WorldWideScience

Sample records for states national security

  1. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  2. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  3. National Security Imperatives and the Neorealist State: Iran and Realpolitik

    National Research Council Canada - National Science Library

    Grogan, Michael

    2000-01-01

    .... Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for spreading its brand of Islamic revolution abroad...

  4. Neuroscience, ethics, and national security: the state of the art.

    Directory of Open Access Journals (Sweden)

    Michael N Tennison

    Full Text Available National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  5. Neuroscience, ethics, and national security: the state of the art.

    Science.gov (United States)

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  6. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  7. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  8. Post-Apartheid South Africa and United States National Security

    National Research Council Canada - National Science Library

    Cochran, Edwin

    1998-01-01

    .... It is based on the realist premise that the U.S. has limited national interests in Sub-Saharan Africa which would be best served by a regional security strategy explicitly predicated on engagement with South Africa...

  9. An Assessment of the United States National Security Strategy for Combating Terrorism

    National Research Council Canada - National Science Library

    Chambliss, John

    2004-01-01

    .... While terrorism may be simply viewed as a crime against humanity the United States must pursue a comprehensive policy and strategy to deal with such acts anywhere and anytime because they threaten its national security...

  10. Desovereignization of national state, economy and security in terms of globalization

    Directory of Open Access Journals (Sweden)

    Rakić Mile M.

    2014-01-01

    Full Text Available In current modern age of worldwide processes of globalization and globalism a process of desovereigntization of national state and economy has become a general process. Therefore national state has been faced with numerous challenges and it has been in a permanent state of crisis. Within the process of globalization most often rich enclaves of national states make attempts to integrate themselves into neoliberal capitalist system, while poor and backward enclaves become abandoned and so national states become disintegrated. First of all it is necessary to search for causes of ethno-religious conflicts and a national separatism in the field of economy. Within the globalization environment it happened that old entities, national state, national economy and national security gained totally new meanings. By using a method of comparative analysis of document contents and consitutional and political practice alike it is possible to reach conclusion that a great number of modern national states, including the Republic of Serbia among them, have found themselves in the state of permanent crisis, and the state crisis implies, before anything else, the crisis of state sovereignty. The state gets destroyed both from inside and outside in different ways. By using a quality method it is confirmed that within a state there comes an overstepping of constitutional regulations which encompass, before else, the issues of national economy and national security, and it is achieved in particular by seizure of economic sovereignty.

  11. The National Security Strategy of the United States of America

    National Research Council Canada - National Science Library

    Bush, George

    2002-01-01

    ...: freedom, democracy, and free enterprise. In the twenty-first century, only nations that share a commitment to protecting basic human rights and guaranteeing political and economic freedom will be able to unleash the potential...

  12. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  13. Niger Delta Crisis and Security Implications for the Nation State ...

    African Journals Online (AJOL)

    The Niger Delta is the nation's treasure base, the Niger Delta provides over 80 percent of government revenue, 95 percent of export receipts, and 90 percent of ... The government should tackle the fundamental issue of basic necessities – provision of good motorable roads, pipe borne water, electricity, good hospitals, good ...

  14. National Security Strategy of the United States of America

    Science.gov (United States)

    2017-12-18

    build new partnerships based on the principle of reciprocity. Economic tools—including sanctions, anti-mon- ey- laundering and anti-corruption...parency, and help ensure that money reaches its intended destination. INCENTIVIZE REFORMS: The United States will use diplomacy and assistance to

  15. Affairs of State: The Interagency and National Security

    Science.gov (United States)

    2008-12-01

    fluency in meshing all the levers and instruments of power. The authors of this compendium join in a common effort to shed light on how the...applications, but found to be in use for ballistic missiles. Representatives from the State Department might want to encourage the sale to cement ...from Murphy’s service in World War II were that “ground truth” took many forms, including language fluency and political, diplomatic, and economic

  16. The Iranian petroleum crisis and United States national security.

    Science.gov (United States)

    Stern, Roger

    2007-01-02

    The U.S. case against Iran is based on Iran's deceptions regarding nuclear weapons development. This case is buttressed by assertions that a state so petroleum-rich cannot need nuclear power to preserve exports, as Iran claims. The U.S. infers, therefore, that Iran's entire nuclear technology program must pertain to weapons development. However, some industry analysts project an Irani oil export decline [e.g., Clark JR (2005) Oil Gas J 103(18):34-39]. If such a decline is occurring, Iran's claim to need nuclear power could be genuine. Because Iran's government relies on monopoly proceeds from oil exports for most revenue, it could become politically vulnerable if exports decline. Here, we survey the political economy of Irani petroleum for evidence of this decline. We define Iran's export decline rate (edr) as its summed rates of depletion and domestic demand growth, which we find equals 10-12%. We estimate marginal cost per barrel for additions to Irani production capacity, from which we derive the "standstill" investment required to offset edr. We then compare the standstill investment to actual investment, which has been inadequate to offset edr. Even if a relatively optimistic schedule of future capacity addition is met, the ratio of 2011 to 2006 exports will be only 0.40-0.52. A more probable scenario is that, absent some change in Irani policy, this ratio will be 0.33-0.46 with exports declining to zero by 2014-2015. Energy subsidies, hostility to foreign investment, and inefficiencies of its state-planned economy underlie Iran's problem, which has no relation to "peak oil."

  17. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  18. The new PR of states: How nation branding practices affect the security function of public diplomacy

    DEFF Research Database (Denmark)

    Rasmussen, Rasmus Kjærgaard; Merkelsen, Henrik

    2012-01-01

    This paper investigates how the role of public relations practice in public diplomacy is undergoing a transformation as a consequence of the influence from nation branding. A case study of the Danish government's response to the so-called Cartoon Crisis illustrates how the threat from international...... a domestic audience. In the public diplomacy efforts towards transnational publics the link to national security will completely disappear whereby the public relations of states is transformed to the marketing of states....... terrorism to national security initially served as a catalyst for new public diplomacy initiatives. But as the initiatives were implemented within a framework of nation branding the focus on risk reduction became subjected to a marketing logic and a new focus on economic objectives took over. The paper...

  19. ORDER SECURITYNATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  20. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  1. National Security in the Nuclear Age. A Conference for State Social Studies Coordinators on Pre-Collegiate National Security Education (Washington, DC, June 26-July 1, 1983).

    Science.gov (United States)

    Trout, B. Thomas; And Others

    This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…

  2. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  3. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  4. Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Long, J.D.

    2013-01-01

    The IAEA has described the Safeguards by Design (SBD) concept as an approach in which international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning. Often, international safeguards features are added following completion of the facility design. Earlier consideration of safeguards features has the potential to reduce the need for costly re-designs or retrofits of the facility and can result in a more efficient and effective safeguards design. The U.S. Department of Energy's National Nuclear Security Administration (NNSA) initiated a project in 2008 through its Next Generation Safeguards Initiative (NGSI) to establish a global norm for the use of SBD. The NGSI SBD program is evolving in parallel with a similar effort at the IAEA, while taking into account the IAEA's SBD achievements and future plans. The NGSI program includes DOE laboratory studies, international workshops, engagement with industry and the IAEA, and setting an example through its planned use in new nuclear facilities in the United States. Consistent with this effort, the NGSI program has sponsored 'Lessons Learned' studies and the preparation of facility-specific SBD Guidance documents. The NGSI program also takes into account successes that the NNSA has had with implementing safeguards early into facility designs within the U.S. The purpose of this paper is the presentation of the most recent developments in SBD under NGSI within the U.S. as well as the presentation of 'Lessons Learned' integrating safeguards into new nuclear facility designs of the U.S. Nuclear Security Enterprise (NSE), namely the Uranium Processing Facility (UPF) project at the Y-12 National Security Complex in Oak Ridge, Tennessee and to discuss its relevance to international safeguards. The paper is followed by the slides of the presentation. (author)

  5. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  6. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  7. United States Responses to Japanese Wartime Inhuman Experimentation after World War II: National Security and Wartime Exigency

    Science.gov (United States)

    Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul

    2015-01-01

    In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743

  8. The atomic power state and national security - the hazardous nuclear potential

    International Nuclear Information System (INIS)

    Damm, W.; Daniels, W.

    1989-01-01

    The authors have chosen the uranium/plutonium cycle, the problems involved in safety engineering of power plant, and the power industry's structural pattern in order to show and to prove the doubtfulness of safety philosophies developed for nuclear energy which in fact is not mastered by the country's technological, social, or economic capabilities. The party 'The Greens' considers nuclear energy to be a hazard to national security and therefore demands prompt abandonment of nuclear power in order to save man and the natural environment. Surplus power supply is to be replaced by the concept of demand-tailored power generation, which is to be placed on the following footing: (1) purposeful and intelligent utilisation of energy allowing dramatic reduction of energy consumption; (2) Use and promotion of renewable energy sources; (3) Abandonment of monopolistic and undemocratic structures in the energy sector of the economy. (orig./HSCH) [de

  9. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...

  10. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  11. SECURITY RISKS, MYTHS IN A TRANSITIONING SUB-NATIONAL REGIONAL ECONOMY (CROSS RIVER STATE AND IMAGINATIVE GEOGRAPHIES OF NIGERIA

    Directory of Open Access Journals (Sweden)

    J. K. UKWAYI

    2015-03-01

    Full Text Available The emergence of an “international community” through accumulation of perceived risks that contrasts with those risks (of considerably lower levels of seriousness compared to those perceived constitutes one of the interesting (or intriguing subjects of risks and disaster studies surrounding the 9/11 era. The constructions of “imaginative geographies”, have frequently been biased in the practices that underlie the mapping of the foreign places tend to put-down the affected regions in their “paintings” for the global community. The latter are subsequently “demonized” in their ratings of competence for participating in world trade, tourism, travel, among other social/cultural, and economic and political activities. The objective of this article is to highlight how the exaggeration of risks (contrasted to actually existing/lived risks, practices that are frequently associated with such adverse “imaginative geographies” poses sub-national regional development dilemma in Nigeria’s Niger Delta. We trace the roots of adverse “imaginative geographies” of Nigeria to the Abacha dictatorship (1993-1997. Then we highlight the mixed characteristics of the Niger Delta conditions during the “return of positive image recapture” by Nigeria’s federal government (re-democratisation of the Fourth Republic, 1999-present, re-branding campaigns; as well as adverse conditions present. Most significantly, we show that despite these adversities, a combination of favorable geographical size, differentiation, sub-national regional security programme formulation and management taking aims at diversification have created “large oases” of peace and security in Cross River State, a part of the Niger Delta that has been completely unscathed by insurgencies of the nearby sub-national region and further away national origin. Apart from identifying sub-national regions qualifying for delisting from “adverse imaginative geographies” due to

  12. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    Science.gov (United States)

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  13. Liberia: National Security Interests in Transformational Development

    National Research Council Canada - National Science Library

    Coleman, Carolyn I

    2008-01-01

    Liberia is of national security interest to the United States of America. Liberia's 14-year civil war ended in 2003, leaving the country with a collapsed government and failing economic, physical, and social infrastructures...

  14. Current and Projected National Security Threats to the United States. Hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Eleventh Congress, Second Session

    Science.gov (United States)

    2010-02-02

    trainers see the tribal areas of Paki- stan as less secure and this had led al-Qa’ida to franchise into re- gional components in places such as North...and is still subject to sudden reversal or gradual erosion. The daunting array of challenges fac- ing African nations makes it highly likely in the... closure of Guantanamo and the transfer of detainees abroad. Now, the second paragraph of the letter states the following, ‘‘The professional

  15. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  16. Report on Progress Toward Security and Stability in Afghanistan and United States Plan for Sustaining the Afghanistan National Security Forces

    Science.gov (United States)

    2011-04-01

    105  8.2: INDIA ...2B Afghan Air Force 0 AMoD Education 3 ASOC 0 Gender Integration 0 Personnel Management 2B National Logistics 2B GS G1 2B AMoD AT&L 2B...award nomination package cites her determination to overcome Afghanistan’s cultural stereotypes and to serve in the military “as long as my country

  17. "The Islamic State Of Iraq And The Levant" (ISIL In The System Of Threats To The National Security Of Russia

    Directory of Open Access Journals (Sweden)

    Pavel V. Agapov

    2014-09-01

    Full Text Available In the present work authors analyze political, economic, military and many other aspects of the "Islamic State of Iraq and Levant" activity as essential factor of the destabilization in the region of the Middle East. Authors investigate destructive consequences of this terrorist religious group's positions strengthening for the national security of the Russian Federation and border states. Authors note that actions in Syria and Iraq have indirect, but transnational effect, pose threat to the interests of the national security of Russia, especially including one, conducted in Crimea with the use of Islamic radicals for this purpose, who are on the peninsula and territory of the Ukraine. In the present article authors note that every year in the process of the population's psychological fatigue strengthening, new losses among the military personnel and the intelligence services staff and also death of peaceful citizens, their positions will only amplify. "Defeatism" will become a powerful political force. Problem of the international legal aspect of the counteraction to the threat from the actions of foreign fighters-terrorists who are hired or accepted with ISIL, al-Nusra Front and other groups and organizations of the terrorist orientation is connected with the implementation of the UN Security Council Resolution 2178 (2014 made on September 24, 2014. It’s main objective – development of the nonviolent ways of the conflicts prevention and settlement for the purposes of the radicalization to the level generating terrorism risk degree decrease. In the conclusion authors argument that it is especially actual for the Russian regions, which is extremely vulnerable to extremism (North Caucasus, Volga Region.

  18. Transboundary natural area protection: Broadening the definition of national security

    Science.gov (United States)

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  19. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  20. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  1. National Security and National Development: A Critique

    African Journals Online (AJOL)

    DR Nneka

    There has been the tendency right from independence to view national ... the nation's economic underdevelopment, which has led to social injustice, ... For a nation, security connotes conditions of peace, stability, order ... They are very important for the ... According to Mathew (1989), Global development now suggests.

  2. A Call for National Security System Transformation

    Science.gov (United States)

    2012-06-01

    Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Fox News Corporation. “Last American Troops Leave Iraq...by Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Stewart, Douglas. “Constructing the Iron Cage: The...1947 National Security Act.” In Affairs of State: The Interagency and National Security. Edited by Gabriel Marcella . Carlisle, PA: Strategic

  3. National Guard State Partnership Program: Supporting U.S. Southern Command Security Cooperation Program

    National Research Council Canada - National Science Library

    Peart, Raphael G

    2006-01-01

    .... SPP has provided a meaningful extension of U.S. soft power within the region. It accomplished this by establishing strategic partnerships between National Guard units and various newly formed former Soviet countries...

  4. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  5. The National Security Strategy and National Interests: Quantity or Quality?

    National Research Council Canada - National Science Library

    Mercado, Leo

    2001-01-01

    The national security strategy (NSS), National Security Strategy for a New Century, published in December 1999, categorizes national interests as vital, important, and humanitarian and other interests...

  6. Weak states and security

    OpenAIRE

    Rakipi, Albert

    2006-01-01

    Cataloged from PDF version of article. Although the weak 1 failing states have often been deseribed as the single most important problem for the international order s ince the en d of Cold W ar (F .Fukuyaına 2004:92) several dimensions of this phenomenon still remain unexplored. While this phenomenon has been present in the international politics even earlier, only the post Cold W ar period accentuated its relationship with security issues. Following the Cold W ar' s "peacef...

  7. Japan's National Security: Structures, norms, and policies

    International Nuclear Information System (INIS)

    Katzenstein, P.J.; Okawara, N.

    1993-01-01

    Japan's national security policy has two distinctive aspects that deserve analysis. First, Japan's definition of national security goes far beyond traditional military notions. National security is viewed in comprehensive terms that also include economic and political dimensions. The second feature of Japan's security policy worth explanation is a distinctive mixture of flexibility and rigidity in the process of policy adaptation to change: flexibility on issues of economic security, rigidity on issues of military security, and flexibility combined with rigidity on issues of political security. With the end of the Cold War and changes in the structure of the international system, it is only natural that we ask whether and how Japan's national security policy will change as well. Optimists insist that the Asian balance of power and the US-Japan relationship will make Japan aspire to be a competitive, noninterventionist trading state that heeds the universal interest of peace and profit rather than narrow aspirations for national power. Pessimists warn us instead that the new international system will finally confirm Herman Kahn's prediction of 1970: Japan will quickly change to the status of a nuclear superpower, spurred perhaps by what some see as a dangerous rise of Japanese militarism in the 1970s and 1980s

  8. Conceptual Dimension of Problems of Joint Activity of the State and Civil Society Institutes on Ensuring National Security of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Gulyaikhin Vyacheslav N.

    2016-09-01

    Full Text Available In the article the main methodological approaches to the problem of interaction of institutes of the state and civil society in the context of ensuring national security of Russia are analyzed. Two main alternative concepts (liberal and etatist to which the Russian researchers adhere are allocated. Supporters of liberal approach suppose that domination of the interests of civil society and ensuring equal cooperation with government institutions at the solution of problems of ensuring national security is necessary. Adherents of the etatist concept defend an unconditional priority of government bodies in this sphere. The authors provide the conceptual analysis of estimates by domestic researchers of the main activities of associations of the citizens connected with the counteraction to threats of national security. In the article positive impact of institutes of civil society on political and social and economic processes in Russia is noted, their assistance in development of the state institutes of the state and the potential of constructive interaction with federal and regional authorities on ensuring national security is estimated. The detailed analysis of the politological concept according to which more active participation of public organizations and socially responsible citizens in ensuring national security is necessary, is carried out. Their influence on development of a security system has to become more and more considerable because of social and economic problems which are objectively demanding participation of civil society in their decision-making. It is connected also with the need of modernization breakthrough, not possible without civil initiatives. In the article the conclusion that the Russian researchers attach great value to interaction of institutes of the state and civil society in ensuring national security of the Russian Federation is drawn, conceptually proving the need of their joint activity for this direction, and

  9. Northeast Asia - Cultural Influences on the United States National Security Strategy

    National Research Council Canada - National Science Library

    Rogers, Larry

    2004-01-01

    .... A decade ago this approach towards the states of the Northeast Asia region was highly effective as their economic or military dependency upon us or their fear of both usually forced them to respond...

  10. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  11. Northeast Asia - Cultural Influences on the United States National Security Strategy

    Science.gov (United States)

    2004-03-19

    established that it was socially responsible for an individual to take his or her own life for the good of the whole. Taoism states that life and death are...Confucian, Japanese, Islamic , Hindu, Slavic-Orthodox, Latin American and possibly African. Although this proposal is modern and forward thinking, there is

  12. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  13. 40 CFR 92.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must be...

  14. 48 CFR 204.470-2 - National security exclusion.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...

  15. Venezuelas Pursuit of Caribbean Basin Interests: Implications for United States National Security.

    Science.gov (United States)

    1985-01-01

    sold to buyers in Western Europe and the United States. The most important Venezuelan exports in the 19th century were cocoa and coffee. In the 20th...confusion in the U.S. Congress over the difference between the Organiza- tion of Arab Petroleum Exporting Countries (OAPEC), of which Venezuela was not a...member, and the Organization of Petroleum Exporting Countries (OPEC), to which Venezuela belonged, the action remained in force even though Caracas had

  16. The National Guard State Partnership Program and Regional Security in the Western Balkans

    Science.gov (United States)

    2014-12-12

    educational system as well as youth movements are separated by ethnicity, which in turn leaves the young people susceptible to indoctrination and political...of the state to respond in natural emergencies.80 A testament of the effectiveness of the program is also its expansion from strictly mil-mil... testament of the friendship, we have deployed together to Afghanistan and continue to look for future military collaborations. Deployments are the

  17. Nuclear Electricity in the United States : Providing Energy For The Nation's Security and Well-Being

    International Nuclear Information System (INIS)

    Finger, Harold B.

    1988-01-01

    Nuclear energy in the United States has made major contributions since the small Shippingport prototype power plant began operating in 1957. Recent legislative and regulatory actions, as well as research an development, are indicating that additional nuclear capacity can be available in the years ahead. These actions reflect the public's recognition of the importance of nuclear energy. In addition, recent regulatory actions are reaffirming the health and safety of our current nuclear plants, as well as of those being completed. The performance of our current plants is being improved through the conscious dedication of the entire industry to excellence. There is increasing discussion in the United States of the importance of advanced reactor concepts development. The next generation of nuclear plants is already being ordered outside of the United States for example, here in Korea, in Japan, in the United Kingdom and those plants all use light water reactors. We are pleased that U. S. companies are working with you on these new plants. That continues to mean that we never let up on our drive for excellence. Excellence in operations must continue to be the conscious target of all operators. Excellence in communications to the public of the need for electrical capacity, of the benefits of nuclear energy, and of the excellence being achieved in operations is also essential. And excellence in communication to decision makers at all levels of government is also required to assure that sound legalisation and regulation is established and implemented

  18. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  19. Ingenuity and National Security

    Science.gov (United States)

    2013-06-01

    is in an unfamiliar situation as the lone super power without a significant existential threat. China is a rising power and Russia aspires to...independence to the most powerful nation on the planet . The time period surrounding World War II demonstrated that governmental processes and

  20. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...

  1. Rethinking National Security

    Science.gov (United States)

    1990-10-01

    III. ’Proliferation in the 1990m.’ tratomic Rhvii . 17 (Summer 1969): 9-20. 30 McGowan. Pat, and Charles W. Ke.le.. ZuLfMl. weaLpon. mi Foreig L Y...Vayrynen. ads. Militarization #1nd Production . New York: St. Martin’s, 1983. (HC 79 .D4 M54 1983) Twight, Charlotte. *Political Economy of the National

  2. Diversity Intersects with National Security.

    Science.gov (United States)

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  3. 14 CFR 1260.31 - National security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  4. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  5. National Security Space Launch Report

    Science.gov (United States)

    2006-01-01

    Company Clayton Mowry, President, Arianespace Inc., North American—“Launch Solutions” Elon Musk , CEO and CTO, Space Exploration Technologies (SpaceX...technologies to the NASA Exploration Initiative (“…Moon, Mars and Beyond.”).1 EELV Technology Needs The Atlas V and Delta IV vehicles incorporate current... Mars and other destinations.” 46 National Security Space Launch Report Figure 6.1 U.S. Government Liquid Propulsion Rocket Investment, 1991–2005

  6. Food security among young adults with disabilities in the United States: Findings from the National Health Interview Survey.

    Science.gov (United States)

    Brucker, Debra L

    2016-04-01

    Prior research has suggested that young adults with disabilities face economic, health and social disadvantage. Food security, an area of disadvantage that can influence overall health, has not been fully explored for this population. To examine levels of food security between young adults with and without disabilities, controlling for individual characteristics. Logistic regression analysis of a nationally representative sample of young adults (age 18-25) (n = 32,795) with and without disabilities, using pooled data form the 2011-2013 National Health Interview Survey. Young adults with disabilities have significantly higher odds (OR: 2.58, p young adults without disabilities, even when controlling for individual characteristics. Odds of living in a household that is food insecure are particularly high (OR: 5.35, p young adults with high levels of psychological distress, controlling for other factors. Young adults with disabilities have increased odds of living in a household that is food insecure. This study has important policy and community program implications. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  8. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  9. 10 CFR 602.16 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  10. 10 CFR 605.18 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  11. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    Science.gov (United States)

    2015-06-01

    are amplified by shifting demographics. Youth populations are rapidly growing in Africa and the Middle East, regions that face resource shortages...fear in opponents and generate support for their causes. They use improvised explosive devices (IED), suicide vests, and tailored cyber tools to...our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such

  12. At the Crossroads: Counterproliferation and National Security Strategy

    National Research Council Canada - National Science Library

    2004-01-01

    .... national security and an enormous challenge for the entire international community. In the hands of rogue states, failing states, or substate terrorist groups, these weapons threaten not only U.S...

  13. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  14. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  15. The Security Impact of Oil Nationalization: Alternate Futures Scenarios

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2010-01-01

    Full Text Available This article highlights the security impact of oil nationalization, develops and analyzes four energy security scenarios, and suggests options to reduce the potential negative impact of oil nationalization. In addition to the use of oil as a weapon, nationalization of oil can also lead to competition for scarce resources among states, facilitate the funding of terrorists or insurgents, contribute to destabilizing regional arms races, influence intra-state conflict, and sustain antagonistic political agendas.

  16. 37 CFR 5.1 - Applications and correspondence involving national security.

    Science.gov (United States)

    2010-07-01

    ... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...

  17. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  18. Selecting RMF Controls for National Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Witzke, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  19. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  20. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  1. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  2. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    Science.gov (United States)

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that…

  3. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  4. Theoreticalaspects ofinformation war and national security

    Directory of Open Access Journals (Sweden)

    A. V. Shumka

    2015-07-01

    Organization of effective ensuring information security system provides centralized control of specific functions that provide monitoring and control of all components of the national information space.

  5. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  6. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  7. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  8. Economics and Security: Resourcing National Priorities

    Science.gov (United States)

    2010-05-21

    Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu Report Documentation Page Form ApprovedOMB No...2010 William B. Ruger Chair of National Security Economics Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu

  9. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-02-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0002] President's National Security... National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, February 21, 2013... matters related to national security and emergency preparedness telecommunications policy. Agenda: The...

  10. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  11. The National Security Council: An Organizational Assessment

    National Research Council Canada - National Science Library

    Best Jr, Richard A

    2009-01-01

    The National Security Council (NSC) was established by statute in 1947 to create an interdepartmental body to advise the President with respect to the integration of domestic, foreign, and military policies relating to the national...

  12. NATIONAL SECURITY AND THE CONSTITUTIONAL RIGHT TO ...

    African Journals Online (AJOL)

    Such conduct has sacrificed the country's national security at the altar of soldiers' ..... may one day intervene directly or indirectly in politics of the country thereby .... Because this matter does not affect the National Council of Provinces or.

  13. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  14. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  15. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1993-01-01

    The three notions, disarmament, national security and interdependence, which are well known, need a new reading in the today's mission for the United Nations, to facilitate the democratic, evolutionary renewal of the the interdependent world, in which disarmament could play an important role without putting at risk national security, which is of primary concern for the majority of Member States. The recognition of the unity of the wold and its interdependence is the main focal point in the process of transition of the international community to the new world system of peace, cooperation and security based on United Nations Charter. This system was outlined at the Forty-fourth session of the General Assembly, and adopted by Member States as a resolution entitled 'Enhancing international peace, security and international cooperation in all its aspects in accordance with the Charter of United Nations'

  16. Food Security and Cardiovascular Disease Risk Among Adults in the United States: Findings From the National Health and Nutrition Examination Survey, 2003–2008

    Science.gov (United States)

    2013-01-01

    Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003–2008 was conducted. Four levels of food security status were defined by using 10 questions. Results Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31–4.31). Conclusion Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk. PMID:24309090

  17. Food security and cardiovascular disease risk among adults in the United States: findings from the National Health and Nutrition Examination Survey, 2003-2008.

    Science.gov (United States)

    Ford, Earl S

    2013-12-05

    Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003-2008 was conducted. Four levels of food security status were defined by using 10 questions. Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31-4.31). Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk.

  18. 76 FR 40296 - Declassification of National Security Information

    Science.gov (United States)

    2011-07-08

    ... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security Information...

  19. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  20. Africa’s Booming Oil and Natural Gas Exploration and Production: National Security Implications for the United States and China

    Science.gov (United States)

    2013-12-01

    natural gas have also increased, on net, the environmental component of energy security. While hydraulic fracking , for example, car- ries risks of...tion, or “ fracking .” South Africa had awarded Shell a technical cooperation permit in 2009 to determine the Karoo’s natural gas potential, and the

  1. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  2. Grand Strategy for the United States in the 21st Century? (A Look at the National Security Strategy Document of 2002 and Beyond)

    National Research Council Canada - National Science Library

    Tinsley, Peter G

    2005-01-01

    This paper examines the National Security Strategy (NSS) document of September 2002 and determines whether it provides a grand strategic framework that can be sustained for the rest of the Bush presidency and beyond...

  3. Food Security and Cardiovascular Disease Risk Among Adults in the United States: Findings From the National Health and Nutrition Examination Survey, 2003?2008

    OpenAIRE

    Ford, Earl S.

    2013-01-01

    Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003?2008 was conducted. Fou...

  4. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  5. Security Economics and Critical National Infrastructure

    Science.gov (United States)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  6. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  7. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  8. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  9. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  10. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  11. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  12. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  13. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  14. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  15. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...

  16. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  17. The Affect of Drug Trafficking in West Africa on the National Security Interests of the United States of America

    Science.gov (United States)

    2015-06-12

    countries like Columbia, Peru, and the Plurinational State of Bolivia can be broken into smaller shipments and be shipped via commercial air...colonial legacy of the region as well as the predatory and partisan nature of the state governments.50 Culturally , the region’s leadership often does

  18. 31 CFR 500.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  19. 31 CFR 515.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  20. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... the objectives of Executive Order 13526, Classified National Security Information. The rule allows... signed Executive Order 13526, Classified National Security Information, which was published in the...

  1. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  2. Los Alamos National Lab: National Security Science

    Science.gov (United States)

    SKIP TO PAGE CONTENT Los Alamos National Laboratory Delivering science and technology to protect Museum New Hires Publications Research Library Mission Science & Innovation Science & Innovation Facilities Science Pillars Research Library Science Briefs Science News Lab Organizations Science Programs

  3. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  4. Do Small States Matter? : A comparative analysis of the discourses by three of the non-permanent members of the United Nations Security Council on the crisis in Libya and Syria between 2011 and 2012.

    OpenAIRE

    Chowdhury, Afrida

    2017-01-01

    A new era of wars and instability have left the world shaken with the civil wars in Syria and Libya. Although there are many similarities with Syria and Libya, the two states did not have the same end due to actions by the United Nations Security Council. Libya resulted in a military humanitarian intervention, while Syria did not. Studies about the Security Council usually focuses on the actions of the Permanent Five members who holds institutional power and influence over the council, mostly...

  5. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  6. Should Cops Be Spies? Evaluating the Collection and Sharing of National Security Intelligence by State, Local and Tribal Law Enforcement

    Science.gov (United States)

    2013-03-01

    criminal activity, while state, local and tribal law enforcement provide the local-area expertise. A side benefit of this symbiotic relationship is all...intelligence was focused primarily on geopolitical rivalries” (pp. 41–42). Now that al-Qa’ida, through its surrogates and franchisees —as well as through its

  7. The Impact of Migration Processes on the National Security of Kazakhstan

    Science.gov (United States)

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  8. Security Implications Of Italian Nationalism

    Science.gov (United States)

    2016-03-01

    www.economist.com/news/europe/21635792-beppe-grillo-says-he-tired-and-his-movement-tired-his- autocratic - leadership -falling-star. 114 “Italy’s Five Star Movement...and-his-movement-tired-his- autocratic - leadership -falling-star. ———. “Salve Salvini: The Northern League Could Overtake Forza Italia as Italy’s Right...their passionate and flamboyant style , yet there are many more layers underlying the national character. Regional divides within the nation are distinct

  9. Nevada National Security Site Radiological Control Manual

    International Nuclear Information System (INIS)

    2012-01-01

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  10. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  11. Emerging Threats to National Security

    National Research Council Canada - National Science Library

    Treverton, Gregory F

    2005-01-01

    Statement of Gregory F. Treverton, Director, Intelligence Policy Center, RAND Corporation, Associate Dean, Pardee RAND Graduate School, before the Permanent Select Committee on Intelligence, given before the United States...

  12. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  13. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  14. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2010-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  15. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  16. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  17. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities exchange...

  18. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  19. Economic security of modern Russia: the current state and prospects

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2018-01-01

    Full Text Available In the conditions of instability of the world economy and the introduction of sanctions against Russia by a number of countries, the problem of ensuring national economic security has become particularly relevant. This topic also has a high scientific, practical and social significance, as it allows to identify possible gaps in the economic security of modern Russia and timely develop mechanisms to eliminate them to protect the national interests of the state. The purpose of this article is to determine the state and prospects of improving the economic security of modern Russia. This can be achieved by solving the following tasks: review of existing methods to evaluate the economic security of country, conduct a SWOT analysis of economic security of modern Russia, the development of suggestions for its improvement. This research analyzes various aspects of the economic security of modern Russia. As a result, the author developed an integrated method to ensuring the economic security of the country, as well as a matrix of economic security within this method. The way of increase of economic security of modern Russia is offered. Thus, to overcome the threats for the economic security of modern Russia, it is necessary to implement the recommendations developed by the authors, including the establishment of their own production and the construction of an innovatively oriented model of the economy. This will ensure the economic security of modern Russia and its stable development in the future.

  20. Associations between Food Security Status and Dietary Inflammatory Potential within Lower-Income Adults from the United States National Health and Nutrition Examination Survey, Cycles 2007 to 2014.

    Science.gov (United States)

    Bergmans, Rachel S; Palta, Mari; Robert, Stephanie A; Berger, Lawrence M; Ehrenthal, Deborah B; Malecki, Kristen M

    2018-06-01

    Evidence suggests both that chronic inflammation mediates the association of food insecurity with adverse health outcomes and that diet may be a significant source of inflammation among food insecure individuals. To examine whether food security status is associated with dietary inflammatory potential. Cross-sectional data came from the National Health and Nutrition Examination Survey (NHANES), cycles 2007 to 2014 (n=10,630). The analysis sample is representative of noninstitutionalized US adults with an income-to-poverty ratio ≤3.00. Dietary Inflammatory Index (DII) score, calculated using the average of two 24-hour dietary recalls, was the main outcome measure. Type III F tests or χ 2 tests compared population characteristics by food security status, defined using the US Food Security Survey Module. Multivariable linear regression was used to estimate the association between food security status and the DII score and moderation by demographic factors. Survey weighting procedures accounted for the effects of stratification and clustering used in the NHANES study design. When accounting for socioeconomic status, demographic factors, and health status, DII score was higher at greater levels of food insecurity (P=0.0033). Those with very low food security had a 0.31 (95% CI=0.12 to 0.49) higher DII score than those with high food security. Age moderated the association between food security status and DII score (interaction P=0.0103), where the magnitude of the association between DII score and severity of food insecurity was higher for those >65 years than for younger age groups. Food security status may be associated with dietary inflammatory potential, which is hypothesized to play a role in multiple chronic health conditions. Further research is needed to determine the causal nature of this relationship and evaluate how best to implement programs designed to address health disparities within food insecure populations. Copyright © 2018 Academy of Nutrition and

  1. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership status of any of...

  2. NATIONAL PREPAREDNESS: Integration of Federal, State, Local, and Private Sector Efforts Is Critical to an Effective National Strategy for Homeland Security

    National Research Council Canada - National Science Library

    2002-01-01

    .... Federal, state, and local governments have a shared responsibility in preparing for catastrophic terrorist attacks, but the initial responsibility falls upon local governments and their organizations...

  3. Alternate Energy for National Security.

    Science.gov (United States)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  4. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    recreation, national defense, and tourism . To understand the maritime homeland security efforts put into place after 9/11 better, a study of the practices...fire service venturing beyond its fire suppression or emergency medical services role and asserted the value of having firefighters better integrated...national defense, and tourism , so too must be the approach to maritime homeland security. This research examined only the role of state and local law

  5. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  6. The Internal Aspects of Ukrainian National Security

    National Research Council Canada - National Science Library

    Bazhenov, Igor

    1997-01-01

    .... Poor economic conditions, organized crime, high levels of corruption within the government, and an irresponsible parliament are the primary causes of instability in Ukraine. Resolution of these issues is vital to Ukrainian National Security as well as the continuation of Ukrainian independence.

  7. Impact of the national special programme for food security on ...

    African Journals Online (AJOL)

    Impact of the national special programme for food security on poverty alleviation among women in Oyo State, Nigeria. ... In addition, majority (60.2%) of the participants were literate and participated more in cassava and maize production, while insufficient loan ranked first among the problems encountered by the ...

  8. Quantum Secure Direct Communication Using W State

    International Nuclear Information System (INIS)

    Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng

    2008-01-01

    A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure

  9. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-07-26

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. [[Page 45256... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Tuesday, August 20... related to national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The...

  10. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-01-25

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will be open to the... implementing national security and emergency preparedness telecommunications policy. Notice of this meeting is...

  11. SECURITY IN SUSTAINABLE DEVELOPMENT: COMPARING UNITED NATIONS 2030 AGENDA FOR SUSTAINABLE DEVELOPMENT WITH MILLENNIUM DECLARATION

    Directory of Open Access Journals (Sweden)

    Ahmet BARBAK

    2017-06-01

    Full Text Available This study aims to compare United Nations 2030 Agenda for Sustainable Development with Millennium Declaration in terms of their security conceptualizations to explore changes in security thinking and policy components (goals, targets, principles, priorities etc. over time. In doing so, it is envisaged that United Nations’ expectations from member states regarding their national security policies and organizations could be revealed. Security thinking has changed since late 1980’s with the introduction of sustainable development approach by the United Nations. This shift in security thinking encompasses human security and security-development nexus. Holding all member states responsible, Millennium Declaration and 2030 Agenda for Sustainable Development constitute the primary and the most recent outcome documents of United Nations’ sustainable development policy. Both documents have security components. This enables extracting security elements and comparing them with an analytical manner. Consequently, findings are compared and discussed in terms of public policy and organization at national level.

  12. The Intersection of National Security and Climate Change

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fankhauser, Jana G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kurzrok, Andrew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sandusky, Jessica A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  13. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice of...

  14. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  15. MEMS and MOEMS for national security applications

    Science.gov (United States)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  16. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  17. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  18. Scientific Openness and National Security at the National Laboratories

    Science.gov (United States)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  19. Horizons of security, state and extended family

    DEFF Research Database (Denmark)

    Zoppi, Marco

    ” and nationalism in their social security arrangements. In this manner, this study intends to account for historical patterns of integration from the specific point of view of welfare and security. In order to pursue this aim, I have conducted qualitative interviews with Somalis living in Scandinavia about themes...

  20. 40 CFR 1042.635 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption for...

  1. 40 CFR 85.1708 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  2. Wildlife on the Nevada National Security Site

    Science.gov (United States)

    Longshore, Kathleen M.; Wessells, Stephen M.

    2017-09-05

    Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.

  3. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Science.gov (United States)

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or foreign...

  4. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  5. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  6. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  7. Theoreticalaspects ofinformation war and national security

    OpenAIRE

    A. V. Shumka; P. H. Chernyk

    2015-01-01

    A wide and comprehensive analysis of methods of conducting information war to create an effective mechanism of counteraction has extremely important significance. Information warfare ­ acts committed to achieve information superiority in support of national military strategy due to the impact of information and information systems enemy while ensuring the security of its own information and information systems. Today the term «information war» is used in two areas: in the broadest sense ­ ...

  8. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  9. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  10. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  11. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  12. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  13. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2012-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  14. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2013-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: DOE hazardous and non-hazardous non-radioactive classified waste; DOE low-level radioactive waste (LLW); DOE mixed low-level waste (MLLW); and, U.S. Department of Defense (DOD) classified waste. The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  15. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-12-29

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1005] National Maritime Security Advisory...

  16. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-07-02

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0586] National Maritime Security Advisory...

  17. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  18. The association between state attachment security and state Mindfulness.

    Directory of Open Access Journals (Sweden)

    Christopher A Pepping

    Full Text Available Recent research suggests that attachment and mindfulness are related, though the nature of this association is unclear. Here we present two studies examining whether there is a causal relationship between state attachment and state mindfulness. Study 1 investigated the effects of experimentally increasing state mindfulness on state attachment security. State mindfulness was successfully enhanced, but this led to no change in state attachment security. Study 2 investigated the effects of experimentally enhancing state attachment security on state mindfulness. State attachment security was successfully enhanced, but this did not lead to any change in state mindfulness. These findings suggest that there is not a direct, immediate causal relationship between state attachment and state mindfulness as a result of brief experimental manipulations. Future research should examine these associations in longer term interventions.

  19. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  20. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  1. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  2. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  3. National Security and the Right to Information in Europe

    DEFF Research Database (Denmark)

    Jacobsen, Amanda Lynn

    2013-01-01

    Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/......Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/...

  4. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-12-19

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... Security Telecommunications Advisory Committee (NSTAC) will meet on Friday, January 11, 2013, via... related to national security and emergency preparedness telecommunications policy. Agenda: The NSTAC...

  5. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...

  6. CNSS: Interagency Partnering to Protect Our National Security Systems

    National Research Council Canada - National Science Library

    Grimes, John G

    2008-01-01

    .... The CNSS performs the vital function of mobilizing the full, interagency National Security Community for the protection of telecommunications and information systems that support U.S. national security...

  7. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  8. National aspects of food security of Russia

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2017-01-01

    Full Text Available Instability of a foreign policy situation and deepening of financial crisis actualize need of monitoring of food security’s condition as objective condition of economic sovereignty of Russia. Modern approaches to definition of food security of the state are considered in article. Critical evaluation of separate provisions of the Doctrine of food security of the Russian Federation is given. The analysis of a condition of food security of Russia in the directions of independence, economic and physical availability of the food is carried out on the basis of statistical data. Food security in Russia was reflected in the political decisions that defined the new economic policy of the state in the foreign market. modern import substitution program has shown its effectiveness, which is based on the absence of alternative paths of development. An important condition is the slow pace of development of the internal economy of Russia in conditions when domestic markets competition is virtually nonexistent. Food is a priority in the development of society, ensuring political and social balance, therefore, organizational solutions discussed in this material has a transdisciplinary character. The author’s conclusions can be useful to researchers who are trying to decide how macroeconomic objectives, and conducting research for innovative solutions in many sectors of the economy.

  9. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...-2011-0268] RIN 3150-AJ07 Facility Security Clearance and Safeguarding of National Security Information..., Classified National Security Information. The rule would allow licensees flexibility in determining the means... licensee security education and training programs and enhances the protection of classified information...

  10. IAEA Completes Nuclear Security Review Mission in United States

    International Nuclear Information System (INIS)

    2013-01-01

    Full text: A team of nuclear security experts led by the International Atomic Energy Agency (IAEA) today completed a mission to review nuclear security practices of civil nuclear facilities licensed by the United States Nuclear Regulatory Commission (NRC). Conducted at the U.S. Government's request, the two-week International Physical Protection Advisory Service (IPPAS) mission reviewed the United States' nuclear security-related legislative and regulatory framework. As part of this work, the IPPAS team, led by John O'Dacre of Canada and comprising nine experts from eight IAEA Member States, met with NRC officials and reviewed the physical protection systems at the Center for Neutron Research (NCNR) at the National Institute of Standards and Technology. The IPPAS team concluded that nuclear security within the U.S. civil nuclear sector is robust and sustainable and has been significantly enhanced in recent years. The team identified a number of good practices in the nation's nuclear security regime and at the NCNR. The IPPAS team also made a recommendation and some suggestions for the continuing improvement of nuclear security overall. The mission in the United States was the 60th IPPAS mission organized by the IAEA. 'Independent international peer reviews such as IAEA IPPAS missions are increasingly being recognized for their value as a key component for exchanges of views and advice on nuclear security measures', said Khammar Mrabit, Director of the IAEA Office of Nuclear Security. 'The good practices identified during this mission will contribute to the continuous improvements of nuclear security in other Member States'. The IPPAS team provided a draft report to the NRC and will submit a final report soon. Because it contains security-related information about a specific nuclear site, IPPAS reports are not made public. 'The IPPAS programme gives us a chance to learn from the experience and perspective of our international partners', said NRC Chairman Allison M

  11. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-11-19

    ... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... Executive Order 13526, Classified National Security Information. In addition, this direct final rule allowed... licensees (or their designees) to conduct classified [[Page 69287

  12. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  13. 48 CFR 6.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...

  14. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  15. 39 CFR 267.5 - National Security Information.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as the...

  16. 28 CFR 501.2 - National security cases.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is a...

  17. 40 CFR 90.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  18. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  19. 40 CFR 91.1008 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  20. 3 CFR 101.4 - National Security Council.

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI. ...

  1. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  2. 10 CFR 871.1 - National security exemption.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security...

  3. 40 CFR 211.110-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency...

  4. 40 CFR 94.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary. (2...

  5. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  6. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  7. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  8. 36 CFR 1256.46 - National security-classified information.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National Security...

  9. 40 CFR 204.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  10. 40 CFR 89.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  11. The role of national security culture in crisis management : the case of Kardak crisis

    OpenAIRE

    Savaş, Özlem

    2008-01-01

    Ankara : The Department of International Relations, Bilkent University, 2008. Thesis (Master's) -- Bilkent University, 2008. Includes bibliographical references leaves 94-103. This thesis analyzes the role of national security culture in crisis management. The use and significance of national security culture in the management of a crisis is the main concern discussed throughout this study. It is assumed that national security culture serves as the main guideline of states d...

  12. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  13. Data security on the national fusion grid

    International Nuclear Information System (INIS)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  14. Data security on the national fusion grid

    Energy Technology Data Exchange (ETDEWEB)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  15. State of security in Elasticsearch

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Security is an often understated problem in high growth emerging branches of IT like big data and IoT. Elasticsearch is a great example because support for security not only came late, but it's a quite convoluted, non-open, and very expensive solution. Learn how Simone Scarduzio lead his Open Source project ReadonlyREST to become the solution of choice for many. From hackathon hustlers to Fortune500 corporates. ReadonlyREST is simple yet powerful because it leverages the concept of access control list (yes, like firewalls). We'll go through some creative use cases and business concepts made possible by the creative use of ReadonlyREST and its configuration model. About the speaker Simone Scarduzio has a 8 years background in software engineering, spanning from mobile messaging clusters to Cloud-first startups. He wrote the first book about Vert.x, a JVM micro services framework. Recently, he helped Thomson Reuters re-architect legacy back ends into secure, polyglot, resilient distributed systems. Today, ...

  16. Arms control, nonproliferation, and US national security

    International Nuclear Information System (INIS)

    Pilat, J.F.

    1985-01-01

    The continuation of the arms race and the failure of arms control and disarmament negotiations lend support to the belief that US and Soviet power, prestige, and security depend upon nuclear weapons. Therefore, the argument goes, the non-nuclear-weapon states (particularly those that are not allied with nuclear-weapon states and do not share their nuclear shield) may conclude that they would be well served by possession of these weapons. In this sense, the failure of nuclear arms reductions could create incentives for further proliferation

  17. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    Japanese penchant for situational ethics allowed a sharp psychological about-face following the war, enabling them to accept the American policies. Power...Reagan/Bush Administrations have exaggerated the nation’s defense needs and that selfish interests are overriding objectivity and common sense in the ...security.195 They view the United States as having benign political motives and having the largest domestic market needed to develop regional

  18. US National Security Strategy and preemption

    International Nuclear Information System (INIS)

    Kristensen, H.M.

    2006-01-01

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  19. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  20. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  1. Overview of Scientific Freedom and National Security

    Science.gov (United States)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  2. Providing Criminological Security of Minors at the National Level

    Directory of Open Access Journals (Sweden)

    Andrei I. Savelev

    2017-08-01

    Full Text Available The article discusses issues related to the provision of criminological security of minors at the national level. The Author analyzes the normative legal basis and main directions of activity of subjects of prevention of the violation of child rights in the Russian Federation. The Author believes that the current system of legal guarantees of criminological security of minors not fully meet modern requirements of protection of rights, freedoms and legitimate interests of adolescents. In particular, the legislation of the Russian Federation is largely focused on protecting the interests of disadvantaged segments of the population, including minors, being in socially dangerous position. It is proposed to improve the existing legislation through the adoption of a new federal law “The bases of the system of prevention of offences and security of minors”, which will be an important step towards building a legal state.

  3. 29 CFR 1606.3 - The national security exception.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the national...

  4. Heavy Lift for National Security: The Ares V

    Science.gov (United States)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  5. Extreme Scale Computing to Secure the Nation

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the

  6. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  7. Transcending the nation state

    DEFF Research Database (Denmark)

    Cort, Pia

    2009-01-01

    competition. This article surveys vocational education and training models in Europe, applying a discursive institutionalist perspective in order to describe how vocational education and training as an institution is being reframed by means of the Copenhagen Process, and concludes that a European model......Throughout Europe, vocational education and training is undergoing reform and modernisation as part of a common EU policy process, the Copenhagen Process. The aim of this Process is initiate a pan-European modernisation of vocational education and training in order to meet the challenges of global...... is under construction which aims to transcend the nation state by introducing a new way of "thinking" vocational education and training....

  8. On the Perception of National Security Issues at Regional Level

    Directory of Open Access Journals (Sweden)

    Ponedelkov Aleksandr Vasilyevich

    2015-12-01

    Full Text Available The article explores the issue on the perception of the concept “national security” areas, models and methods of its maintenance by the population. The author uses materials of the sociological survey conducted by the Laboratory of problems of increasing the efficiency of state and municipal management of the South-Russian Institute of Management – branch of the Russian Presidential Academy of National Economy and Public Administration. The survey was carried out with the participation of leading experts in various aspects of national security, representing 27 Russian higher educational institutions and research centers in Moscow, Astrakhan, Barnaul, Belgorod, Dushanbe, Krasnodar, Nizhny Novgorod, Omsk, Pyatigorsk, Rostov-on-Don, Saint Petersburg, Syktyvkar, Sochi, Ufa. It is noted that as a priority political governance model that implements the basic concept of national security, respondents identified a democratic model. Most respondents believe that a unified security model in the Russian regions is ineffective, and such model should be developed taking into account the specificity of each subject. The study showed that the public’s attention to the issue of national security is not sustainable, as determined by situational factors. It is proved that the motives of anxiety formed in the Russian public mind are not sustainable, and situational. Respondents see the economic cooperation more effective incentive to maintain national interests than by force. Estimation of the population of the priority issues of security shows that most respondents appreciate the organization of work to ensure the safety and anti-terrorism security in the sphere of national relations. The findings give grounds to assert that the focus of public attention to the problem of national security does not yet occupy the leading positions. To a greater extent, respondents focused on the issues of public safety, reducing threats and risks in their daily lives

  9. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...

  10. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    ethnicity in favour of social stability as a pre-requisite for security. ... Humanities, National Identity, Ethnicity, Security and Political. Stability. .... instability. They are often used in open violence during elections where contending political ...

  11. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  12. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  13. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  14. Is further proliferation of nuclear weapons irrelevant to US national security

    International Nuclear Information System (INIS)

    Pendley, R.E.

    1985-01-01

    For almost four decades, the United States has insisted that any increase in the number of states possessing nuclear weapons should be discouraged, claiming that nuclear proliferation would undermine international security and stability, and threaten the national security interests of the United States. This view was clearly emphasized by the Reagan administration when the President stated in 1981 that the basis of US nonproliferation policy was to ''establish the prevention of the spread of nuclear weapons as a fundamental national security and foreign policy objective.'' However, actual implementation of this policy, seeking to obviate moves toward increased regional nuclear capabilities, will call for a variety of bilateral security dealings with so-called problem countries in regions important to the United States, relationships that US governments have been largely chary of so far. It will also require discrimination and forcefulness in identifying the security interests of the United States in these key regions, and crafting specific foreign policies to further those interests

  15. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  16. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  17. Security vs. Nations: a lost battle?

    CERN Multimedia

    Computer Security Team

    2013-01-01

    “Know the enemy” is one of the basic recommendations of the ancient Chinese military strategist Sun Tzu (544–496 BC). In the cyber-world, the usual suspects are not only script kiddies, criminals and hacktivists, but also nation states.   Companies worldwide have prepared their defences to fight off the first three. Likewise, CERN, despite its wish for academic freedom, is constantly considering how best to prevent successful attacks. But when nation states are the antagonists, defence is impossible (unless you have plenty of money). Today, the most popular computing services in the western hemisphere are run from the US. We already know that the US and the UK are tapping into Facebook, Google, Yahoo and others (see our Bulletin article on “Prison or “Prism”? Your data in custody”). But what about one level down? Nowadays, IT hardware (routers, laptops, smartphones, etc.) is built in China. How can we be sure that these ...

  18. National Reachback Systems for Nuclear Security: State-of-play report: ERNCIP Thematic Group Radiological and Nuclear Threats to Critical Infrastructure: Deliverable of task 3.1b

    OpenAIRE

    TOIVONEN H.; HUBERT Schoech; REPPENHAGEN GRIM P.; PIBIDA Leticia; JAMES Mark; ZHANG Weihua; PERÄJÄRVI K.

    2015-01-01

    Operational systems for nuclear security in Finland, France, Denmark, UK, US and Canada were reviewed. The Finnish case is a holistic approach to Nuclear Security Detection Architecture, as defined by the International Atomic Energy Agency; reachback is only one component of the system, albeit an important crosscutting element of the detection architecture. The French and US studies concentrate on the reachback itself. The Danish nuclear security system is information-driven, relying on th...

  19. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  20. Narcocultura: A Threat to Mexican National Security?

    Science.gov (United States)

    2012-12-01

    Postcolony: The Zapatistas and Narcocultura,” PhD Essay , University of British Colombia: Department of Political Science, 2011, 18. 7 Rafael López...humorous lyrics or tones in some narcocorridos29 Edberg concludes by stating, “cultural images cross...provided inspiration for the lyrics of classical corridos.63 These original corridos became a source of Mexican national identity and a vehicle for

  1. National Security Strategy: A Flawed Guide to the Future, Political Science

    National Research Council Canada - National Science Library

    Leahy, Michael

    2003-01-01

    The Goldwater-Nichols Defense Department Reorganization Act of 1986 requires the executive branch to periodically provide written documentation of the United States National Security Strategy (NSS). The George W...

  2. Striking First: Preemptive and Preventive Attack in U.S. National Security Policy

    National Research Council Canada - National Science Library

    Mueller, Karl P; Castillo, Jasen J; Morgan, Forrest E; Pegahi, Negeen; Rosen, Brian

    2006-01-01

    .... U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by violent nonstate actors and by states from which they might acquire nuclear, biological, or chemical...

  3. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    Murray, D.W.

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. The results of these tests as well as a description of the test equipment, test sites, and procedures are presented in this report

  4. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  5. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  6. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  7. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  8. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  9. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  10. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices

  11. Economics and National Security: The Case of China

    National Research Council Canada - National Science Library

    Hughes, Edward

    2001-01-01

    The purpose of the conference was to explore the national security dimensions of the U.S. - China economic relationship and identify possible roles for the economic element of national power in formulating policy options...

  12. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  13. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  14. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  15. Nuclear power and national energy security

    International Nuclear Information System (INIS)

    Addae, A.K.

    2001-01-01

    The demand for energy in Ghana is expected to grow rapidly in the next couple of decades if the objectives of the Vision 2020 Programme are to become a reality. In particular, the demand for electric power is expected to increase 3 to 5 fold over 1997 levels by the year 2020.This calls for early planning. Adequate and dependable central station electric power supplies in the next couple of decades is therefore very critical to sustainable development and the achievement of the objective of the Vision 2020 Programme. Curtailment in electric power supplies cause disruption in economic activities and consequent economic losses. The recent cases in point are the 1983/84 and 1997/1998 power curtailments in Ghana due to low water levels in the Akosombo Reservoir. These led not only to substantial disruptions in economic activities but also to the erosion of invest confidence in the economy. It is, therefore, very essential that the country's central station electric power supply system should not continue to depend on hydro-electric power as in the past years but should be based on a mix of energy sources to provide an acceptable level of national energy security under all circumstances

  16. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  17. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the arti...

  18. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  19. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  20. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  1. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  2. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  3. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  4. National security through the preservation and development of cultural sphere

    Directory of Open Access Journals (Sweden)

    Malakshinova N.Sh.

    2016-10-01

    Full Text Available matters of national security in the context of the inextricable interrelationship and interdependence of national security and socio-economic development are presented in the article. The particular attention is paid to the legislative consolidation of security categories, the system of national security elements, and changes in the domestic legislation updates. Therefore, safety, a list of national interests, highlighted by long-term perspective, and questions about the means of implementation of strategic national priorities, including the named culture as a sphere of life are very important. Sphere of culture as a national priority and an important factor in the quality of life growth and harmonization of public relations, collateral dynamic socio-economic development and the preservation of a common cultural space and sovereignty of Russia are studied more detailed.

  5. A deeper look at climate change and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  6. Citizen, State and Nation

    OpenAIRE

    Storey, David

    2006-01-01

    This session considered the changing nature of citizenship in a global world by exploring relationships between individuals and the wider society at local, national and global scales, touching on issues of identity, belonging, empathy and responsibility.

  7. 12 CFR 9.14 - Deposit of securities with state authorities.

    Science.gov (United States)

    2010-01-01

    ... than assets (e.g., a requirement to deposit a fixed amount or an amount equal to a percentage of... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Deposit of securities with state authorities. 9... ACTIVITIES OF NATIONAL BANKS Regulations § 9.14 Deposit of securities with state authorities. (a) In general...

  8. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  9. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and registered national securities associations of changes in the membership status of any of their members...

  10. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  11. Political State Boundary (National)

    Data.gov (United States)

    Department of Transportation — State boundaries with political limit - boundaries extending into the ocean (NTAD). The TIGER/Line Files are shapefiles and related database files (.dbf) that are an...

  12. American Nations, Latin States

    Directory of Open Access Journals (Sweden)

    Jorge Nelson Ahumada

    2016-02-01

    Full Text Available The nation, as artifact of modernity, assumes particularities in America such as the colonization and genocide of original peoples which still weighs as a never ending comeback. Nevertheless, capital, with its overwhelming force, destroyed peoples, cultures, traditions and landscapes. Latin America faces the challenge of uniting beyond the necessities of capital, and beyond two languages, spanish and portuguese. All of which has full validity at present with the blocks UNASUR and ALBA. Ethnocentricity is postulated as the exclusive condition of all possible humanity and, as programme, racism without races; Latin American miscegenation, as the potential for unity and the strength of emancipation as a project. Our intellectuals, who constructed a unique and superlative literature, are the lighthouses in the development of a nationalism without races. Anthropology in debate with psychoanalysis can become a compass in rethinking our America.

  13. Extreme nationalism and the security of contemporary society

    Directory of Open Access Journals (Sweden)

    Mijalković Saša

    2012-01-01

    Full Text Available Ethnic groups are characterized by certain collective identity whose foundations are made of language, religion, race, and country of origin with its culture and customs. Since ethnic identities differ one from another, in multinational and multicultural societies there is a latent danger of having ideologies that advocate ethnic distancing, imposing a danger to the security of other ethnicities, the change of constitutional order, as well as separation of certain parts of sovereign states with the aim of creating new countries or accession to some other ones. Besides the fact that these phenomena cause collective discrimination and severe violation of human rights, they are also, very often, accompanied by individual and collective violence - terrorism, (civil wars, genocide, war crimes and other forms of inter-ethnic violence. Alongside with the extreme intolerance, these ideologies also propagate particularization of a society by ethnic, religious and race criteria. Given the fact that their base is made of glorification of their own national identity and negation of other ones, it is reasonably justified for them to carry an epithet of extreme-nationalist. Regarding the mentioned, this paper gives a perspective on definition and typology of nationalism, its consequences for the security of contemporary society, as well as on contemporary social reaction to it.

  14. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  15. Language Can: Ensuring National Security through Effective Use of ...

    African Journals Online (AJOL)

    First Lady

    2012-10-27

    Oct 27, 2012 ... Indexed African Journals Online: www.ajol.info. An International ... Key words: Language, Language Can, Security, National Security, and. Language Use .... message and transmit it to a second party, who then decodes it in order to. Vol. ..... would be seen as a game rather than ―a do or die affair‖. It is the ...

  16. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  17. The Curious National Security Pendulum: Openness and/or Censorship.

    Science.gov (United States)

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  18. THE NATIONAL SECURITY - MEDIA POWER LINKAGE. A THEORETICAL FRAMEWORK

    Directory of Open Access Journals (Sweden)

    KARIN MEGHEŞAN

    2013-05-01

    Full Text Available The mechanism of national security policy is an issue of increasing interests in post cold war era. But what is the impact of the media upon national security policy decision making? New world wide events show us that more than ever national policy is often at the mercy of the media. The Wiki leaks, the Murdoch inquiry, the impact of new social media on Arab democratic movements are just some examples regarding the effect of nearly simultaneous presentation of information around the world. The world is changing, and the processes by which national policy is developed may also be changing especially in the security domain. The essence of this study, as the title suggests is the idea of a „dual use” media in the national security issues. This study employs a relatively narrow definition of national security issues as only those which are concerned with national survival and preservation of our society. The media affects us as individuals and as a collective body so we will like to focus on a realistic understanding of the media-secrecy-security linkage, noting that we will do nothing else but advance and underline the main points of view from the public and scientific discourse.

  19. The Air Warrior's Value of National Security Space

    National Research Council Canada - National Science Library

    Loftis, J

    2003-01-01

    .... With more focused high-level attention on national security space decisions a measure that captures and quantities the value of space capabilities to combat operations professionals is desired...

  20. Organizational resilience in national security bureaucracies: Realistic and practicable?

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2017-01-01

    Resilience is increasingly highlighted as a necessary organizational property in national security bureaucracies. This article explores the resulting management dilemmas via interviews with Danish executives, who attempt to balance resilience, fiscal austerity and democratic accountability...

  1. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  2. Organized Crime and National Security: The Albanian Case

    National Research Council Canada - National Science Library

    Gjoni, Ilir

    2004-01-01

    .... This thesis proceeds from the premise that organized en me constitutes a threat to democracy, in particular a serious threat to new democracies and subsequently to the national security of the country...

  3. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-10-26

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the conference... President regarding their review of the Department of Homeland Security's (DHS) National Cybersecurity and...

  4. Globalization Crisis and National Security: A Reflection on Nigeria ...

    African Journals Online (AJOL)

    Globalization Crisis and National Security: A Reflection on Nigeria Textile Industry. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... Thus, while globalization has several palpable positive effects on the countrys industrial growth, it also ...

  5. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  6. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  7. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  8. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  9. Weak and Failing States: Evolving Security Threats and U.S. Policy

    National Research Council Canada - National Science Library

    Wyler, Liana S

    2008-01-01

    .... national security goal since the end of the Cold War. Numerous U.S. government documents point to several threats emanating from states that are variously described as weak, fragile, vulnerable, failing, precarious, failed, in crisis, or collapsed...

  10. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available in a real world system. The data examined will then be applied to a case study that will show the results of applying available open source security information against the model to relate to the current South African cyber landscape....

  11. Digital Dimension Disruption: A National Security Enterprise Response

    Science.gov (United States)

    2017-12-21

    PRISM 7, NO. 2 FEATURES | 41 Digital Dimension Disruption A National Security Enterprise Response By Charles Rybeck, Lanny Cornwell, and Philip Sagan...1 The slow-motion collapse of parts of the 20th century’s legacy is now accelerating in ways that likely will usher in a monumental realignment of...societal institutions, methods of business, and fundamental ideas about national security. This realignment will , of necessity, change the frameworks

  12. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  13. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    Science.gov (United States)

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  14. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... upon physical inspection thereof and upon examination of the books of the custodian. The physical... a member of a national securities exchange of any obligation under existing law or under the rules...

  15. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  16. Venezuela’s Potential Threat to the United StatesNational Security: An Analysis of the Conflictual Inter-Country Relationship

    Science.gov (United States)

    2006-03-07

    this 1982 movement, the two main political parties were Social Christian Party Comité de Organización Política Electoral Independiente (COPEI) and the...www.state.gov/r/pa/ei/bgn/35766.htm; Internet; accessed 17 February 2006. 15 2 U.S. Department of State, Post Report 2003, Venezuela (Washington...news.bbc.co.uk/ 1/hi/world/americas/country_profiles/1229345.stm; Internet; accessed 11 January 2006. 5 U.S. Department of State, Post Report 2003, Venezuela

  17. National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments

    National Research Council Canada - National Science Library

    Doyle, Charles

    2006-01-01

    .... These National Security Letters (NSLs) seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies...

  18. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  19. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  20. National security and the accelerating risk of climate change

    Directory of Open Access Journals (Sweden)

    Lee Gunn

    2017-06-01

    Full Text Available Since 2006, retired U.S. admirals and generals have been examining our changing physical world and assessing the impact of those changes on the security of the nation. A Military Advisory Board (MAB, convened by the CNA Corporation, a non-profit research and analysis institution that operates the Center for Naval Analyses and Institute for Public Research has issued two reports on the changing climate’s national security implications. The first report, published in 2007, stated that the changing climate would be destabilizing in many parts of the world. Climate change, in fact, would be a “threat multiplier”, the report claimed, and result in new and more urgent calls for the American military to provide humanitarian assistance and disaster relief (HADR as well as help sustain order and ensure conditions that would permit trade and prosperity worldwide. The MAB recommended urgent action by the Defense Department to prepare for new missions in new places; and that the Defense Department explicitly recognize missions stemming from the changing climate. CNA’s MAB then published three reports on energy, relating to climate change, one each on: the coming age of renewables, the nation’s energy dependence, and the future of energy in terms of America’s international competitiveness (CNA-MAB, 2009; CNA-MAB, 2010; CNA-MAB, 2011. In 2014, the Military Advisory Board noted that the climate was changing more quickly than had been forecast in 2007. Undertaking a new climate study, the board concluded that more needed to be done, and done quickly, to prepare for and confront the “catalyst for conflict” that the board now saw in climate change. Guest Editors’ Note: The following commentary derives from a presentation by Vice Admiral Lee Gunn, U.S. Navy (Ret., delivered by invitation at the American Association for the Advancement of Science Meeting, San Jose, California, February 13, 2015. Prior to his advisory role for the U.S. Military and

  1. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Science.gov (United States)

    2010-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  2. EU coordination of national social security in multiple cross border situations

    NARCIS (Netherlands)

    Cremers, J.

    2011-01-01

    The coordination of the national social security is one of the crucial fields of cooperation between EU Member States. The coordination is based on the principle of application of one legislation at a time in cases of employment being executed in one or more than one Member State. Persons moving

  3. Oil Politics and National Security in Nigeria

    Science.gov (United States)

    2010-12-01

    Oil Transparency in the Niger Delta: Improving Public Sector Oil Derived Resource Flows and Utilization in Abia State, Nigeria,” Economies of...against the nine states officially recognized i.e. they exclude Ondo, Abia , and Imo states from being part of the Delta region (figure 1). 125 BBC...Peterside Sofiri Dr, “Oil Transparency in the Niger Delta: Improving Public Sector Oil Derived Resource Flows and Utilization in Abia State, Nigeria

  4. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  5. Materials @ LANL: Solutions for National Security Challenges

    Science.gov (United States)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  6. Security in cyberspace targeting nations, infrastructures, individuals

    CERN Document Server

    Giacomello, Giampiero

    2014-01-01

    Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as ""cybersecurity."" Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This colle

  7. Demographics and the Changing National Security Environment

    National Research Council Canada - National Science Library

    2000-01-01

    .... Long- term fertility trends, urbanization, migration, and changes in the ethnic composition and age profile of populations can influence the likelihood and nature of conflict among and within nations...

  8. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-03-31

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will hold its annual meeting on May 6, 2010. The meeting will be open... preparedness telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee...

  9. Boko haram insurgency and national security in Nigeria | Okoroafor ...

    African Journals Online (AJOL)

    There are insinuations and charges that the insidious Boko Haram terrorist organization was created by the northern political opposition with strong support from the Islamic Middle East terrorist elements to destabilize the government, national security and peace of the nation, Nigeria. The truth remains that this deadly group ...

  10. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  11. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    Energy Technology Data Exchange (ETDEWEB)

    Poling, Jeanne; Arnold, Pat [National Security Technologies, LLC (NSTec), P.O. Box 98521, Las Vegas, NV 89193-8521 (United States); Saad, Max [Sandia National Laboratories, P.O. Box 5800, Albuquerque, NM 87185 (United States); DiSanza, Frank [E. Frank DiSanza Consulting, 2250 Alanhurst Drive, Henderson, NV 89052 (United States); Cabble, Kevin [U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States)

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  12. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    International Nuclear Information System (INIS)

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-01-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  13. A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security

    Science.gov (United States)

    2017-12-21

    machine is being bridged by wearables, augmented reality (AR), and artificial intelligence (AI). In this near-future the uncanny valley no longer...and security represent key pol- icy, security, and business tradeoffs, connectivity and national cybersecurity are similarly dialectical choices. On...Consumer Electronics Show (CES), is at once the digital sycophant’s dream and the cybersecurity hermit’s nightmare, as each connected gewgaw and

  14. United States National Seismographic Network

    International Nuclear Information System (INIS)

    Buland, R.

    1993-09-01

    The concept of a United States National Seismograph Network (USNSN) dates back nearly 30 years. The idea was revived several times over the decades. but never funded. For, example, a national network was proposed and discussed at great length in the so called Bolt Report (U. S. Earthquake Observatories: Recommendations for a New National Network, National Academy Press, Washington, D.C., 1980, 122 pp). From the beginning, a national network was viewed as augmenting and complementing the relatively dense, predominantly short-period vertical coverage of selected areas provided by the Regional Seismograph Networks (RSN's) with a sparse, well-distributed network of three-component, observatory quality, permanent stations. The opportunity finally to begin developing a national network arose in 1986 with discussions between the US Geological Survey (USGS) and the Nuclear Regulatory Commission (NRC). Under the agreement signed in 1987, the NRC has provided $5 M in new funding for capital equipment (over the period 1987-1992) and the USGS has provided personnel and facilities to develop. deploy, and operate the network. Because the NRC funding was earmarked for the eastern United States, new USNSN station deployments are mostly east of 105 degree W longitude while the network in the western United States is mostly made up of cooperating stations (stations meeting USNSN design goals, but deployed and operated by other institutions which provide a logical extension to the USNSN)

  15. UNIFIL Peacekeeping and Lebanese National Security

    Science.gov (United States)

    2012-03-22

    together with the Lebanese Armed Forces.”43 Nicholas de Riviere, Chief of the International Organizations Department at the French Foreign Ministry...Hezbollah War, (Center for Strategic and International Studies, Washington, D.C., 2007), 7. 37 lbid., 24. 38 Stephen Biddle ,Jeffrey Friedman, The...William Mooney, “Stabilizing Lebanon: peace or nation-building,” Parameters, (USAWC, Autumn 2007): 28. 40 Biddle and Friedman, The 2006 Lebanon

  16. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  17. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  18. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  19. Border Protection and National Security of Mongolia

    Science.gov (United States)

    2006-09-01

    simple acts, such as a cartographer labeling an island “Turkish” instead of “ Greek ,” have triggered the mobilization of armed forces on both sides as...been replaced with marble columns that are guaranteed to last for a century. Parts of the state borders in some directions have been negotiated and

  20. Arctic Ice Melting: National Security Implications

    Science.gov (United States)

    2011-02-01

    be a curse rather than a good, and under no conditions can it either lead into freedom or constitute a proof for its existence. - Hannah ... Arendt 39 How will the domestic or foreign economic policies of the United States be affected by Arctic ice melting? Increased access to the

  1. National security and the comprehensive test ban treaty

    International Nuclear Information System (INIS)

    Landauer, J.K.

    1980-08-01

    For nearly three years now, the US, UK, and USSR have been working on the draft of a treaty that would ban all nuclear explosions (both peaceful applications and weapon tests) and institute verification and monitoring provisions to ensure compliance with the treaty. The status of the draft treaty is summarized. The question, Is a CTBT really in the interest of US national security. is analyzed with arguments used by both proponents and opponents of the CTBT. It is concluded that there are arguments both for and against a CTBT, but, for those whose approach to national security can be expressed as peace through preparedness, the arguments against a CTBT appear persuasive

  2. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  3. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  4. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  5. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    International Nuclear Information System (INIS)

    Bragg-Sitton, S.; Bess, J.; Werner, J.

    2011-01-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  6. Neutron and Gamma Imaging for National Security Applications

    Science.gov (United States)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.

  7. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  8. Rotting from Within: American Education and National Security

    Science.gov (United States)

    2011-03-04

    advantage and place its future prosperity and security at risk. Problems in America‘s Education System (K-12) Why are U.S. student doing poorly? A...nation‘s education problems. Students are fatter, slower, and weaker than their international counterparts in developed nations. Our children have...national, and international issues and events into the classroom on a regular basis.50 Additionally, educators should design programs that give

  9. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION... approval and safeguarding of National Security Information and Restricted Data. The requirements for...

  10. Language Can: Ensuring National Security through Effective Use of ...

    African Journals Online (AJOL)

    This paper is one of such efforts to show that ineffective language use can threaten national security while effective use can enhance it. Language use in interpersonal relationship is like a double- edged sword. It can be used to destroy as well as be used to mend. The present democratic dispensation in Nigeria has been ...

  11. National security and the constitutional right to join military trade ...

    African Journals Online (AJOL)

    The unionisation of the South African Military Forces has tested both lawyers and the South African legal system. However, there is very little academic commentary on this important subject. In this article, the policy, which allowed the unionisation of the South African military, the influence of the policy on national security, ...

  12. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-07-30

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the [[Page... of their review of the Department of Homeland Security's (DHS) National Cybersecurity and... the NSTAC's proposed Joint Collaboration Center that the NSTAC envisioned in its 2009 Cybersecurity...

  13. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  14. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    Science.gov (United States)

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  15. Flexibility and security : National social models in transitional labour markets

    NARCIS (Netherlands)

    Muffels, R.J.A.; Crouch, Colin; Wilthagen, A.C.J.M.

    2014-01-01

    Aggregate and individual data are used to test the association between employment performance and different ways of reconciling flexibility and security in European labour markets. Particular use is made of statistics on individuals’ labour market transitions as revealed by national labour force

  16. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  17. Academics and National-Security Experts Must Work Together

    Science.gov (United States)

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  18. The National Security Language Initiative and the Teaching of Hindi

    Science.gov (United States)

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  19. Economics and National Security: Issues and Implications for U.S. Policy

    Science.gov (United States)

    2011-01-04

    College, K-12, and Early Childhood Education ............................................................. 25 Science, Technology, Engineering, and...to democratize because democracies were more likely than dictatorships to have shared values and to keep the peace; and • Western culture was...ahead of the United States in all three categories.57 College, K-12, and Early Childhood Education58 The 2010 National Security Strategy proposes that

  20. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Science.gov (United States)

    2010-01-01

    ... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4 Criteria...

  1. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...

  2. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Science.gov (United States)

    2010-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice, and...

  3. 78 FR 46622 - Application of Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...

    Science.gov (United States)

    2013-08-01

    ... Exchange, LLC for Registration as a National Securities Exchange; Findings, Opinion, and Order of the... Registration as a National Securities Exchange (``Form 1 Application'') \\1\\ under Section 6 of the Securities... substantive, are consistent with the existing rules of other registered national securities exchanges, or are...

  4. The Exon-Florio National Security Test for Foreign Investment

    National Research Council Canada - National Science Library

    Jackson, James K

    2006-01-01

    .... While the United States actively promotes internationally the policy of relaxing rules concerning foreign investment, including the national treatment of foreign firms, some Members of Congress...

  5. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    Energy Technology Data Exchange (ETDEWEB)

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  6. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  7. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  8. Fragile States, Infectious Disease and Health Security: The Case for Timor-Leste

    Directory of Open Access Journals (Sweden)

    John M. Quinn

    2014-01-01

    Full Text Available Timor-Leste is a very young and developing nation state. Endemic infectious disease and weakened health security coupled with its growing and inclusive public institutions keep Timor-Leste fragile and in transition on the spectrum of state stability. The objective here is to systematically review Timor-Leste's state and public health successes, showing how a fragile state can consistently improve its status on the continuum of stability and improve health security for the population. The case study follows a state case study approach, together with a disease burden review and a basic description of the health portrait in relation to Timor-Leste's fragile state status. Disease burden and health security are directly proportional to state stability and indirectly proportional to state failure. Timor-Leste is a clear example of how public health can feed into increased state stability. Our discussion attempts to describe how the weak and fragile island nation of Timor-Leste can continue on its current path of transition to state stability by increasing health security for its citizens. We surmise that this can be realized when public policy focuses on primary healthcare access, inclusive state institutions, basic hygiene and preventative vaccination programs. Based on our review, the core findings indicate that by increasing health security, a positive feedback loop of state stability follows. The use of Timor-Leste as a case study better describes the connection between public health and health security; and state stability, development and inclusive state institutions that promote health security.

  9. Conflict and cooperation in cyberspace the challenge to national security

    CERN Document Server

    Yannakogeorgos, Panayotis A

    2016-01-01

    Facilitated by the exceptional handiwork of the editors, this book significantly advances the effort to achieve common ground in the debates regarding cyberspace. National security and cyber-related professionals will find it equally useful in their work.-Lt. Gen Bob Elder, USAF (Retired)In this wide-ranging anthology that encompasses expert viewpoints from military, civilian, and private sector contributors, the editors seek to provide a broad framework of issues to be considered. Rather than provide definitive answers (all of the contributors readily admit that none exist), the contributors state that in order to attain the right answers, we must first ask the right questions. Over the course of the book, the authors put forth a common set of concerns to frame the issue at hand. ... The authors undertake a study of how to apply cyber law to cyber war, warning that allowing the Intelligence Community and the military to assist in the defense of privately owned networks may lead to legal and political consequ...

  10. The welfare state, pensions, privatization: the case of Social Security in the United States.

    Science.gov (United States)

    Du Boff, R B

    1997-01-01

    In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.

  11. Reflective practices at the Security Council: Children and armed conflict and the three United Nations.

    Science.gov (United States)

    Bode, Ingvild

    2018-06-01

    The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.

  12. S.1220: This Act may be referred to as the National Energy Security Act of 1991, introduced in the Senate of the United States, One Hundred Second Congress, First Session, June 5, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This bill would reduce the Nation's dependence on imported oil and provide for the energy security of the US. The contents of this bill are extensive. The Titles are as follows: Findings and purposes; Definitions; Corporate average fuel economy; Fleets and alternative fuels; Renewable energy; Energy efficiency; Oil and gas leasing in the Arctic National Wildlife Refuge; Advanced nuclear reactor commercialization; Nuclear reactor licensing; Uranium; Natural gas; Outer continental shelf; Research, development, demonstration and commercialization activities; Coal, coal technology, and electricity; Public Utility Holding Company Act reform; and Strategic petroleum reserve

  13. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  14. National Character vs. National Security: Conflict in the Making?

    Science.gov (United States)

    2011-03-01

    liberties. Since the 9/11 terrorist attacks, the U.S. public has watched the Patriot Act, full-body scanners and restricted access to public buildings...from 1.3 trillion to 3.5 trillion dollars, representing some 40% of total U.S. debt.”36 However, that debt restricts fiscal freedom of action for the...the American public has to keep in check its tendency toward national egoism .39 It would be the natural inclination of any leader of a uni-polar

  15. The StateNation Imbalance. Peace and Complex Circumstances

    Directory of Open Access Journals (Sweden)

    Cristian - Sorin Prună

    2008-06-01

    Full Text Available The defining reference points of this paper take into consideration the creation of severalscientific premises which would structure the approached issue - constitutional state (nationcorrelated with the term security – by reference to the current international context coordinates. Thegoal of the proposed approach is organising the elements which define the security of theconstitutional state from the perspective of the coexistence between peace and complex situations(crisis and war. In the effort of organising such a scientific matter, we attempted to realise clear,concise boundaries by means of research – the study and analysis of conflicting phenomena(conclusive factors / consequences. Thus, we pointed out the role of the modern constitutional statein the current context, the inference between the statenation balance, through its components, topreserve peace and nation security through efficient management of complex situations.

  16. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-05-15

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  17. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  18. The new terrorism and the American national security strategy : implications for Turkey's security

    OpenAIRE

    Türe, Nail

    2004-01-01

    Cataloged from PDF version of article. This thesis analyzes the consequences of the American National Security Strategy, carried out as part of the post September 11 ‘war on terrorism’, in terms of Turkey’s security. Whether the reasons or aims of a declaration of war on terrorism are right or not, the reality is that the U.S. has made important steps with significant implications for the whole world as well as for Turkey. Terrorism, which has changed some of its features by th...

  19. Human trafficking in Southeast Asia and U.S. national security

    OpenAIRE

    Snoke, Joshua H.

    2015-01-01

    Approved for public release; distribution is unlimited The United States government finds human trafficking to be an important subject and is placing increasing focus on the issue. The Southeast Asian portion of the Western Pacific encompasses a substantial portion of global trafficking, much of which has a final destination in the United States. This thesis asks the following question: How does trafficking in persons (TIP) affect U.S. national security interests and regional stability in ...

  20. Current energy situation affecting national economy, security, and psyche

    International Nuclear Information System (INIS)

    Blundell, H.; Culbreath, H.L.

    1979-01-01

    Nuclear energy should be perceived by Americans as the energy option that can fill the gap left by petroleum shortages. Opposition to nuclear power symbolizes a drive to slow economic growth and return to a decentralized society, but it overlooks the implications that not going nuclear will have for the economy and national security. The General Accounting Office plotted the consequences for three scenarios and concluded that only nuclear power can provide enough domestic energy to meet projected electrical needs. The impact of higher energy prices that will follow energy-supply shortages will result in social change and in a decline in national security. The issues of import dependence, proliferation, economic competition, and morality are not valid reasons to forego nuclear development because the connections are not valid

  1. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  2. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  3. Infectious Disease and National Security: Strategic Information Needs

    Science.gov (United States)

    2006-01-01

    to the National Security Council. Most current federal employees we interviewed offered one or more specific sugges- tions for a centralized, time...and preparedness information for health professionals Open 156 Ministry of Health Malaysia Government of Malaysia http://dph.gov.my/ddc/index. html...Open 206 Asian Network for Surveillance of Resistant Pathogens (ANSORP) Various (primary: Samsung Medical Center, Sungkyunkwan University, Seoul

  4. Project on National Security Reform: Forging a New Shield

    Science.gov (United States)

    2008-11-01

    quoted by Joseph Nye in ―Leaders and Managers,‖ Project Syndicate , 1 May 2008, 30 September 2008 < http://www.project-syndicate.org/commentary/nye56...Bulletin of the Atomic Scientists, 18 Sept 2007, 30 Sept 2008 < http://www.thebulletin.org/web-edition/ columnists / gordon-adams/ when-national-security... Syndication ) 1179 tagging, ambient awareness, 1180 message boards, virtual social networking, document storage, and virtual meetings. Heavy emphasis is

  5. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  6. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  7. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  8. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  9. National Plan to Achieve Maritime Domain Awareness for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2005-01-01

    Maritime Domain Awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security, safety, economy, or environment of the United States...

  10. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    Energy Technology Data Exchange (ETDEWEB)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  11. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    International Nuclear Information System (INIS)

    Herron, Kerry G.; Jenkins-Smith, Hank C.; Hughes, Scott D.

    2000-01-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community

  12. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives as well...

  13. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  14. Deterministic Secure Direct Communication Using Mixed state

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show an improved ping-pong protocol which is based on the protocol showed by Kim Bostrom and Timo Felbinger [Phys. Rev. Lett. 89, 187902 (2002); quant-ph/0209040]. We show that our protocol is asymptotically secure key distribution and quasisecure direct communication using a single photon resource. And this protocol can be can be carried out with great efficiency and speed using today's technology.

  15. S. 1514: This Act may be cited as the Department of Energy National Security Act for Fiscal Years 1992 and 1993, introduced in the United States Senate, One Hundred Second Congress, First Session, July 22, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Title 31, Part A, National Security Programs Authorizations, includes the following sections: Operating Expenses; Plant and Capital Equipment; Environmental Restoration and Waste Management; Funding Limitations; and General Reduction in Authorizations. Part B, Recurring General Provisions, presents the following Sections: Reprogramming; Limits on General Plant Projects; Limits on construction Projects; Fund Transfer Authority; Authority for Construction Design; Authority for Emergency Construction, Design and Construction Activities; and Funds Available for all DOE National Security Programs. Part C, Miscellaneous, includes the following: Scholarship and Fellowship Program for Environmental Restoration and Waste Management; Defense Environmental Restoration and Waste Management Program; Private Sector Participation in Waste Cleanup and Modernization Activities; Career Development Program for National Laboratory Employees; Resumption of Plutonium Operations at Rocky Flats Plant; Training and Protection of Nuclear Facilities Workers Who Respond to Emergencies Related to Hazardous Substances; and DOE Partnerships for Energy Critical Technologies, Advanced Manufacturing Technology, and Materials Processing, Synthesis, and Commercialization. Title 22, Defense Nuclear Facilities Safety Board Authorization, notes funds authorized for the board and discusses briefly changes in its powers and functions

  16. State of the Art: Embedding Security in Vehicles

    Directory of Open Access Journals (Sweden)

    Weimerskirch André

    2007-01-01

    Full Text Available For new automotive applications and services, information technology (IT has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.

  17. State of the Art: Embedding Security in Vehicles

    Directory of Open Access Journals (Sweden)

    André Weimerskirch

    2007-06-01

    Full Text Available For new automotive applications and services, information technology (IT has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.

  18. Nation States, Cities, and People

    Directory of Open Access Journals (Sweden)

    Marco Caselli

    2013-10-01

    Full Text Available In the first decade of the 21st century, attempts to measure globalization have multiplied, and they have led to the devising of diverse instruments, most notably the A. T. Kearney/Foreign Policy Globalization Index, the CSGR Globalisation Index, the KOF Index of Globalization, and the Maastricht Globalisation Index. Besides important similarities as regards structure, the dimensions considered, and the indicators used, the main feature shared by these instruments is the fact that they all use the same unit of analysis: the nation-state. This is a somewhat paradoxical situation, if one considers that one of the most distinctive characteristics of globalization is precisely that its dynamics extend beyond the state and the country. Gives this premise, the aim of the article is, on the one hand, to justify in any case the use of instruments that seek to measure globalization on the basis of states, and, on the other, to propose alternative approaches to such measurement. The article’s underlying assumption is that different approaches to the measurement of globalization are not mutually exclusive. Rather, such a plurality of perspectives is opportune and desirable given the complexity and multidimensionality of the concept of globalization.

  19. National Security Issues and Defense Reform in Ukraine

    National Research Council Canada - National Science Library

    Maslovskyi, Sergiy

    2007-01-01

    ...: is the Ukrainian nation able to build a modern, independent, and democratic state? Ukraine has created new opportunities for solving current problems, crafting an active foreign and domestic policy based on universal democratic values...

  20. National Guard Engagement in the Pacific: No Threat to Security

    National Research Council Canada - National Science Library

    Bour, Mark

    2002-01-01

    This thesis evaluates recent decisions to expand the National Guard (NGE) State Partnership Program into the Asia-Pacific region and examines potential effects this expansion will have on the new partners created...

  1. 28 CFR 0.72 - National Security Division.

    Science.gov (United States)

    2010-07-01

    .... 1203); terrorist acts abroad, including murder, against United States nationals (18 U.S.C. 2332); acts... to murder, kidnap, or maim persons or to damage property overseas (18 U.S.C. 956); providing material...

  2. Turning on the Dime: Diplomacy's Role in National Security

    National Research Council Canada - National Science Library

    Smith, Anton K

    2007-01-01

    The differences in approach and culture between the U.S. Departments of State and Defense are stark despite the fact that these organizations are members of the same team and share related national objectives...

  3. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    Science.gov (United States)

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  4. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... of the National Security Education Board. This meeting was to be held on June 20, 2012, from 8:30 a.m. to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite...

  5. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice... Succession for the Office of Disaster Management and National Security. This is the first order of succession... L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and...

  6. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...

  7. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  8. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  9. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Science.gov (United States)

    2010-05-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... June 23, 2010, from 8 a.m. to 12:30 p.m. ADDRESSES: The meeting will be held at the National Security.... Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  10. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Science.gov (United States)

    2010-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in subpart A of 17 CFR part 249. All...

  11. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-05-24

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the... announces that the following Federal advisory committee meeting of the National Security Education Board...

  12. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture, or other form of indebtedness effected on a national securities exchange by a member for its own...

  13. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  14. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... Department of Defense gives notice that it is renewing the charter for the National Security Education Board... awards that favors individuals expressing an interest in national security issues or pursuing a career in...

  15. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Other national security and emergency... COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations; cross...

  16. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0004] National Security Division: Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...

  17. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  18. 10 CFR 2.903 - Protection of restricted data and national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  19. Building a new storyline for Florida's domestic security to provide future resiliency for the state

    OpenAIRE

    Pape, Dominick D.

    2008-01-01

    CHDS State/Local Quickly after the 9/11 event, the state of Florida drafted one of the Nation's first comprehensive counterterrorism strategies to aid in the protection of the state's visitors and citizens. This strategy was drafted early in the new paradigm of Homeland Security. The strategy had several modifications over the years but has not had a comprehensive review since its inception. Many things have changed in the arena of Homeland Security since that first step after the 9/11 ...

  20. The U.S. National Security Council in Contemporary American International Studies

    Directory of Open Access Journals (Sweden)

    Vladimir V. Pavlov

    2016-01-01

    Full Text Available Established in accordance with the provisions of the National Security Act of 1947, the U.S. National Security Council is the main advisory body to the President of the United States tasked with helping the head of state to make the right decisions on matters related to national security. NSC system has been constantly evolving for some 70 years, and the NSC staff became a separate 'ministry' of a kind, allowing presidential administrations to focus ever-increasing control over American foreign policy in the White House. That is why serious attention is devoted to the National Security Council by American researches studying foreign policy decision-making. Here, a 'three-pronged consensus' exists: functioning and efficiency of the decision-making process is primarily a result of presidential actions; the President will make the best decision after becoming aware of the whole range of possible alternatives and assessing the consequences of each policy option; the position of the National Security Advisor, who is often one of the closest officials to the President and serves as a coordinator of the decision-making process, is considered to be one of the most notable in today's U.S. presidential administrations - and the most influential of those not being a subject to approval by the legislative branch of U.S. government. Any fundamental changes in the practice of U.S. foreign policy mechanism, as well as a decline of the White House influence on foreign policy are unlikely in the short term.

  1. The Current State of the International Security System

    OpenAIRE

    Ивашов, Леонид Григорьевич

    2013-01-01

    The author examines the modern geopolitical world and assesses the threats to Russia’s security. These threats are demonstrated to be hitched to the goals of the US National Strategy and, in particular, to the US plans on deployment of anti-ballistic missile system. The author argues that in this situation the mainstay of Russia’s foreign policy should become “security through cooperation.”Key words: international security, anti-ballistic missile, preemptive war, geopolitical centers, UN Secu...

  2. Quantum Secure Direct Communication with Five-Qubit Entangled State

    International Nuclear Information System (INIS)

    Lin Song; Liu Xiao-Fen; Gao Fei

    2011-01-01

    Recently, a genuine five-qubit entangled state has been achieved by Brown et al.[J. Phys. A 38 (2005) 1119]. Later it was indicated that this state can be used for quantum teleportation and quantum state sharing. Here we build a quantum secure direct communication protocol with this state, and prove that it is secure in ideal conditions. In the protocol, the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver. The receiver then performs projective determinate measurement to decode the secret message directly. Furthermore, this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity. (general)

  3. Intervention pursuant to article 4(h) of the Constitutive Act of the African Union without United Nations Security Council authorisation

    OpenAIRE

    Amvane, Gabriel

    2015-01-01

    Article 4(h) of the Constitutive Act of the African Union (AU) establishes the right of the Union to intervene in a member state to prevent grave violations of human rights. It does not state whether the AU should request prior authorisation from the United Nations (UN) Security Council, leading to many interpretations. Many articles were written on this issue at a time when the AU and the Security Council were not in confrontation. However, the situation has changed since the controversy ove...

  4. Significance of the institute of appeals under the conditions of increasing threats to national security

    Directory of Open Access Journals (Sweden)

    A. V. Kapulovskyi

    2015-03-01

    Full Text Available The article deals with the regulatory and scientific foundation for the development of the institute of citizens’ treatments in terms of obvious internal and external threats to national security. An attempt to construct an applicable model of management of public processes in terms of threats to national security, in which public opinion plays a key value. The fact that a successful resolution of problem of public participation in the preparation and acceptance of political decisions requires not only the presence of the constitutionally enshrined rights and duties and political institutions formed democratically, but also a variety of forms and ways of influencing in the activities of public authorities. At the same time, in a not declared, the so-called »hybrid» war, in which warfare are conducted locally - in some parts of the state and all other public and private institutions function in usual mode, tracking of possible threats to national security and factors that give rise to such threats should be carried out by means of both cleanly military, and civil means and methods. Thus, one of the most effective civil means of tracking such threats are the reception of citizens’ treatments, their processing and the adoption of appropriate response measures, in my opinion. Keywords: national security, public safety, human rights, public authorities, public interest.

  5. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  6. An exploration of the interface between national security and sustainable democracy in Nigeria:the way forward

    Directory of Open Access Journals (Sweden)

    Okunlade Isaac Adejumo

    2016-09-01

    Full Text Available The maintenance of internal and external security of the state is essentially the primary duty of the government. In Nigeria, this has become imperative in the face of the myriad of threats to her national security from within and outside. Nigeria has been bedeviled by the problem of insecurity caused by armed robbery, political violence, ethno-religious conflicts, Fulani herdsmen, Boko Haram insurgents and the Niger Delta insurgency. For a country trying to nurture her evolving democracy, security threat in whatever form is antithetic to sustainable democracy. This paper therefore, examines the elements of national security, which include but not limited to military, political, economic, and environmental security. It concludes that the myriad of security threats facing the country requires more than military force to resolve in order to achieve true national security. The paper recommended several measures to be put in place by the government to deemphasize its absolute reliance on the military for national security; ranging from the use of other elements of national power, such as diplomacy, negotiation and law enforcement, social and economic equity to environmental justice.

  7. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Science.gov (United States)

    2010-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch information...

  8. Increasing the resilience and security of the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  9. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    1993-01-01

    In the face of improved international relations, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being actively encouraged by the international community. Towards this end, the United Nations Office for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground and delineating areas of possible future negotiation and agreement. Within this framework, a Conference on the theme 'Disarmament and national security in an interdependent world' was held in Kyoto, Japan, from 13 to 16 April 1993. The Conference, the third one in a series held in Kyoto on disarmament issues, was organized by the Office for Disarmament Affairs through the Regional Centre for Peace and Disarmament in Asia and the Pacific and in collaboration with the Government of Japan and the Prefecture and City of Kyoto. This publication is based on material presented at that Conference

  10. [Food and nutritional security: situation analysis of decentralization in the national public policy].

    Science.gov (United States)

    Vasconcellos, Ana Beatriz Pinto de Almeida; Moura, Leides Barroso Azevedo de

    2018-03-01

    The aim of this study was to analyze the situation with the decentralization of the Brazilian National System of Food and Nutritional Security (SISAN), created in 2006 under the Brazilian National Food and Nutritional Security Act (LOSAN). Based on the criteria for joining SISAN, as set out in Decree 7,272 of August 25, 2010, the authors analyzed data from the basic information surveys of the Brazilian Institute of Geography and Statistics, 2014 (Estadic e Munic/2014). The results show that decentralization of SISAN is still incipient at the municipal level, although all the states of Brazil have already joined the system. The social assistance sector has played an outstanding role in coordinating SISAN at the state and municipal levels, while in the latter the health sector has also played a relevant role. The analysis of food and nutritional security activities conducted to date, based on the sources of federal, state, and municipal funds, further shows that the federal sphere has still not played a strong inductive role capable of leading the expansion of SISAN. More effective funding mechanisms and the assignment of responsibilities to the states and municipalities are relevant factors for consolidating the system's state-level base and expanding the municipal base in the search for an identity and capillarity for SISAN.

  11. Impacts of Climate Change on Colombia’s National and Regional Security

    Science.gov (United States)

    2009-10-01

    Peru, and Chile have relatively diverse, industrialized economies and greater domestic resources and state capaci- ties for adaptation. Bolivia...Change on Colombia’s National and Regional Security References 1 Colombia, Sistema de Informacion sobre el Uso del Agua en la Agricultura y el Medio...Jul 2009. "El cambio climatico en Colombia." Unpublished report shared with authors. IDEAM. 26 "El agua para 40 millones de personas esta en riesgo

  12. Negotiable Collateral Damage: Civil Liberties Versus National Security in Times of Threat

    Science.gov (United States)

    2011-06-01

    concept of defense. In his influential work, ―A Theory of Human Motivation,‖ published in 1943, Maslow theorized five hierarchical types of needs...rarely changes due to threats to national security; thus, this study does not reference this issue. 7 A. H. Maslow , "A Theory of Human Motivation...Americans living in the Pacific region of the United States. 52 Abraham Lincoln and Thomas Harry

  13. Developing a Comprehensive Approach Could Help DOD Better Manage National Security Risks in the Supply Chain

    Science.gov (United States)

    2016-02-01

    supply chains for rare earths.20 According to Industrial Analysis Center officials, only 10 percent of surveys sent to prime contractors for 79...the Supply Chain Report to Congressional Committees February 2016 GAO-16-161 United States Government Accountability Office United...Developing a Comprehensive Approach Could Help DOD Better Manage National Security Risks in the Supply Chain Why GAO Did This Study DOD depends on

  14. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  15. Examination of State-Level Nuclear Security Evaluation Methods

    International Nuclear Information System (INIS)

    Kim, Chan Kim; Yim, Man-Sung

    2015-01-01

    An effective global system for nuclear materials security needs to cover all materials, employing international standards and best practices, to reduce risks by reducing weapons-usable nuclear material stocks and the number of locations where they are found. Such a system must also encourage states to accept peer reviews by outside experts in order to demonstrate that effective security is in place. It is thus critically important to perform state-level evaluation of nuclear security based on an integrative framework of risk assessment. Such evaluation provides a basis of measuring the level and progress of international effort to secure and control all nuclear materials. sensitivity test by differentiating weight factors of each of the indicators and categories will be performed in the future as well

  16. Securing the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  17. Controlled and secure direct communication using GHZ state and teleportation

    International Nuclear Information System (INIS)

    Gao, T.

    2004-01-01

    A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side. (orig.)

  18. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  19. Political thuggery and security in Benue State: Counselling ...

    African Journals Online (AJOL)

    The paper has outlined the major causes and effects of political thuggery on the security and safety of Benue State. Since Government has seemingly become incapacitated in her bid to address the political situation in the state, this paper has recommended several counselling interventions which include political education ...

  20. In Pursuit of the American Degree: Internationalization, National Security, and the Making of South Asian Foreign Students

    Science.gov (United States)

    Thomas, Susan

    2013-01-01

    My dissertation examines how global neoliberal forces intersect with racialized state security practices to shape the transnational subjectivities of South Asian overseas students studying in the U.S. in the post-9/11 moment. These students' movement across national borders to pursue higher education in the United States positions them as ideal…

  1. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  2. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    International Nuclear Information System (INIS)

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-01-01

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  3. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... of the Executive Order, ``Classified National Security Information'' Memorandum for the Heads of... Security Information'' (the ``order''), which substantially advances my goals for reforming the security... classified information shall provide the Director of the Information Security Oversight Office (ISOO) a copy...

  4. State surveillance as a threat to personal security of individuals

    Directory of Open Access Journals (Sweden)

    Sławomir Czapnik

    2015-12-01

    Full Text Available Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.

  5. United States Energy Policy: Security Not Independence

    Science.gov (United States)

    2013-03-01

    on leased land, ensuring fracking is done responsibly, and getting more natural gas and hybrid systems into U.S. mass transit. Internationally, the...fewer environ disturbances -Can store underground -Environ impacts of fracking unknown -uses large amount of water -potential for saline...from shale continues to rise as the United States determines how to drill safely. However, the impact of fracking on the environment is still

  6. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Science.gov (United States)

    2010-01-01

    ... 29, 2009 Implementation of the Executive Order, “Classified National Security Information” Memorandum..., “Classified National Security Information” (the “order”), which substantially advances my goals for reforming... or handles classified information shall provide the Director of the Information Security Oversight...

  7. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  8. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  9. 76 FR 2737 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Science.gov (United States)

    2011-01-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63668; File No. SR-NSCC-2010-09] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change... Facility January 6, 2011. I. Introduction On August 30, 2010, the National Securities Clearing Corporation...

  10. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while...

  11. Social Security Number Protection Laws: State-by-State Summary Table

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  12. Deploying Difference: Security Threat Narratives and State Displacement from Protected Areas

    Directory of Open Access Journals (Sweden)

    Elizabeth Lunstrum

    2018-01-01

    Full Text Available State actors are increasingly treating protected areas as sites of security threats and policing resident communities as though they are the cause of this insecurity. This is translating into community eviction from protected areas that is authorised by security concerns and logics and hence not merely conservation concerns. We ground this claim by drawing upon empirical work from two borderland conservation areas: Mozambique's Limpopo National Park (LNP and Guatemala's Maya Biosphere Reserve (MBR. In both cases, we show how these security-provoked evictions are authorised by the mobilisation of interlocking axes of difference that articulate notions of territorial trespass with that of a racialised enemy. Rather than a new problem or phenomena, we show how these axes are rooted in prior histories of state actors rendering racialised subjects dangerous, Cold War histories in both cases and a longer colonial history with the LNP. We also show how standing behind these evictions is the nation-state and its practices of protected area territorialisation. From here, we illustrate how the rationale behind displacement from protected areas matters, as evictions become more difficult to contest once they are authorised by security considerations. The cases, however, differ in one key respect. While displacement from the LNP is an instance of conservation-induced displacement (CID, although one re-worked by security considerations, eviction from the MBR is motivated more centrally by security concerns yet takes advantage of protected area legislation. The study hence offers insight into a growing literature on conservation-security encounters and into different articulations of conservation, security, and displacement.

  13. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Fetterman , Maine Department of Marine Resources Lt Bill Krul, Marine Patrol, St. Clair County, Michigan Sgt Jim Lambert, Marine Patrol, Alameda...Major John C. Fetterman – State of Maine Major Fetterman currently serves as Vice President of the National Association of State Boating Law...or seemingly out of place vessel enters a maritime community, it will attract the attention of his officers. Major Fetterman was concerned that

  14. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  15. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Science.gov (United States)

    2010-04-01

    ... for registration as a national securities association or affiliated securities association. 249.801... Registration of and Reporting by National Securities Associations and Affiliated Securities Associations § 249.801 Form X-15AA-1, for application for registration as a national securities association or affiliated...

  16. National Security Crisis Decision-Making: The Role of Regional Combatant Commander

    National Research Council Canada - National Science Library

    Williams, Sean C

    2007-01-01

    The successful management of the Cuban Missile Crisis of 1962 set an unfortunate precedent for crisis management and national security crisis decision-making that persists into the contemporary security environment...

  17. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    Gross Domestic Product GMO Genetically Modified Organisms HDL High Density Lipo Protein xiv HFCS High Fructose Corn Syrup LDL Low Density Lipo...index and as little of any processed or modified GMO grains. There is a means to return the nation to a healthier food state and also increase local

  18. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  19. The National Intelligence Strategy of the United States of America: Transformation Through Integration and Innovation

    National Research Council Canada - National Science Library

    2005-01-01

    ... and President Bush's National Security Strategy of the United States of America. The President signed the new law with the expectation that "our vast intelligence enterprise will become more unified, coordinated, and effective...

  20. An Analytical Review of the United States National Interests in Korea

    National Research Council Canada - National Science Library

    Swope, Frederick

    2004-01-01

    ... and interests for continued security on the peninsula and in the region. It will address these new growing tensions and review the United States National interests and policy differences with South Korea...

  1. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  2. Magnetic imaging: a new tool for UK national nuclear security.

    Science.gov (United States)

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-22

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  3. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  4. Magnetic Imaging: a New Tool for UK National Nuclear Security

    Science.gov (United States)

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  5. State Control over Private Military and Security Companies in Armed ...

    African Journals Online (AJOL)

    NWUuser

    State Control over Private Military and Security Companies in Armed Conflict by H Tonkin ... (US) in the Iraqi theatre by 2007 exceeded the number of US troops, and in 2010 .... due diligence to promote PMSC compliance therewith. ... relying on existing accountability frameworks of international law, new domestic and.

  6. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  7. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Science.gov (United States)

    2010-07-01

    ... national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2... rate established * * * for transportation provided to the U.S. Government would endanger the National...

  8. 15 CFR 930.122 - Necessary in the interest of national security.

    Science.gov (United States)

    2010-01-01

    ... Trade (Continued) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... proposed. Secretarial review of national security issues shall be aided by information submitted by the...

  9. The Factor of Food in Biopolitics and National Security

    Directory of Open Access Journals (Sweden)

    Sergey A. Kravchenko

    2014-01-01

    Full Text Available The paper examines the role of food factor in the liberal biopolitics from its birth to the present day. According to the author, the consequences of this policy of food administration are ambivalent in character. On the one hand, there are real gains in mass production of food, its delivery to the consumer, medical supervision of the implementation of its quality. However, on the other hand, the basic principles of this biopolitics - scientism, formal rationalism, pragmatism and commercialism have not allowed to solve the problems of social inequality in the access to healthy food and of illuminating the hunger. In the end of the last century the liberal biopolitics acquired globo-networked and neo-liberal character but the corresponding transition from the national to the global scale administration of food production only intensified risks and challenges of modern human nutrition. In a number of countries including Russia there appeared the problems of food security. The adopted national programs to address these challenges in a "world risk society" (U. Beck will not solve them without fully understanding and practical implementation of the principle of the indivisibility of food security for all peoples of the world and implementation of the global food security. To achieve this, the author believes, it is necessary to abandon the "repair" of the current neo-liberal wing of biopolitics and its pragmatic and mercantilist approaches to human nutrition and pass over to a humanistic biopolitics. There offered a concrete roadmap motion to it, in particular, intending to strengthen the natural sciences and engineering for the production of food with the theoretical instruments of social sciences and humanities; to replace the outdated positivistic, scientistic postulate «knowledge - power" with the formula of ethical, humanistically oriented responsibility of scientists: "the integral knowledge of all sciences - quality food for the health of all

  10. RUSSIA'S ECONOMIC SECURITY: THREATS TO NATIONAL INTERESTS AND THEIR REFLECTION

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2014-01-01

    Full Text Available The relevance of this study due to the fact that at the present time the situation inRussiais complemented by the negative consequences of market reforms in the economy. According to statistical studies in the country with infl ation of about 10% per year among the total population of more than 20% of people with incomes below the subsistence minimum, and the income gap between the highest-income populations and low-income groups more than 12 times. The inequitable distribution of material and spiritual wealth, unemployment (over 9%, ignoring the legitimate rights and interests of a particular person and their direct violation, corruption, alcoholism, drug addiction largely led to the reproduction of aggression, violence in the country. The recession has limited the ability of the material support of the institutions of culture, education, health. The majority of the population is a feeling of uncertainty, future uncertainty, anxiety, loss of landmarks.Objectives The purpose of this work is the identifi cation and characterization of threats to economic security of theRussian Federationat the present time, and to develop recommendations for the prevention of threats to the national interests ofRussia.Method’s. The methodological basis of this article was legal, comparative and economic-statistical methods of analysis. Results. In the framework of the submitted article, the authors found that threats to the economic security ofRussiaare potential dangers that can occur when inept and ineffi cient use of economic resources ofRussiaon the domestic and foreign markets. Major threats to the economic security of theRussian Federationare: bankruptcy, weak absorption lines; corruption; threats to small business development; investment crisis, the massive outfl ow of capital; the crisis in the social sphere; food addiction; the crisis of industrial policy, as well as strengthening the role and place of TNCs.Conclusions and Relevance. The practical

  11. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  12. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  13. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  14. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  15. National Security Cutter: Enhanced Oversight Needed to Ensure Problems Discovered during Testing and Operations Are Addressed

    Science.gov (United States)

    2016-01-01

    May Lead to NSCs and Future DHS Assets Deploying without Having Demonstrated Full Capabilities 22 Performance Issues Discovered Outside of IOT &E...Examples of National Security Cutter Critical Operational Issues and Key Performance Parameters 10 Table 3: National Security Cutter Major...Cutter IOT &E Initial Operational Test and Evaluation KPP Key Performance Parameter LRI-II Long-Range Interceptor II NSC National Security Cutter

  16. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  17. S.2166: An act to reduce the Nation's dependence on imported oil, to provide for the energy security of the Nation, and for other purposes, introduced in the United States Senate and House of Representatives, One Hundred Second Congress, Second Session, February 19, 1992

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This bill, also referred to as the National Energy Security Act of 1992, contains the following: Title I - Findings and purposes: Climate protection goals,least-cost energy strategy, and Director of climate protection: Title II - Definitions; Title III (none); Title IV - Fleets and alternative fuels: Alternative fuel fleets, Alternative fuels, Mass transit and training; Title V - Renewable energy: CORECT and COEECT, Renewable energy initiatives, Hydropower; Title VI - Energy efficiency: Industrial, commercial, and residential, Federal energy management, Utilities, State, local, insular, and tribal energy assistance, LIHEAP options pilot program, Consultative commission on western hemisphere energy and environment; Title VII (none); Title VIII - Advanced nuclear reactor commercialization; Title IX - Nuclear reactor licensing; Title X - Uranium: Uranium enrichment, Uranium; Title XI - Natural gas; Title XII - Outer continental shelf: Coastal communities impact assistance, Coastal resources enhancement fund, relationship to other law, Prohibition of leasing and preleasing activity; Title XIII - Research, development, demonstration and commercialization activities; Title XIV - Coal and coal technology, Electricity, Innovative technology transfer; Title XV - Public Utility Holding Company Act reform; Title XVI - Strategic Petroleum Reserve; Title XVII - Stratospheric ozone depletion; Title XVIII - Indian energy resource development commission; Title XIX - General provisions

  18. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  19. Simulating human behavior for national security human interactions.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  20. Integration of Military and Civilians Space Assets: Legal and National Security Implications

    National Research Council Canada - National Science Library

    Waldrop, Elizabeth

    2003-01-01

    .... From a military perspective, intentional reliance on civilian systems must address, inter alia, national security concerns, contractual obligations, licensing restrictions, liability, and long-term...

  1. Mexico’s National Security Challenges and the Military Endeavor

    Science.gov (United States)

    2013-03-01

    10 highlighted major challenges for nations in the region and their armies, such as poverty and lack of social development, massive migration ...31 15 2006 2007-2009 2010 2011 Sinaloa cartel Sinaloa cartel Sinaloa cartel Sinaloa cartel Beltran Leyva cartel South pacific cartel...Mexican population in many states, such as Tamaulipas, Coahuila, Chihuahua, Sinaloa , and Durango, is fearful of organized crime. The majority of the

  2. Industrial Espionage in Denmark: Collaborative Security in a Corporatist State

    DEFF Research Database (Denmark)

    Afsah, Ebrahim

    the manner Danish state and society deal with regulatory questions, including the penal protection against industrial espionage. Unlike many other nations, Danes view their state as a friend and, consequently, accept and cooperate with a kind of intrusive state action that elsewhere would be viewed...

  3. MIGRATORY THREATS TO NATIONAL SECURITY OF UKRAINE: CURRENT CHALLENGES AND WAYS OF REGULATION

    Directory of Open Access Journals (Sweden)

    Mychailo Romaniuk

    2016-11-01

    Full Text Available The purpose of the article is to disclose the migratory threats which are connected with external and mass internal inter-regional migrations, which are caused by the annexation of the Crimea and military aggression in Donbas by Russia. Methodological and practical aspects of improving the management of intensive interstate and inter-regional migratory processes, negative consequences of which threaten national security of the country because of hybrid war in Donbas, illegal migration, worsening of the demographic situation, departure of scientists and specialists abroad are described in the article too. The main strategic objective, which consists of maintenance of state sovereignty, territorial integrity of Ukraine, and also integration in European and migratory space, ensuring close to the world standards of quality and length of life, realization of rights and freedoms of citizens, is formulated. Actions and tasks of the state migratory policy, ways and methods of regulation of external migrations of the population are considered. Principal reasons of external migrations of population are identified and analysed. The inwardly-regional, interregional and intergovernmental migrations of population of Ukraine in the years of its state independence (1991- 2014 are analyzed in details. The results of analysis showed that migratory activity goes down on inwardly-regional and interregional levels. Also intensity of exchange of population went down between the regions of country. At the same time Ukraine for years state independence through depopulation processes lost 6,5 million persons, and in the external migratory moving of population of loss made over 1 million persons. The problem of illegal external labour migration is considered. It is noted that illegal migration from Ukraine to the threats to national security in the Law of Ukraine "On the National Security of Ukraine" is not included, and a threat to national security posed by illegal

  4. Hyper-connectivity : intricacies of national and international cyber securities

    OpenAIRE

    Dawson, Maurice

    2017-01-01

    This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets: 1. Security Solutions for Hyperconnectivity and the Internet of Things; 2. Developing Next-Generation Countermeasures for...

  5. Leadership, Management, and Organization for National Security Space: Report to Congress of the Independent Assessment Panel on the Organization and Management of National Security Space

    National Research Council Canada - National Science Library

    Young, A. T; Anderson, Edward; Bien, Lyle; Fogleman, Ronald R; Hall, Keith; Lyles, Lester; Mark, Hans

    2008-01-01

    The Independent Assessment Panel (IAP) was chartered to review and assess the DoD management and organization of National Security in Space and make appropriate recommendations to strengthen the U.S. position...

  6. Statement at NRC International Regulators Conference on Nuclear Security, 4 December 2012, Washington, United States

    International Nuclear Information System (INIS)

    Amano, Y.

    2012-01-01

    I would like to begin by thanking NRC Chairman Allison Macfarlane for hosting this first regulatory Conference on nuclear security involving regulators, law enforcement agencies and the IAEA. The United States has been a very important partner in the IAEA's nuclear security activities right from the start. It is by far the largest donor to our Nuclear Security Fund. It has actively supported our programmes and has been generous in providing funding, equipment and training to other Member States. When President Obama hosted the first Nuclear Security Summit in April 2010, he said it was important that that event should be part of a ''serious and sustained effort'' to improve nuclear security throughout the world. Since then, a growing number of governments have given high-level attention to this vitally important issue. This is very encouraging. Today, I am especially pleased to see regulators coming together to focus on this subject. I am confident that your meeting will make a valuable contribution to strengthening global nuclear security. I would like to share with you some important recent milestones in the IAEA's nuclear security work. As you know, primary responsibility for ensuring nuclear security lies with national governments. However, governments have recognized that international cooperation is vital. Terrorists and other criminals do not respect international borders and no country can respond effectively on its own to the threat which they pose. In September, our Member States - there are now 158 - reaffirmed the central role of the IAEA in e nsuring coordination of international activities in the field of nuclear security, while avoiding duplication and overlap . Our central role reflects the Agency's extensive membership, our mandate, our unique expertise and our long experience of providing technical assistance and specialist, practical guidance to countries. To put it simply, our work focuses on helping to minimize the risk of nuclear and other

  7. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  8. 17 CFR 240.19c-1 - Governing certain off-board agency transactions by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity... members of national securities exchanges. The rules of each national securities exchange shall provide as...

  9. 17 CFR 240.19c-5 - Governing the multiple listing of options on national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... of options on national securities exchanges. 240.19c-5 Section 240.19c-5 Commodity and Securities... of Exchange Members § 240.19c-5 Governing the multiple listing of options on national securities exchanges. (a) The rules of each national securities exchange that provides a trading market in standardized...

  10. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Science.gov (United States)

    2010-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... national securities exchange, registered as such with the Securities and Exchange Commission pursuant to...

  11. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2010-01-28

    ....; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... determination about whether to grant BATS Y Exchange's request to be registered as a national securities...

  12. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2013-03-07

    ...; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... Topaz Exchange's request to be registered as a national securities exchange. The Commission will grant...

  13. Deterministic secure communications using two-mode squeezed states

    International Nuclear Information System (INIS)

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-01-01

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state

  14. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  15. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  16. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  17. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  18. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  19. Chaotic Secure Communication Systems with an Adaptive State Observer

    Directory of Open Access Journals (Sweden)

    Wei-Der Chang

    2015-01-01

    Full Text Available This paper develops a new digital communication scheme based on using a unified chaotic system and an adaptive state observer. The proposed communication system basically consists of five important elements: signal modulation, chaotic encryption, adaptive state observer, chaotic decryption, and signal demodulation. A sequence of digital signals will be delivered from the transmitter to the receiver through a public channel. It is rather reasonable that if the number of signals delivered on the public channel is fewer, then the security of such communication system is more guaranteed. Therefore, in order to achieve this purpose, a state observer will be designed and its function is to estimate full system states only by using the system output signals. In this way, the signals delivered on the public channel can be reduced mostly. According to these estimated state signals, the original digital sequences are then retrieved completely. Finally, experiment results are provided to verify the applicability of the proposed communication system.

  20. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  1. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  2. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  3. 2015 National Sub-State Geography Geodatabase

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The 2015 TIGER Geodatabases are extracts of selected nation based and state based geographic and cartographic information from the U.S. Census Bureau's Master...

  4. The National Counterintelligence Strategy of the United States of America

    National Research Council Canada - National Science Library

    McConnell, J. M

    2007-01-01

    .... Our adversaries -- foreign intelligence services, terrorists, foreign criminal enterprises and cyber intruders -- use overt, covert, and clandestine activities to exploit and undermine US national security interests...

  5. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Science.gov (United States)

    2010-07-01

    ... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities of the United States. The existing distinctive papers shall be used for the printing of interest...

  6. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for certain derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... Miscellaneous Exemptions § 240.3a12-7 Exemption for certain derivative securities traded otherwise than on a...

  7. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  8. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  9. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  10. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  11. Emerging Roles of Women in the National Food Security Campaign of the Federal Government of Nigeria: A Review

    OpenAIRE

    Ademilua, O.S; Adeeko, A; Gbotoso, O.A; Akomolafe, A.M; Ishola, O.O

    2017-01-01

    The issue of food security in Nigeria is of national concern as it affects young and old, male and female. The review assessed the emerging roles of women and their contributions to food security in Nigeria. Specifically, it explained the concept of food security, identified the specific roles of women in food security and identified factors affecting women participation in national food security. Food security is a situation that exist when all people at all times, have physical, social and ...

  12. National Reputation Management and the Competition State

    DEFF Research Database (Denmark)

    Angell, Svein Ivar; Mordhorst, Mads

    2015-01-01

    of the two approaches, nation branding and public diplomacy. In the next section, national reputation management efforts in Denmark and Norway are compared according to three variables: how they were launched in response to globalization, the role of consultants, and the countries’ different institutional......The paper deals with the national reputation programmes of Denmark and Norway in the period 2005–2010. The first section demonstrates how national reputation management emerged as a part of the globalization discourse and illustrates its hybrid character. The paper then gives a short overview...... settings. The article concludes with a discussion of how the elements of national reputation management interact in the initiatives of the two countries and how this relates to the general change in the relationship between nation-states on the global scene. The paper concludes that Norway and Denmark...

  13. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  14. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches  of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  15. Steady state security assessment in deregulated power systems

    Science.gov (United States)

    Manjure, Durgesh Padmakar

    Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the

  16. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are

  17. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  18. Medical countermeasures for national security: a new government role in the pharmaceuticalization of society.

    Science.gov (United States)

    Elbe, Stefan; Roemer-Mahler, Anne; Long, Christopher

    2015-04-01

    How do governments contribute to the pharmaceuticalization of society? Whilst the pivotal role of industry is extensively documented, this article shows that governments too are accelerating, intensifying and opening up new trajectories of pharmaceuticalization in society. Governments are becoming more deeply invested in pharmaceuticals because their national security strategies now aspire to defend populations against health-based threats like bioterrorism and pandemics. To counter those threats, governments are acquiring and stockpiling a panoply of 'medical countermeasures' such as antivirals, next-generation vaccines, antibiotics and anti-toxins. More than that, governments are actively incentivizing the development of many new medical countermeasures--principally by marshaling the state's unique powers to introduce exceptional measures in the name of protecting national security. At least five extraordinary policy interventions have been introduced by governments with the aim of stimulating the commercial development of novel medical countermeasures: (1) allocating earmarked public funds, (2) granting comprehensive legal protections to pharmaceutical companies against injury compensation claims, (3) introducing bespoke pathways for regulatory approval, (4) instantiating extraordinary emergency use procedures allowing for the use of unapproved medicines, and (5) designing innovative logistical distribution systems for mass drug administration outside of clinical settings. Those combined efforts, the article argues, are spawning a new, government-led and quite exceptional medical countermeasure regime operating beyond the conventional boundaries of pharmaceutical development and regulation. In the first comprehensive analysis of the pharmaceuticalization dynamics at play in national security policy, this article unearths the detailed array of policy interventions through which governments too are becoming more deeply imbricated in the pharmaceuticalization of

  19. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrella, F.

    1993-01-01

    Paper deals with a new emerging international system of security with the emphasis on the regional contribution, especially position of Argentina, non-proliferation policy, comprehensive safeguards, safeguards agreements, technology developments and responsibilities and opportunities related to the disarmament issues

  20. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...