson's chi and Fisher's exact test were used in the analysis of the data. RESULTS: Almost all (94.4%) of the participating emergency personnel had been exposed to verbal violence and 59.7% to physical violence. Only 24.5% of those exposed to violence reported the violence. The majority of the personnel (72.5%) thought that individuals' personality tendencies are the primary cause of violence. Their primary recommendation for preventing violence was to increase security measures. Statistically significant differences were found between emergency personnel's place of work and physical violence, between gender and physical violence, and between level of education and reporting violence. CONCLUSION: On the basis of the research results, it is recommended that emergency personnel be trained on the subject of violence, a documentation system be developed for recording and reporting violence, and corrections be made to prevent violence based on the personnel's opinions.

  4. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    Science.gov (United States)

    2013-06-01

    create a coast-to-coast, interoperable digital emergency communications network.36 Accordingly, Homeland Security Act 2002 and Homeland Security...or fixed monitor that depicts friendly forces on an easy-to-read digitized geospatial map. The number of assets being tracked directly determines...Common Defense diminished since Colombian security forces killed notorious Medellin cartel leader Pablo Escobar in 1993.74 There undeniably is an

  5. New fire and security rules change USA nuclear power plant emergency plans

    International Nuclear Information System (INIS)

    Garrou, A.L.

    1978-01-01

    New safety and security rules for nuclear power plants have resulted from the Energy Reorganisation Act and also from a review following the Browns Ferry fire. The content of the emergency plan which covers personnel, plant, site, as well as a general emergency, is outlined. New fire protection rules, the plan for security, local and state government assistance are also discussed, with a brief reference to the impact of the new rules on continuity of operations. (author)

  6. Overview of allied health personnel shortages.

    Science.gov (United States)

    Elwood, T W

    1991-01-01

    Upon learning that 95% of all fatal traffic accidents occur within three miles of one's home, an acquaintance moved to another residence four miles away and is still alive today. The world might be a much better place if most obstacles could be overcome this handily. Unfortunately, the problem of allied health personnel shortages appears to be more intractable. Because the situation is complicated in nature, it is most unlikely that any single remedy will suffice. Public and private interests have joined forces in many states, but it is abundantly clear that conventional market forces are unlikely to prevail. These forces usually focus on supply and demand. While shortages may cause entry-level salaries to rise, they do not stimulate academic institutions to increase their output nor will they affect the availability of research funding and/or doctoral training programs. Current market forces compel health facilities to engage in bidding wars for scarce manpower. Although individual job seekers may benefit, this practice does not increase the number of training program graduates. The federal government has a decisive role to play in assuring an adequate number of personnel to meet this nation's health care needs. Assistance is necessary in the form of providing entry- and advanced-level traineeships to accelerate the flow of part-time students pursuing doctorates, and to fund model student recruitment/retention projects. This role should encompass attracting students (particularly from minority and underserved portions of the population) to academic programs. The Disadvantaged Minority Health Improvement Act, PL 101-527 that was enacted in November 1990, contains only minimal provisions for allied health. Eligibility for student scholarship assistance is restricted to a small handful of allied health professions. Moreover, allied health is not eligible for the loan repayment program aimed at individuals who agree to serve on the faculty of health professions

  7. IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective

    CERN Document Server

    Dattani, Dinesh D

    2013-01-01

    Rather than rehashing basic information-such as command syntax-already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organizations; security cannot be left to chance. With very little training available to the younger crowd, and older, more experienced personnel retiring or close to retiring, there is a need in mainframe security skills at the senior level. Based on real-life experiences, issues, and soluti

  8. A passive automated personnel accountability system for reactor emergency preparedness

    International Nuclear Information System (INIS)

    Zimmerman, R.O.; DeLisle, G.V.; Hickey, E.E.

    1988-04-01

    In 1985 a project was undertaken at the N Reactor on the Hanford Site to develop an automated personnel accountability system to ensure accountability of all personnel within 30 minutes of a site evacuation. The decision to develop such a system was made after a full-scale evacuation drill showed that the manual accountability system in use at the time was inadequate to meet the 30-minute requirement. Accountability systems at commercial nuclear power plants were evaluated, but found to be unsuitable because they were not passive, that is, they required action on part of the user for the system to work. Approximately 2500 people could be required to evacuate the 100-N Area. Therefore, a card key system or badge exchange system was judged not to be feasible. A passive accountability system was desired for N Reactor to allow personnel to enter and leave the site in a more timely manner. To meet the need for an automated accountability system at N Reactor, a special Evacuation Accountability System (EVACS) was designed and developed. The EVACS system has three basic components: the transponder, a credit card-sized device worn with the security badge; portal monitors, which are electronically activated by the transponder; and a computer information system that contains the personnel data base. Each person wearing a transponder is accounted for automatically by walking through a portal. In this paper, a description of the hardware and software will be presented, together with problems encountered and lessons learned while adapting an existing technology to this particular use. The system is currently installed and requires acceptance testing before becoming operational

  9. Management of intellectual capital and its influence on personnel economic performance

    Directory of Open Access Journals (Sweden)

    mahmoud Gholami Karin

    2016-02-01

    Full Text Available Studies have shown that, knowledge is an effective source for increasing personnel economic performance. Basically, managers of companies by considering prevailing economic conditions are forced to correct and improve methods of production, marketing, and innovation and ultimately increase economic productivity. One of the main ways to improve economic growth and increase competitive advantage, for factories is the use of creative thinking that it without the recognition and management of intellectual capitals will not be possible. The main objective of present research is to study the influence of intellectual capital components on economic performance of companies working in Saipa Automotive Manufacturing Group. Also determine relation between components of intellectual capital together. Components of intellectual capital (human, structural, and relational capital are independent variables and personnel economic performance is considered as a dependent variable. Multiple regression analysis has used for study the influence of components of intellectual capital on personnel economic performance. For test of relation between components of intellectual capital together, have used Pearson correlation analysis and for test of model has used structural equation modeling. The collected data were analyzed with the SPSS and Lisrel software, and finally the relationship between intellectual capital components were confirmed and it has been determined that relational and structural capital directly and human capital, indirectly, impress personnel economic performance in Saipa Automotive Manufacturing Group.

  10. Personnel Monitoring Department - DEMIN

    International Nuclear Information System (INIS)

    1989-01-01

    The activities and purposes of the Personnel Monitoring Dept. of the Institute of Radioprotection and Dosimetry of the Brazilian CNEN are presented. A summary of the personnel monitoring service is given, such as dosemeters supply, laboratorial inspections, and so on. The programs of working, publishing, courses and personnel interchange are also presented. (J.A.M.M.)

  11. Applications of nuclear safety probabilistic risk assessment to nuclear security for optimized risk mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, S.K.; Harvey, S.B. [Amec Foster Wheeler, Toronto, Ontario (Canada)

    2016-06-15

    Critical infrastructure assets such as nuclear power generating stations are potential targets for malevolent acts. Probabilistic methodologies can be applied to evaluate the real-time security risk based upon intelligence and threat levels. By employing this approach, the application of security forces and other protective measures can be optimized. Existing probabilistic safety analysis (PSA) methodologies and tools employed. in the nuclear industry can be adapted to security applications for this purpose. Existing PSA models can also be adapted and enhanced to consider total plant risk, due to nuclear safety risks as well as security risks. By creating a Probabilistic Security Model (PSM), safety and security practitioners can maximize the safety and security of the plant while minimizing the significant costs associated with security upgrades and security forces. (author)

  12. Impacts of Psychological Science on National Security Agencies Post-9/11

    Science.gov (United States)

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  13. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  14. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  15. The Burden of Difference? School Welfare Personnel’s and Parents’ Views on Wellbeing of Migrant Children in Finland

    Directory of Open Access Journals (Sweden)

    Minna Säävälä

    2012-01-01

    Full Text Available The school welfare system faces a challenge in the linguistically and culturally diversifying school. This article examines how school welfare personnel, native language teachers, and migrant parents conceptualize the wellbeing of migrant children in Finland. The data analyzed by thematic content analysis consists of group and individual interviews of a total of 47 persons: nurses, psychologists, social workers, a headmaster, special education teachers, native language teachers, and migrant parents in the Helsinki metropolitan area. The school welfare professionals and migrant parents views stressed different factors as risks and resources of migrant childrens wellbeing. In school welfare personnels view, school wellbeing is secured by downplaying difference between children of diverse cultural backgrounds; moreover, they do not see negative attitudes, discrimination, or bullying of migrant children as a particular problem. Migrant parents and native language teachers in turn consider or at least fear their childrens wellbeing to be jeopardized by social exclusion, prejudice or discrimination. The school personnel find it difficult to recognize the power imbalance between minorities and the national majority that lies behind these different conceptualizations. This reduces trust and impedes the cooperation of migrant homes and school, particularly in situations when an intervention is imperative for securing child wellbeing.

  16. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  17. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    Science.gov (United States)

    2016-02-01

    overhead transmission and distribution conductors are exposed. Microgrids offer a control method for utility systems that allow operators to control ... microgrids offer an additional level of control that installations would not otherwise have. For instance, an incident affecting one part of the grid...could cause undue strain on another part that is experiencing a higher power demand. With secure microgrid controls , technicians have the ability to de

  18. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition

    National Research Council Canada - National Science Library

    Murray, S

    1999-01-01

    The Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems...

  19. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  20. Policing the New World Disorder: Peace Operations and Public Security

    Science.gov (United States)

    1998-01-01

    incorporated into the new police forces. Personnel of the old Departamento Nacional de Investigaciones (DENI) formed the new Policia Tecnica Judicial (PTJ...Ministerio de Justicia, 1993). 25IUDOP, "La delincuencia urbana," Estudios Centroamericanos 534-545 (April/May 1993), 471-79. "Report of the Director...use of force, control of riots, negotiating techniques, or de -escalation of conflict. As noted above, CIVPOL is not capable of handling violent

  1. Modernization of the Indian Air Force: Security Implications for South Asia

    National Research Council Canada - National Science Library

    2005-01-01

    This thesis analyzes the Indian Air Force's (IAF) robust modernization campaign and explores why the IAF is on the path to transforming itself from an air force dedicated to air defense to one capable of global force projection...

  2. Personnel Retention Policy and Force Quality: Twice-Passed Staff Sergeants

    Science.gov (United States)

    2015-06-01

    61 Figure 20. Impact of Policy Changes on Average TIG . For Staff Sergeants, average TIG is reduced from 4.4 years to 3.8 years...with a 2P non-retention policy. Sergeants (E5) experience the only other significant reduction in average TIG , which goes from 3.2 years in the base...Warehouse TFRS Total Force Retention System TIG Time in Grade TIS Time in Service VSP Voluntary Separations Pay xxiii EXECUTIVE SUMMARY In

  3. Task Force On Contractor Logistics in Support of Contingency Operations

    Science.gov (United States)

    2014-06-01

    task force also strongly recommends outsourcing the necessary data gathering for older contracts and moving current contracts up in the queue with a...personnel, and administration, and extend to morale, welfare , recreation, and even mortuary affairs. Other services include airfield operations...analyzed and then audited only on a high-risk basis. The task force also strongly recommends outsourcing the necessary data gathering for older contracts

  4. DefenseLink: Securing Afganistan, Stabilization & Growth

    Science.gov (United States)

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  5. Opportunities and Risks for the Employment of Private Security Companies in Complex Contingencies

    National Research Council Canada - National Science Library

    Mayer, Christopher T

    2008-01-01

    .... Protection of noncombatant personnel, supplies, and facilities against terrorists, looting, and other lawlessness grows in importance while the availability of military forces cannot meet the demand...

  6. United States Air Force Statistical Digest, Jan 1949-Jun 1950, Fifth Edition

    Science.gov (United States)

    1951-04-25

    94.7437 0 • 51 (Face p. 10) PERSONNEL - MILITARY AND CIVILIAN The data presented in this part of the ~USAF Statistical DigesP are bll.$ed on audited ...Quarter ~rtor ~""r ~""r II’ORUlll’IDB ’TOrage Personnel Strength 159,757 16>,996 626,871 168,101 154,643 150,574 152,953 Acca "ioM _ ToW • ~ ~ ~ ~ UU l...Strategic Intelligence Army Language School Accountin& and Auditing AJ’lllJ’ Security Agency Officer, General Automatic Telephone syst8m 1l.aintenance Basic

  7. Maintaining International Peace and Security: Reflections on Peace ...

    African Journals Online (AJOL)

    it may take, under Article 42, "action by air, sea and land forces as may be necessary to ... budget. Police officers, election observers, human rights monitors and other civilians .... In Asia, only one of the five peace-support operations resulted in ..... armoured personnel carriers in less than satisfactory condition for moving.

  8. Personnel dose assignment practices

    International Nuclear Information System (INIS)

    Fix, J.J.

    1993-04-01

    Implementation of DOE N 5480.6 Radiological Control Manual Article 511(3) requirements, to minimize the assignment of personnel dosimeters, should be done only under a broader context ensuring that capabilities are in place to monitor and record personnel exposure both for compliance and for potential litigation. As noted in NCRP Report No. 114, personnel dosimetry programs are conducted to meet four major objectives: radiation safety program control and evaluation; regulatory compliance; epidemiological research; and litigation. A change to Article 511(3) is proposed that would require that minimizing the assignment of personnel dosimeters take place only following full evaluation of overall capabilities (e.g., access control, area dosimetry, etc.) to meet the NCRP objectives

  9. Qualification of NPP operations personnel

    International Nuclear Information System (INIS)

    Wang Jiao.

    1987-01-01

    Competence of personnel is one of the important problems for safety operation of nuclear power plant. This paper gives a description of some aspects, such as the administration of NPP, posts, competence of personnel, training, assessing the competence and personnel management

  10. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  11. Security analysis of optical encryption

    OpenAIRE

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-01-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  12. Security analysis of optical encryption

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-10-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  13. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  14. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  15. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  16. 76 FR 49650 - Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or...

    Science.gov (United States)

    2011-08-11

    ... security services. Comment: Confusion about Geographic Combatant Commander Delegation Authority to... intelligence gathering and vetting is unclear Response: The Synchronized Pre-deployment and Operational Tracker... Afghanistan. SPOT is not used for intelligence gathering or vetting of personnel. Background checks of PSCs...

  17. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  18. Evaluation of the effects of exposure to organic solvents and hazardous noise among US Air Force Reserve personnel

    Directory of Open Access Journals (Sweden)

    Hayley Hughes

    2013-01-01

    Full Text Available Hearing loss affects many workers including those in the military and may be caused by noise, medications, and chemicals. Exposures to some chemicals may lead to an increase in the incidence of hearing loss when combined with hazardous noise. This retrospective study evaluated the risk for hearing loss among Air Force Reserve personnel exposed to occupational noise with and without exposures to toluene, styrene, xylene, benzene, and JP-8 (jet fuel. Risk factors associated with hearing loss were determined using logistic and linear regression. Stratified analysis was used to evaluate potential interaction between solvent and noise exposure. The majority of the subjects were male (94.6% and 35 years or older on the date of their first study audiogram (66%. Followed for an average of 3.2 years, 9.2% of the study subjects had hearing loss in at least one ear. Increasing age (odds ratio [OR] = 1.03 per year of age and each year of follow-up time (OR = 1.23 were significantly associated with hearing loss. Low and moderate solvent exposures were not associated with hearing loss. Linear regression demonstrated that hearing loss was significantly associated with age at first study audiogram, length of follow-up time, and exposure to noise. Hearing decreased by 0.04 decibels for every decibel increase in noise level or by almost half a decibel (0.4 dB for every 10 decibel increase in noise level.

  19. Radiological protection of service and civilian personnel

    International Nuclear Information System (INIS)

    1990-01-01

    Since the United Kingdom's defence nuclear industry was founded in the late 1940s, Service and civilian personnel have been exposed to ionising radiation. During the last forty years, as knowledge about the effects of radiation exposure has grown, concern to ensure adequate protection against exposure has also increased,. As part of our continuing scrutiny of the Ministry of Defence (MoD), we have undertaken a short inquiry to examine MoD's current and future policy and practice on radiological protection. The principal work involving exposure of Service and civilian personnel to significant levels of radiation falls into two discrete areas: the nuclear weapons programme and the nuclear propulsion programme. The nuclear weapons programme involves research, the production of nuclear warheads and their deployment with Her Majesty's Forces. The nuclear propulsion programme involves research, production, operation, refitting and decommissioning of pressurised water reactors as a source of propulsion power in Royal Navy submarines. These two nuclear programmes are not the only sources of ionising radiation within MoD's responsibility: it also arises from research, non-destructive testing and medical applications, most notably conventional radiography. In this Report we have concentrated upon ionising radiation arising from the two defence nuclear programmes. (author)

  20. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State

    Science.gov (United States)

    Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.

    2017-01-01

    Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498

  1. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  2. Perceptions of Job Security in Europe's Ageing Workforce

    Science.gov (United States)

    Hank, Karsten; Erlinghagen, Marcel

    2011-01-01

    Using data from the 2004 Survey of Health, Ageing and Retirement in Europe, this paper investigates older workers' perceptions of job security in eleven countries. We describe cross-national patterns and estimate multilevel models to analyse individual and societal determinants of self-perceived job security in the older labour force. While there…

  3. Environmental Assessment for Proposed Security Forces Operations Facility, Buckley Air Force Base, Colorado

    National Research Council Canada - National Science Library

    Meyer, Elizabeth; Myklebust, Jessica; Denier, James; Christner, Jennifer; Fontaine, Kathyrn

    2006-01-01

    The United States Air Force (USAF) has prepared this EA in accordance with the National Environmental Policy Act to evaluate the potential environmental and social impacts from the construction and operation of the proposed SFOF...

  4. The Future Nuclear Arms Control Agenda and Its Potential Implications for the Air Force

    Science.gov (United States)

    2015-08-01

    US AIR FORCE INSTITUTE FOR NATIONAL SECURITY STUDIES USAF ACADEMY, COLORADO INSS OCCASIONAL PAPER AUGUST 2015 70 Dr. Lewis A. Dunn The Future...Implications for the Air Force Dr. Lewis A. Dunn INSS Occasional Paper 70 August 2015 USAF Institute for National Security Studies USAF

  5. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  6. Private Military and Security Contractors

    DEFF Research Database (Denmark)

    In Private Military and Security Contractors: Controlling the Corporate Warrior a multinational team of 16 scholars and a practitioner from political science, sociology, and law address a developing phenomenon: controlling the use of privatized force by states in international politics. Robust...

  7. The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

    Science.gov (United States)

    2014-01-01

    tions Command), John Mense (INSCOM), Paul Schuh (JFCC-NW), Russell Fenton (U.S. Army Network Enterprise Technology Command), and CW5 Todd Boudreau and...Surdu, 2009, pp. 16–17). Doctrine Irregular warfare and SOF doctrine lagged operational activities after the Vietnam War and prior to the...forces are, at their operating core, small teams of highly skilled specialists, and both communities value skilled personnel above all else. Irregular

  8. Nuclear radiation monitoring instruments for personnel in nuclear disaster for defence needs

    International Nuclear Information System (INIS)

    Bhatnagar, P.K.; Vaijapurkar, S.G.; Yadav, Ashok

    2005-01-01

    Ever since the tragedy of nuclear device exploding over Japan by USA in 1945 awareness exists amongst the armed forces personnel all over the world that a requirement of implementing radiological protection is imminent. Towards this adoption of radiological safety programme is a criterion. In a nuclear war disaster scenario, one encounters initial nuclear radiation (gamma and neutron radiations), gamma radiations from fallout, heat and blast. At certain distances Tanks/ armoured vehicles will survive and 4 R/s radiation level sensing to actuate relays for closing the ports of vehicles is essential, leading to reduction in inhalation, ingestion of fallout radioactivity and reduction in radiation dose received by occupants of the vehicle. Towards this sturdy radiation monitors to indicate gamma dose rate of the order of 1000 R/h, gamma and neutron dosimeters of the order of 1000 cGy with reading instruments are to be developed. These must work in harsh environment and sustain JSS 55555 conditions of army. Defence Laboratory, Jodhpur over past one decade has been involved in developing personnel, area and field monitoring instruments like dosimeters, survey meters, which are useful, acceptable to army personnel, armoured and personnel carrier vehicles, field structures/shelters. Technology transfer after satisfaction of armed forces, product ionisation and supply, maintenance, training has been the endeavor of the DRDO. Herein it is proposed to highlight the techno electronics nuclear radiation monitoring sensors and associated electronics systems developed first time in the country and productionised in bulk for Services for implementing personnel protection. The sensors developed and described are - Radiophotoluminescent Glass (RPLG) for gamma radiation dosimetry , neutron sensitive PIN diode for fast neutron dosimetry, gamma radiation sensitive PIN diode, superheated liquid neutron and gamma sensors. The dosimeter, dose rate meter and field/area instruments are

  9. The pharmaceuticalisation of security: Molecular biomedicine, antiviral stockpiles, and global health security.

    Science.gov (United States)

    Elbe, Stefan

    2014-12-01

    Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.

  10. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  11. The Financing and Personnel of the Lithuanian Army

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2015-12-01

    Full Text Available In 2014, at the beginning of the crisis in Ukraine and Russia‘s aggression against this neighboring country, Lithuania became concerned about the strengthening of its military capabilities, augmenting the National Defense System (NDS budget by almost 50% in two years. This may be considered unprecedented, if seen against the background of the presidential elections and those to the European Parliament, the fiscal discipline, the introduction of euro, as well as Russia‘s economic sanctions, the political decision in the course of 2014 on increasing the defense assignation by 130 million litas and in 2015 the increase by planned additional 356 million litas. This article analyzes two closely related problems of the Lithuanian NDS capabilities. First of all, changes in the NDS financing are explored in the context of permanent agreements of Lithuanian political parties concerning the allocation of 2% of the GDP for defense. This is followed by the discussion of the issues of military personnel staffing and training of the reserve as well as future challenges. This research contributes to the assessment of the critical NDS financing and staffing not only within academic circles but particularly among politicians and society in general. Additionally, it contributes to the awareness of the problems the army encountered in seeking to implement the objective set for it: to ensure the military security of the state. In the presence of the emerging threats in the region, this is of particularly great significance to the demilitarized and pacifist society of Lithuania. The article aims at identifying financing and personnel planning problems throughout a quarter of the century, ranging from the restoration of the Army of the Republic of Lithuania to 2014 inclusively. At the same time, the study encourages a discussion by the academic community on issues of the military security of the Lithuanian State and provides analyses as well as possible

  12. All-cause mortality and radar exposure among french navy personnel: a 30 years cohort study

    International Nuclear Information System (INIS)

    Dabouis, V.; Arvers, P.; Debouzy, J.C.; Perrin, A.; Hours, M.

    2006-01-01

    To improve operational performance in a modern navy force, radiofrequency (RF) and microwaves emitting devices are widely used. It has been suggested that exposure to electromagnetic fields could be associated with greater health hazards and higher mortality. The all-cause mortality of 39488 militaries of the French navy forces was studied over the period 1975-2001 with a cohort epidemiological study. They served from 1975 until 1995. In a first step, the mortality of radar exposed militaries was compared to a control group formed by militaries who served during the same period in the same environment but without radar exposure. Administrative procedures for identifying militaries and their vital status were equivalent in the radar and the control groups. The age standardized mortality ratio in the radar navy personnel was 0.70 (95% CI: 0.54-0.90). In professional militaries, no difference in mortality ratio was found according to duration of estimated exposure. During a 30 years period of observation, we found no increase in all-cause mortality in the French navy personnel who were close to radar equipments

  13. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  14. DOE Integrated Safeguards and Security (DISS) historical document archival and retrieval analysis, requirements and recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Guyer, H.B.; McChesney, C.A.

    1994-10-07

    The overall primary Objective of HDAR is to create a repository of historical personnel security documents and provide the functionality needed for archival and retrieval use by other software modules and application users of the DISS/ET system. The software product to be produced from this specification is the Historical Document Archival and Retrieval Subsystem The product will provide the functionality to capture, retrieve and manage documents currently contained in the personnel security folders in DOE Operations Offices vaults at various locations across the United States. The long-term plan for DISS/ET includes the requirement to allow for capture and storage of arbitrary, currently undefined, clearance-related documents that fall outside the scope of the ``cradle-to-grave`` electronic processing provided by DISS/ET. However, this requirement is not within the scope of the requirements specified in this document.

  15. 36 CFR 1202.90 - What NARA systems of records are exempt from release under the National Security Exemption of the...

    Science.gov (United States)

    2010-07-01

    ... of the Inspector General (NARA-23) and the Personnel Security Case Files (NARA-24) systems of records... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What NARA systems of records are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202...

  16. The Methodical Approach to Formation of the Economic-Social Provision of the Financial Security Management of Commercial Bank

    Directory of Open Access Journals (Sweden)

    Baryliuk Mariia-Mariana R.

    2017-06-01

    Full Text Available The article defines that the impact of threats on a commercial bank as an open socio-economic system results in losses that can be classified as financial, personnel, informational, and reputational. In terms of temporal horizons, losses are defined as tactical and strategic. Possible losses from external and internal threat implications have been determined, which have resulted in the development of a four-level structure of total losses from threat implications for the financial security of commercial bank. The proposed sequence of calculations for integrated assessment of threats impact provides an information basis for the development and introducing a set of interrelated organizational-economic measures to implement changes in the subsystem of financial security of commercial bank. The level of threats identified, the nature and extent of financial, personnel, information, and reputational losses are the basis for more efficient use of available resources and for improving the financial security management of commercial bank.

  17. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    2015-09-01

    equipment, and habitat destruction from general construction (DoE, “ Wind Turbine Interactions with Birds , Bats, and Their Habitats,” pgs 2-4). Another...utility-resource-efficiency>, accessed 16 December 2014. Department of Energy, Wind Turbine Interactions with Birds , Bats, and Their Habitats... Wind power is a mature technology, with wind turbines first being used for electricity in the late 19th century. The Air Force operates two wind

  18. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    Science.gov (United States)

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  19. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  20. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  1. Non-Rated Air Force Line Officer Attrition Rates Using Survival Analysis

    Science.gov (United States)

    2015-03-26

    Further complicating human resourcing, all Air Force members–enlisted and officer–start at entry-level. Personnel entering the Air Force inventory are...the system [8]. Chi-squared automatic interaction detection (CHAID) is an algorithm “to predict the response behaviour [sic] of individuals as...branches with the highest probability may require incentives to increase attrition. The branches could be defined by gender, career field, religion

  2. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    Science.gov (United States)

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  3. The Swedish police as a part of the security systems of nuclear material and other radioactive materials

    International Nuclear Information System (INIS)

    Nylen, L.

    2001-01-01

    Full text: In Sweden a special transport system has been developed for transport of nuclear substances and nuclear waste. This system in itself includes a high security level. Extraordinary circumstances can give cause for protective police measures and intervention. In concerned provinces an incident and emergency response planning take place of the police actions that may be needed at the following types of event: a) bomb threat; b) attack or threat of attack on transport vehicle; c) demonstrations. If a Swedish nuclear power plant is the subject of a bomb threat or other criminal assault, it is in Sweden, according to the Police Act, the task of the police to intervene, interrupt criminal acts and to restore order and security. The role of the Swedish police as regards the physical protection is, among other things, to carry out a certain control within protected area by special trained police personnel before a reactor is put into operation or restarted after revision or repair. Police authorities that have a nuclear power station within its jurisdiction should establish a plan for police actions at the nuclear power station in consultation with legal owner or management of the plant, the Swedish Nuclear Power Administration and the county administration. Special training and frequent practice of response personnel is crucial as well as co-training with key personnel at nuclear power stations. The National Criminal Investigation Department coordinates and commands police measures concerning different types of nuclear transports. Close co-operation with security and operational personnel at the nuclear power stations, operators of the transport system, the Swedish Nuclear Power Administration and the Swedish Radiation Protection Institute is very important. (author)

  4. Preventive medical programmes to personnel exposed to ionizing radiation

    International Nuclear Information System (INIS)

    Estrada F, E.

    1996-01-01

    The increasing use of ionizing radiation in the medical field as well as in industry and research grants has special importance to the security aspects related to the individual as well as his surroundings, reason for which the implementation of effective Occupational Radiation Protection Programmes constitutes a priority. Presently, in Guatemala, an Occupational Medicine Programme, directed to the Radiosanitary watch over of occupationally exposed personnel does not exist. It is the goal in this project to organize and establish such programme, based on protective and training actions focused toward the employee as the main entity, his specific activities and his work surroundings. Medical watch over together with Radiation Protection will permit the reduction of the occurrence probability of accidents or incidents, as well as the limitation of stochastic effects to the undermost values. The application scope of the present project is, in the first place, directed to the occupationally exposed personnel of the Direcci[n General de Energ[a Nuclear, as regulatory entity of these activities, and afterwards, its application in the different institutions which work with ionizing radiations. All the previously exposed is based on the Nuclear Legislation prevailing in Guatemala as well as the recommendations of international organizations. (author)

  5. Expeditionary Border Security Operations: Eliminating the Seams

    National Research Council Canada - National Science Library

    Zinno, Michael J

    2008-01-01

    .... This convergence greatly expands the scope and capability of each individual terrorist or criminal organization and the cumulative effect can overwhelm the security forces of many nations and provide...

  6. EVOLUTION OF THEORETICAL APPROACHES TO THE DEFINITION OF THE CATEGORY “PERSONNEL POTENTIAL”

    Directory of Open Access Journals (Sweden)

    Аlexandra Deshchenko

    2016-02-01

    Full Text Available The article describes the evolution of theoretical approaches to definition of the category «personnel potential» based on the analysis of approaches to definition of the conceptual apparatus of labor Economics, including such categories as: labor force, labor resources, labor potential, human resources, human capital, human capital different authors. The analysis of the evolution of the terms in accordance with the stages of development of a society.

  7. The Study on Progression for Consolidating the Nuclear Security Legislative System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae San; Jung, Myung Tak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    One is the International Convention for Suppressing Acts of Nuclear Terrorism (ICSANT) and the other is amendment to the Convention on Physical Protection of Nuclear Material (CPPNM). ICSANT and CPPNM were proposed by the UN and IAEA, respectively to strengthen the international framework of nuclear security. The ICSANT was entered into force in 2007, but CPPNM amendment is pending in force because the shortage of countries who ratify it. For going into effect this convention, it needs the two-thirds of the States Parties to the CPPNM. It is not completed, yet. So, various initiatives such as nuclear security summit, GICNT, UN ministerial conference, etc. treated that those two conventions were the primary basis to strengthen the global nuclear security architecture. The Republic of Korea (ROK) continuously has made an effort to consolidate the nuclear security legislative framework since the 2010. The purpose of this paper is to provide what we did to strengthen the nuclear security legal framework and what should we do next.

  8. The Study on Progression for Consolidating the Nuclear Security Legislative System

    International Nuclear Information System (INIS)

    Kim, Jae San; Jung, Myung Tak

    2015-01-01

    One is the International Convention for Suppressing Acts of Nuclear Terrorism (ICSANT) and the other is amendment to the Convention on Physical Protection of Nuclear Material (CPPNM). ICSANT and CPPNM were proposed by the UN and IAEA, respectively to strengthen the international framework of nuclear security. The ICSANT was entered into force in 2007, but CPPNM amendment is pending in force because the shortage of countries who ratify it. For going into effect this convention, it needs the two-thirds of the States Parties to the CPPNM. It is not completed, yet. So, various initiatives such as nuclear security summit, GICNT, UN ministerial conference, etc. treated that those two conventions were the primary basis to strengthen the global nuclear security architecture. The Republic of Korea (ROK) continuously has made an effort to consolidate the nuclear security legislative framework since the 2010. The purpose of this paper is to provide what we did to strengthen the nuclear security legal framework and what should we do next

  9. Contribution of mental and physical disorders to disability in military personnel.

    Science.gov (United States)

    Beliveau, P J H; Boulos, D; Zamorski, M A

    2018-05-19

    Combat operations in Southwest Asia have exposed millions of military personnel to risk of mental disorders and physical injuries, including traumatic brain injury (TBI). The contribution of specific disorders to disability is, however, uncertain. To estimate the contributions of mental and physical health conditions to disability in military personnel. The sample consisted of military personnel who participated in the cross-sectional 2013 Canadian Forces Mental Health Survey. Disability was measured using the World Health Organization Disability Assessment. The International Classification of Functioning, Disability, and Health was used to classify participants with moderate/severe disability. Chronic mental disorders and physical conditions were measured by self-reported health professional diagnoses, and their contribution to disability was assessed using logistic regression and resulting population attributable fractions. Data were collected from 6696 military members. The prevalence of moderate/severe disability was 10%. Mental disorders accounted for 27% (95% confidence interval [CI] 23-31%) and physical conditions 62% (95% CI 56-67%) of the burden of disability. Chronic musculoskeletal problems 33% (95% CI 26-39%), back problems 29% (95% CI 23-35%), mood disorders 16% (95% CI 11-19%) and post-traumatic stress disorder (PTSD) 9% (95% CI 5-12%) were the leading contributors to disability. After-effects of TBI accounted for only 3% (95% CI 1-4%) of disability. Mental and physical health interacted broadly, such that those with mental disorders experienced disproportionate disability in the presence of physical conditions. Chronic musculoskeletal conditions, back problems, mood disorders and PTSD are primary areas of focus in prevention and control of disability in military personnel.

  10. THEORETICAL BASIS FOR MANAGEMENT OF PERSONNEL RISKS

    OpenAIRE

    Haliashova, Katsiaryna

    2017-01-01

    Necessity of personnel risks management is based on research results. The authors' approaches to the determination of personnel risks and to their management have been explored. The author's definition of the concept of "personnel risks" is proposed. A classification of personnel risks is developed depending on the stage of origin and the tasks of the personnel policy, as well as the methods of management personnel risks in the organization. The article presents a methodical approach to perso...

  11. The workplace satisfaction of Romania’s medical personnel in state and public institutions

    Directory of Open Access Journals (Sweden)

    Ghenu Cristina

    2017-07-01

    Full Text Available Nowadays the Romanian medical system is facing changes in terms of qualified personnel. Each year a great number of doctors decide to leave Romania in order to conduct practice in other countries with better working conditions. In this situation where doctors are no longer pleased to work in Romanian institutions, can we question the quality of their working environment? This study aims to determine the workplace satisfaction of Romania’s medical personnel currently working in private as well as state healthcare institutions. In this process, the study also discloses the inside image of Romanian medical units concerning the quality of the working environment, the quality of communications between subordinates belonging to the same section as well as their relations with their „direct superior”, „hierarchic superior” and „senior management”. To construct the current research, Romanian medical personnel completed a survey in order to determine their knowledge and judgment regarding their working environment. The research implied two phases: the first phase lasted one month and a half during which 100 medical personnel from a public hospital were selected to answer a survey; the second phase followed and it targeted the application of the same questions on 100 medical personnel working in a private institution. The survey comprised situations of everyday life in which any employee can be found. The results reveal the present situation of Romanian medical personnel, how often, despite of their unpleasant working conditions, they are forced to give their best in order to provide the quality medical treatment that any patient is entitled to. Therefore, the findings (1 reveal the inside image of Romanian hospital’s system and (2 offer an empirical foundation for subsequent research and improvement of working environments in Romanian hospitals.

  12. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  13. The Flask Security Architecture: System Support for Diverse Security Policies

    Science.gov (United States)

    2006-01-01

    Flask microkernel -based operating sys­ tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro­ totype system is microkernel -based, the security...mecha­ nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup

  14. Securing a control system: experiences from ISO 27001 implementation

    International Nuclear Information System (INIS)

    Vuppala, V.; Vincent, J.; Kusler, J.; Davidson, K.

    2012-01-01

    Recent incidents of breaches, in control systems in specific and information systems in general, have emphasized the importance of security and operational continuity in achieving the quality objectives of an organization, and the safety of its personnel and infrastructure. However, security and disaster recovery are either completely ignored or given a low priority during the design and development of an accelerator control system, the underlying technologies, and the overlaid applications. This leads to an operational facility that is easy to breach, and difficult to recover. Retrofitting security into a control system becomes much more difficult during operations. In this paper we describe our experiences with implementing ISO/IEC 27001 Standard for information security at the Electronics Department of the National Superconducting Cyclotron Laboratory (NSCL) located on the campus of Michigan State University. We describe our risk assessment methodology, the identified risks, the selected controls, their implementation, and our documentation structure. We also report the current status of the project. We conclude with the challenges faced and the lessons learnt. (authors)

  15. Personnel radiation dosimetry

    International Nuclear Information System (INIS)

    1987-01-01

    The book contains the 21 technical papers presented at the Technical Committee Meeting to Elaborate Procedures and Data for the Intercomparison of Personnel Dosimeters organizaed by the IAEA on 22-26 April 1985. A separate abstract was prepared for each of these papers. A list of areas in which additional research and development work is needed and recommendations for an IAEA-sponsored intercomparison program on personnel dosimetry is also included

  16. DOE assessment guide for safeguards and security

    International Nuclear Information System (INIS)

    Bennett, C.A.; Christorpherson, W.E.; Clark, R.J.; Martin, F.; Hodges, Jr.

    1978-04-01

    DOE operations are periodically assessed to assure that special nuclear material, restricted data, and other classified information and DOE facilities are executed toward continuing the effectiveness of the International Atomic Energy Agency safeguards. A guide to describe the philosophy and mechanisms through which these assessments are conducted is presented. The assessment program is concerned with all contractor, field office, and Headquarters activities which are designed to assure that safeguards and security objectives are reached by contractors at DOE facilities and operations. The guide takes into account the interlocking relationship between many of the elements of an effective safeguards and security program. Personnel clearance programs are a part of protecting classified information as well as nuclear materials. Barriers that prevent or limit access may contribute to preventing theft of government property as well as protecting against sabotage. Procedures for control and surveillance need to be integrated with both information systems and procedures for mass balance accounting. Wherever possible, assessment procedures have been designed to perform integrated inspection, evaluation, and follow-up for the safeguards and security program

  17. The tracking and locating system of the mining personnel based on the Zigbee wireless network platform

    Energy Technology Data Exchange (ETDEWEB)

    Xiao-jia, Xie; Li-jun, Cheng; Yong, Wang [Chongqing University, Chongqing (China). College of Resources and Environmental Science

    2007-08-15

    By comparing the advanced Zigbee wireless network system with active RFID, the Zigbee wireless network technology was introduced into the system for tracking and locating of coal miners. The system structure and function characteristics were also introduced. This system makes it convenient to mine administrators, control room personnel and security inspectors to obtain information on the working hours and location of mine workers in the mine. 6 refs., 2 figs., 3 tabs.

  18. Some problems of NPP personnel training

    International Nuclear Information System (INIS)

    Vajshnis, P.P.; Kumkov, L.P.; Omel'chuk, V.V.

    1984-01-01

    Shortcomings of NPP personnel training are discussed. Development of full-scale training systems is necessary for qualitative training operative personnel. Primary problems that should be necessarily solved for ensuring effective training NPP personnel are considered

  19. Security during the Construction of New Nuclear Power Plants: Technical Basis for Access Authorization and Fitness-For-Duty Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Branch, Kristi M.; Baker, Kathryn A.

    2009-09-01

    A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.

  20. 75 FR 28185 - Armed Forces Day, 2010

    Science.gov (United States)

    2010-05-20

    ... force in the history of the world because we have the finest personnel in the world. Wherever they are... separation of war. Today, let us raise our flags high to honor the service members who keep us safe, as we... my hand this fourteenth day of May, in the year of our Lord two thousand ten, and of the Independence...

  1. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  2. Nuclear security from cradle to grave

    International Nuclear Information System (INIS)

    Raja Adnan, Raja Abdul Aziz

    2016-01-01

    On 8 May 2016, the Amendment to the Convention on the Physical Protection of Nuclear Material (CPPNM) finally entered into force, almost eleven years after its adoption. The world will be a more secure place as a result of the commitments that States party to the Amendment have made. The Amendment establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. Under the Amendment, countries are required to establish appropriate physical protection regimes for nuclear material. They also take on new obligations to share information on sabotage, including on credible threats of sabotage. The entry into force of the Amendment demonstrates the international community’s resolve to act together to strengthen nuclear security globally. It also helps reduce the risk of an attack involving nuclear material, which could have catastrophic consequences.

  3. A security/safety survey of long term care facilities.

    Science.gov (United States)

    Acorn, Jonathan R

    2010-01-01

    What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.

  4. Application of wireless sensor networks in personnel dosage monitoring system of nuclear power plant

    International Nuclear Information System (INIS)

    Chen Yonghong; Zhang Dafa; Jiang Wei; Chen Dengke

    2007-01-01

    Aim to meet the need of personnel dosage monitoring of nuclear power plant, a monitoring system was designed which based on wireless sensor network. First, the basic concept was described; the characteristics of the wireless sensor network applied in the monitoring system of nuclear power plant were also been analyzed; the structure of the system was built too. Finally, the special technologies like the choice of communication mode, the security of communication network and orientation that used in the monitoring system were discussed. (authors)

  5. Integration of holography into the design of bank notes and security documents

    Science.gov (United States)

    Dunn, Paul

    2000-10-01

    The use of holograms and other diffractive optically variable devices have been used successfully in the fight against counterfeiting of security documents for several years. More recently they have become globally accepted as a key security feature on banknotes as reflected in their prime use on the Euronotes to be issues in 2002. The success of the design and origination of these images depends upon their strong visual appeal, their overt and covert content and the ability to offer unique features that provides an extremely difficult barrier for the would be counterfeiter to overcome. The basic design principles both for banknote and general security print application are discussed in this review document. TO be effective as a security device the image must be fit for the purpose. This means that the image must contain the level of overt and covert features that are easy to recognize, containing high level security features and form part of an educational program aimed at the product user and specifically trained security personnel. More specifically it must meet a clearly defined performance criteria.

  6. Ethnic Minority Personnel Careers: Hindrances and Hopes

    OpenAIRE

    Ross, Catharine

    2004-01-01

    Personnel departments often have particular responsibility for equal opportunities within their organizations. This paper explores equal opportunities within personnel departments themselves, in relation to the careers of ethnic minority personnel practitioners. Through primary research, it identifies a range of criteria which can affect personnel careers, of which ethnic origin is often one. However, although being categorized as of ethnic minority origin often hinders personnel careers, the...

  7. Legal and regulatory aspects of optimization comprehensive support service and combat activity of the Security service of Ukraine and the National guard of Ukraine emergency social situation

    Directory of Open Access Journals (Sweden)

    В. В. Мацюк

    2015-05-01

    legislation regarding the classification of support types. A clear gradation of the support types is required for effective comprehensive support of the law enforcement forces service and combat activities while performing social emergencies response tasks. This question particularly arises during collateral execution of service and military tasks by different authorities, for example, joint duties of National Guard of Ukraine and Security Service of Ukraine personnel. The most problematic of the abovementioned now is the materiel support. The special operation materiel support should be headed by a National Guard of Ukraine officer, as National Guard military units and subdivisions, unlike the Security Service of Ukraine units or other law enforcement forces, have assigned materiel subdivisions, trained specialists and are able to rapidly deploy logistics objects. The use of contemporary IT is one of the means of comprehensive support optimization, in particular: use of mobile computer equipment in field conditions, application of modern geoinformational technologies, implementation of electronic data exchange, introduction of up-to-date digital communication. In order to augment the materiel support, effective public anti-corruption policy has to be established during tender supplies purchases for the security and defense sector; legislative environment on public-private partnership in the state defense field has to be improved, considering foreign experience and mistakes of outsourcing implementation in the Armed Forces of Ukraine. Conclusions of the research. Following regulatory and legal measures need to be taken: conduct a statutory regulation of centralization of comprehensive support of joint activities of Ukrainian security and defense sector authorities during social emergencies settlement; enhance the legislative environment of the tender purchases system in order to minimize corruptive abuse and reduce the bureaucratic component; form a unified legal framework

  8. Special training of shift personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1981-01-01

    The first step of on-the-job training is practical observation phase in an operating Nuclear Plant, where the participants are assigned to shift work. The simulator training for operating personnel, for key personnel and, to some extent, also for maintenance personnel and specialists give the practical feeling for Nuclear Power Plant behaviour during normal and abnormal conditions. During the commissioning phase of the own Nuclear Power Plant, which is the most important practical training, the participants are integrated into the commissioning staff and assisted during their process of practical learning by special instructors. The preparation for the licensing exams is vitally important for shift personnel and special courses are provided after the first non-nuclear trial operation of the plant. Personnel training also includes performance of programmes and material for retraining, training of instructors and assistance in building up special training programmes and material as well as training centers. (orig./RW)

  9. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  10. Personnel Policy and Profit

    DEFF Research Database (Denmark)

    Bingley, Paul; Westergård-Nielsen, Niels Chr.

    2004-01-01

    personnel structure variation. It is found that personnel policy is strongly related to economic performance. At the margin, more hires are associated with lower profit, and more separations with higher profit. For the average firm, one new job, all else equal, is associated with ?2680 (2000 prices) lower...

  11. Security assessment in harbours: parameters to be considered

    Energy Technology Data Exchange (ETDEWEB)

    Romero Faz, D.; Camarero Orive, A.

    2016-07-01

    The ports are the main node in the supply chain and freight transportation. The terrorist attacks of September 11, 2001 marked a turning point in global security. Following this event, and from then on, there is a widespread fear of an attack on commercial ports. The development of the International Ship and Port Facility Security (ISPS) Code of the International Maritime Organization (IMO), and the implementation of the measures derived from it, have significantly improved security at port facilities. However, the experience in recent decades indicates the need for adjustments in the security assessment, in order to improve risk assessment, which is sometimes either underestimated or overestimated. As a first result of the investigation, new parameters for assessing security are proposed considering new aspects on the basis of an analysis of the main methodologies specific to port facilities, the analysis of surveys of the responsible managers for the security of the Spanish port system, and the analysis of the security statistics obtained through security forces. (Author)

  12. The Role Of Food Proximity in Eating Behavior and Body Mass Index Among Air Force Personnel

    Science.gov (United States)

    2009-02-23

    the more current 2003 report indicated a 15.3% prevalence of obesity among active duty Army personnel (National Quality Management Program, 2003...active duty military members have a BMI of 30 kg/m2 or greater; National Quality Management Program, 2003). Collectively, these findings are...carry-out eating places without waiter service” (French, et al., 2001). It is important to note, however, that the definition of fast food tends to

  13. 49 CFR 193.2711 - Personnel health.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Personnel health. 193.2711 Section 193.2711 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2711 Personnel health. Each operator...

  14. 78 FR 76667 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-18

    ... principles of trade, to remove impediments to and perfect the mechanism of a free and open market and a... personnel or the security of facilities and records, thereby enhancing business continuity, workplace safety... filed with the Commission, and all written communications relating to the proposed rule change between...

  15. Mutual Payments in Increase of the Level of Economic Security of Energy Generating Enterprises

    Directory of Open Access Journals (Sweden)

    Ruzhytskyi Andrіy V

    2013-12-01

    Full Text Available The article presents main approaches to the essence of the economic security of an enterprise notion, namely, approach of counter-action to threats, approach of successful market activity and approach of achievement of certain development goals; it identifies the role of economic security of energy generating enterprises in economic security of other subjects and the country in general; it offers definition of the economic security of an enterprise notion as a complex characteristic of the state of the enterprise that reflects the level of the enterprise possibility to ensure functioning and development; it marks out functional components of economic security, which are connected with mutual payments, namely, financial, personnel, technical and technological, political and legal, informational and interface ones; it presents connection of mutual payments with the level of financial component of economic security of enterprises, which envisages financial flow from or to the enterprise for changing the obligation status or its quantitative characteristics.

  16. Labor force activity after 60

    DEFF Research Database (Denmark)

    Pedersen, Peder J.; Larsen, Mona

    2015-01-01

    of reference. Main emphasis is given to the development in two distint age groups, i.e. people in the first half of the 60s of which many are eligible for early retirement programs and people older than 65 mostly eligible for social security retirement programs. For these two age groups the actual development...... in labor force participation is described based on register data and on labor force surveys along with indicators of cohort relevant changes in education and health. Focus in the paper includes also the gender aspect to accommodate stronger cohort effects for women than for men. The impact on labor force...

  17. Iraqi Navy: Capability Requirements and Force Structure Recommendations for 2015 and Beyond

    National Research Council Canada - National Science Library

    Lawlor, Alison C; Thompson, Eric V

    2008-01-01

    .... The goal of this study is two-fold: to provide Iraqi and Coalition personnel with a common assessment of capability requirements and force structure recommendations for the Iraqi Navy, and to provide the Iraqi Navy leadership...

  18. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  19. Engagement and Implications for Future National Security Strategies: Can the Services Adapt

    National Research Council Canada - National Science Library

    Hodge, Michael

    2000-01-01

    ...: mission profiles beyond the design of US armed forces, debate over the role of US armed forces within an "engagement" construct, debate over the future nature of US Security Policy and doctrinal...

  20. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.