WorldWideScience

Sample records for strengthening national security

  1. Strengthening nuclear security

    International Nuclear Information System (INIS)

    Kurihara, Hiroyoshi

    2003-01-01

    The international situation after the end of the Cold-War has been quite unstable, due to the occurrence of frequent regional conflicts and domestic wars based on ethnic, religious or racial reasons. Further, threats to the would peace and security by non-state actors, like international terrorist groups, have been recognized after 9.11 terrorist attacks to the World Trade Center buildings and to the Pentagon. Utilization of nuclear energy, which encompasses both peaceful uses and military ones, required an establishment of regulatory system, by which risks associated with the development of nuclear energy can be controlled. Accordingly, nuclear safety control system, and then non-proliferation control system has been developed, both in the international level and notional level. In recognition of the present unstable international situations, it is required to establish, maintain and strengthen a system which control nuclear security aspect, in addition to the present systems. (author)

  2. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  3. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  4. Strengthening global health security by embedding the International Health Regulations requirements into national health systems.

    Science.gov (United States)

    Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin

    2018-01-01

    The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.

  5. The smart alternative : securing and strengthening our nation's vulnerable electric grid

    International Nuclear Information System (INIS)

    Nahigian, K.R.

    2008-01-01

    This article explained the concept of the next generation of electrical power grids known as the Smart Grid, which allows the possibility to either reallocate electricity during times of crisis or peak demand or prevent power disruptions through proactive diagnosis. The author examined the security, economic and environmental benefits of implementing the Smart Grid during a time of rising energy prices and desire for energy independence. The Smart Grid uses advanced communications and information technologies to create a modern transmission and distribution network that facilitates the integration of alternative energy sources such as wind and solar power, as well as energy-efficient technologies such as plug-in hybrid vehicles. The author emphasized that implementing the Smart Grid grid is also vital to strengthening America's resilience and security since a more robust energy infrastructure will ensure the reliable flow of electricity in the event of a crisis. In addition to promoting energy efficiency, the Smart Grid offers economic benefits, such as reducing the billions of dollars lost each year by American businesses on power outages. A Smart Grid could also open lucrative new markets for smart technologies. 2 figs

  6. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  7. Challenges in strengthening radiation safety and security programme in Malaysia

    International Nuclear Information System (INIS)

    Noriah, M.A.

    2010-01-01

    This paper illustrates the Malaysian experience in implementing steps in strengthening radiation safety and security through certification of radiation safety personnel, which is dedicated to meet the current and future needs in sustainability of radiation safety and security systems. Commitment from the workforce to treat safety as a priority and the ability to turn a requirement into a practical language is also important in implementing the radiation safety policy efficiently. Through this effort, we are able to create a basis for adequate protection of workers, the public and the environment and encourage licensees to manage radiation safety and security based on performance, and not on compliance culture, with the final objective of professing a safety culture through self regulation. This will certainly benefit an organisation with ultimate goals are to continuously strive for a healthy, accident free and environmentally sound workplace and community, while providing the technical support needed to meet the national mission. This will strengthen the radiation safety and security programme and could be used to assist in manpower development once Malaysia makes the decision to embark on a nuclear power programme. (author)

  8. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  9. ONE OF THE POSSIBLE WAYS TO STRENGTHENING THE SECURITY

    Directory of Open Access Journals (Sweden)

    Roman URBAN

    2016-09-01

    Full Text Available The paper is intended to point out at the relation between security and its key vehicle that is humans themselves. It presents an option to strengthen security through purposeful education of peiple and their comprehensive training in peaceful settlement of conflicts.

  10. Strengthening National Identity through National Symbols and ...

    African Journals Online (AJOL)

    South Africans vacillate in their national identity and remain largely attached to their racial and ethnic group identities. The aim of this article is to illustrate the manner in which a sense of understanding, familiarity and pride with regard to national symbols and thus to national identity can be attained. The objective is that the ...

  11. Strengthening the security of radiation sources in Ghana

    International Nuclear Information System (INIS)

    Emi-Reynolds, G.; Banini, G.K.; Flecther, J.J.; Ennison, I.; Schandorf, C.

    1998-01-01

    Legislative instrument LI 1559 of 1993 established the Radiation Protection Board (RPB) as the National Competent Authority (NCA) on radiation matters in Ghana. The Board advises Government through the Ghana Atomic Energy Commission on matters relating to radiation safety, security of sources, sales, import and export, contamination in food and environment, among others. It has wide ranging regulatory power and works in association with country authorities. The regulations in place for controlling the movement and use of radioactive materials in Ghana are discussed. Accountability for radioactive materials especially for those which were brought in before the establishment of the RPB have been the focus of our discussion. The need to for intensify educational programs for the public on matters relating to effect of radiation on man and environment is recommended. Strengthening of regulatory control of sources and intensifying efforts against smuggling, unauthorised use and systems for notification on radioactive transport accidents are noted. (author)

  12. Small-scale Aquaculture to Strengthen Food Security in Cambodia ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Small-scale Aquaculture to Strengthen Food Security in Cambodia (CIFSRF) ... for their families' consumption in the same ponds as large fish, which can be sold for income. ... The project also studies opportunities to scale up the model for broader use ... Assessing improvements in nutrition outcomes following agricultural ...

  13. Building and strengthening confidence and security in Asia

    International Nuclear Information System (INIS)

    Corden, P.S.

    1992-01-01

    This paper presents a few thoughts on the question of building and strengthening confidence and security in Asia, in particular in the area centred on the Korean peninsula. This question includes the process of establishing and implementing confidence- and security-building measures, some of which might involve States other than North and South Korea. The development of CSBMs has now been well established in Europe, and there are encouraging signs that such measures are taking hold in other areas of the world, including in Korea. Consequently there is a fairly rich mine of information, precedent and experience from which to draw in focusing on the particular subject at hand. In these remarks the concept of confidence- and security-building is briefly addressed and measures are examined that have proven useful in other circumstances and review some possibilities that appear of interest in the present context

  14. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...

  15. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  16. The Strengthening Nuclear Security Implementation initiative: evolution, status and next steps

    NARCIS (Netherlands)

    Dal, B.; Herbach, J.; Luongo, K.N.

    2015-01-01

    The "Strengthening Nuclear Security Implementation" initiative broke new ground at the 2014 Nuclear Security Summit in the effort to harmonize and strengthen the global nuclear security regime. This report discusses the significance of the initiative, the importance of expanding its signatories, and

  17. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  18. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  19. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  20. Strengthening of safety and security of radioactive sources: new regulatory challenges

    Energy Technology Data Exchange (ETDEWEB)

    El Messaoudi, M.; Essadki M Lferde, H.; Moutia, Z. [Faculte des Sciences, Dept. de Physique, Rabat (Morocco)

    2006-07-01

    The answer to these new regulatory challenges was given by implementation of divers measures aimed at strengthening of safety and security of radioactive sources and to prevent the malevolent use of radioactive sources. The international basic safety standards for protection against ionizing radiation and for the safety of radiation sources (B.S.S.) require the establishment and implementation of security measures of radioactive sources to ensure that protection and safety requirements are met. The IAEA has engaged in an extensive effort to establish and/or strengthen national radiation protection and radiological safety infrastructure, including legislation and regulation, a regulatory authority empowered to authorize and inspect regulated activities, an adequate number of trained personnel and technical services that are beyond the capabilities required of the authorized legal persons. The Moroccan authority makes steady efforts to strengthen national radiation safety infrastructure by participating in IAEA model project for upgrading radiation protection infrastructure, to implement the revised version of code of conduct on the safety and security of radioactive sources. Indeed, Morocco expressed its adhesion with the technical assistance project of the IAEA in 2001, carrying on the reinforcement of the national infrastructure of regulation and control of the radioactive materials. The control over radioactive sources is an essential element for maintaining high level of security and safety of radioactive sources. The IAEA T.E.C.-D.O.C.-1388 serves as reference document to implement the control culture. The security problems with which the world is confronted showed that the uses of radioactive sources should subject reinforcements of safety, of control and of security of the radioactive sources. For this purpose, the IAEA launched an action plan for the safety and security of radioactive sources. The IAEA guide Security of radioactive sources will help the

  1. Strengthening of safety and security of radioactive sources: new regulatory challenges

    International Nuclear Information System (INIS)

    El Messaoudi, M.; Essadki M Lferde, H.; Moutia, Z.

    2006-01-01

    The answer to these new regulatory challenges was given by implementation of divers measures aimed at strengthening of safety and security of radioactive sources and to prevent the malevolent use of radioactive sources. The international basic safety standards for protection against ionizing radiation and for the safety of radiation sources (B.S.S.) require the establishment and implementation of security measures of radioactive sources to ensure that protection and safety requirements are met. The IAEA has engaged in an extensive effort to establish and/or strengthen national radiation protection and radiological safety infrastructure, including legislation and regulation, a regulatory authority empowered to authorize and inspect regulated activities, an adequate number of trained personnel and technical services that are beyond the capabilities required of the authorized legal persons. The Moroccan authority makes steady efforts to strengthen national radiation safety infrastructure by participating in IAEA model project for upgrading radiation protection infrastructure, to implement the revised version of code of conduct on the safety and security of radioactive sources. Indeed, Morocco expressed its adhesion with the technical assistance project of the IAEA in 2001, carrying on the reinforcement of the national infrastructure of regulation and control of the radioactive materials. The control over radioactive sources is an essential element for maintaining high level of security and safety of radioactive sources. The IAEA T.E.C.-D.O.C.-1388 serves as reference document to implement the control culture. The security problems with which the world is confronted showed that the uses of radioactive sources should subject reinforcements of safety, of control and of security of the radioactive sources. For this purpose, the IAEA launched an action plan for the safety and security of radioactive sources. The IAEA guide Security of radioactive sources will help the

  2. National Security and National Development: A Critique

    African Journals Online (AJOL)

    DR Nneka

    There has been the tendency right from independence to view national ... the nation's economic underdevelopment, which has led to social injustice, ... For a nation, security connotes conditions of peace, stability, order ... They are very important for the ... According to Mathew (1989), Global development now suggests.

  3. ORDER SECURITYNATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  4. Radiation and waste safety: Strengthening national capabilities

    International Nuclear Information System (INIS)

    Barretto, P.; Webb, G.; Mrabit, K.

    1997-01-01

    For many years, the IAEA has been collecting information on national infrastructures for assuring safety in applications of nuclear and radiation technologies. For more than a decade, from 1984-95, information relevant to radiation safety particularly was obtained through more than 60 expert missions undertaken by Radiation Protection Advisory Teams (RAPATs) and follow-up technical visits and expert missions. The RAPAT programme documented major weaknesses and the reports provided useful background for preparation of national requests for IAEA technical assistance. Building on this experience and subsequent policy reviews, the IAEA took steps to more systematically evaluate the needs for technical assistance in areas of nuclear and radiation safety. The outcome was the development of an integrated system designed to more closely assess national priorities and needs for upgrading their infrastructures for radiation and waste safety

  5. The National Security Strategy and National Interests: Quantity or Quality?

    National Research Council Canada - National Science Library

    Mercado, Leo

    2001-01-01

    The national security strategy (NSS), National Security Strategy for a New Century, published in December 1999, categorizes national interests as vital, important, and humanitarian and other interests...

  6. Strengthening health-related rehabilitation services at national levels.

    Science.gov (United States)

    Gutenbrunner, Christoph; Bickenbach, Jerome; Melvin, John; Lains, Jorge; Nugraha, Boya

    2018-04-18

    One of the aims of the World Health Organization's Global Disability Action Plan is to strengthen rehabilitation services. Some countries have requested support to develop (scale-up) rehabilitation services. This paper describes the measures required and how (advisory) missions can support this purpose, with the aim of developing National Disability, Health and Rehabilitation Plans. It is important to clarify the involvement of governments in the mission, to define clear terms of reference, and to use a systematic pathway for situation assessment. Information must be collected regarding policies, health, disability, rehabilitation, social security systems, the need for rehabilitation, and the existing rehabilitation services and workforce. Site visits and stakeholder dialogues must be done. In order to develop a Rehabilitation Service Implementation Framework, existing rehabilitation services, workforce, and models for service implementation and development of rehabilitation professions are described. Governance, political will and a common understanding of disability and rehabilitation are crucial for implementation of the process. The recommendations of the World Report on Disability are used for reporting purposes. This concept is feasible, and leads to concrete recommendations and proposals for projects and a high level of consensus stakeholders.

  7. Strengthening health-related rehabilitation services at national levels

    Directory of Open Access Journals (Sweden)

    Christoph Gutenbrunner

    2017-04-01

    Full Text Available Objective: One of the aims of the World Health Organization’s Global Disability Action Plan is to strengthen rehabilitation services. Some countries have requested support to develop (scale-up rehabilitation services. This paper describes the measures required and how (advisory missions can support this purpose, with the aim of developing National Disability, Health and Rehabilitation Plans. Recommendations: It is important to clarify the involvement of governments in the mission, to define clear terms of reference, and to use a systematic pathway for situation assessment. Information must be collected regarding policies, health, disability, rehabilitation, social security systems, the need for rehabilitation, and the existing rehabilitation services and workforce. Site visits and stakeholder dialogues must be done. In order to develop a Rehabilitation Service Implementation Framework, existing rehabilitation services, workforce, and models for service implementation and development of rehabilitation professions are described. Governance, political will and a common understanding of disability and rehabilitation are crucial for implementation of the process. The recommendations of the World Report on Disability are used for reporting purposes. Conclusion: This concept is feasible, and leads to concrete recommendations and proposals for projects and a high level of consensus stakeholders.

  8. Strengthening the international legal framework for nuclear security: Better sooner rather than later

    International Nuclear Information System (INIS)

    Wetherall, Anthony C.

    2016-01-01

    In this 21. century global environment, the threat of terrorists or other criminals eventually acquiring and using radioactive material for malicious purposes or sabotaging such material or associated facilities, could be calculated as being an inevitable, albeit a preventable catastrophe. Much has been done to address this situation, such as the International Atomic Energy Agency (IAEA) now having a recognised central role in strengthening nuclear security globally. However, concerns still remain regarding the adequacy of the global nuclear security architecture, consisting of legally binding and non-binding instruments, intergovernmental organisations (IGOs), bodies and various initiatives, as well as internationally-accepted guidance and best practices, such as those reflected in the IAEA Nuclear Security Series of publications. Issues arise with respect to the adequacy of the international framework for nuclear security and the level of effective national implementation thereof. Highlighted in this regard, is a lack of universal adherence to the international nuclear security legal instruments, an absence of sustained information sharing (particularly on national implementation) and the non-existence of binding nuclear security standards and mandatory peer review and assessment. This article examines the framework's adequacy, its gaps and weak links, as well as the measures proposed to strengthen it. Part 1 considers some past and recent events, efforts, and developments that have contributed to the current status. Thereafter, the purported gaps and weak links and proposed strengthening measures are identified. While acknowledging progress, it is assumed that some overarching considerations, particularly national sovereignty, secrecy and complacency, continue to restrictively influence and determine the extent of state behaviour. Accordingly, these considerations are also briefly addressed in Part 1. Thereafter, Part 2 provides a concise overview of the current

  9. Strengthening the Security of ESA Ground Data Systems

    Science.gov (United States)

    Flentge, Felix; Eggleston, James; Garcia Mateos, Marc

    2013-08-01

    A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.

  10. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  11. Strengthening Capacity to Respond to Computer Security Incidents ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... in the form of spam, improper access to confidential data and cyber theft. ... These teams are usually known as computer security incident response teams ... regional capacity for preventing and responding to cyber security incidents in Latin ...

  12. Ingenuity and National Security

    Science.gov (United States)

    2013-06-01

    is in an unfamiliar situation as the lone super power without a significant existential threat. China is a rising power and Russia aspires to...independence to the most powerful nation on the planet . The time period surrounding World War II demonstrated that governmental processes and

  13. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...

  14. Rethinking National Security

    Science.gov (United States)

    1990-10-01

    III. ’Proliferation in the 1990m.’ tratomic Rhvii . 17 (Summer 1969): 9-20. 30 McGowan. Pat, and Charles W. Ke.le.. ZuLfMl. weaLpon. mi Foreig L Y...Vayrynen. ads. Militarization #1nd Production . New York: St. Martin’s, 1983. (HC 79 .D4 M54 1983) Twight, Charlotte. *Political Economy of the National

  15. Leadership, Management, and Organization for National Security Space: Report to Congress of the Independent Assessment Panel on the Organization and Management of National Security Space

    National Research Council Canada - National Science Library

    Young, A. T; Anderson, Edward; Bien, Lyle; Fogleman, Ronald R; Hall, Keith; Lyles, Lester; Mark, Hans

    2008-01-01

    The Independent Assessment Panel (IAP) was chartered to review and assess the DoD management and organization of National Security in Space and make appropriate recommendations to strengthen the U.S. position...

  16. Diversity Intersects with National Security.

    Science.gov (United States)

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  17. Strengthening global health security capacity--Vietnam demonstration project, 2013.

    Science.gov (United States)

    Tran, Phu Dac; Vu, Long Ngoc; Nguyen, Hien Tran; Phan, Lan Trong; Lowe, Wayne; McConnell, Michelle S; Iademarco, Michael F; Partridge, Jeffrey M; Kile, James C; Do, Trang; Nadol, Patrick J; Bui, Hien; Vu, Diep; Bond, Kyle; Nelson, David B; Anderson, Lauren; Hunt, Kenneth V; Smith, Nicole; Giannone, Paul; Klena, John; Beauvais, Denise; Becknell, Kristi; Tappero, Jordan W; Dowell, Scott F; Rzeszotarski, Peter; Chu, May; Kinkade, Carl

    2014-01-31

    Over the past decade, Vietnam has successfully responded to global health security (GHS) challenges, including domestic elimination of severe acute respiratory syndrome (SARS) and rapid public health responses to human infections with influenza A(H5N1) virus. However, new threats such as Middle East respiratory syndrome coronavirus (MERS-CoV) and influenza A(H7N9) present continued challenges, reinforcing the need to improve the global capacity to prevent, detect, and respond to public health threats. In June 2012, Vietnam, along with many other nations, obtained a 2-year extension for meeting core surveillance and response requirements of the 2005 International Health Regulations (IHR). During March-September 2013, CDC and the Vietnamese Ministry of Health (MoH) collaborated on a GHS demonstration project to improve public health emergency detection and response capacity. The project aimed to demonstrate, in a short period, that enhancements to Vietnam's health system in surveillance and early detection of and response to diseases and outbreaks could contribute to meeting the IHR core capacities, consistent with the Asia Pacific Strategy for Emerging Diseases. Work focused on enhancements to three interrelated priority areas and included achievements in 1) establishing an emergency operations center (EOC) at the General Department of Preventive Medicine with training of personnel for public health emergency management; 2) improving the nationwide laboratory system, including enhanced testing capability for several priority pathogens (i.e., those in Vietnam most likely to contribute to public health emergencies of international concern); and 3) creating an emergency response information systems platform, including a demonstration of real-time reporting capability. Lessons learned included awareness that integrated functions within the health system for GHS require careful planning, stakeholder buy-in, and intradepartmental and interdepartmental coordination and

  18. 14 CFR 1260.31 - National security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  19. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  20. National Security Space Launch Report

    Science.gov (United States)

    2006-01-01

    Company Clayton Mowry, President, Arianespace Inc., North American—“Launch Solutions” Elon Musk , CEO and CTO, Space Exploration Technologies (SpaceX...technologies to the NASA Exploration Initiative (“…Moon, Mars and Beyond.”).1 EELV Technology Needs The Atlas V and Delta IV vehicles incorporate current... Mars and other destinations.” 46 National Security Space Launch Report Figure 6.1 U.S. Government Liquid Propulsion Rocket Investment, 1991–2005

  1. Strengthening Security during Sporting Events by Unmannde Aerial Vehicles

    NARCIS (Netherlands)

    Evers, L.

    2012-01-01

    This paper shows how Unmanned Aerial Vehicles (UAVs) can improve security in major sporting events. Given the increase in violence among sports fans it is important to timely monitor possible conflict locations. A UAV can patrol and remotely monitor the activity at these locations. Such a patrol

  2. Functional foods as a way of strengthening food security

    Directory of Open Access Journals (Sweden)

    O. G. Stukalo

    2017-01-01

    Full Text Available The solution of the problem of food security in the region plays an important role in providing the population with the necessary food. The article describes ways to achieve food security. Different opinions are presented on the causes of the problem of food security, in particular the spread of genetically modified organisms, as well as low incomes of the population, the volatility of food prices and insignificant reproduction opportunities. The analysis of production and consumption of various food products in the Russian Federation (RF in recent years has been carried out. Dynamics of consumption of the main types of food in the Voronezh region is also presented. An analysis has been made of the production and consumption of various food products in the Russian Federation (RF in recent years. Dynamics of consumption of the main types of food in the Voronezh region is also presented. A solution to the problem of food security with flour culinary products using non-traditional plant raw materials, also used as functional food products, was proposed. Examples are given of improving the quality of food products and increasing the content of dietary fiber and other useful nutrients, thanks to the use of secondary raw materials, bugs and processed products of plant origin. The food security of the region has only conditional territorial localization, since the economic relations that arise between the subjects of the food sector cover all subjects of the regional economy without exception. A special role in these relations in the conditions that have developed up to now is played by organizations related to the sphere of food production, as well as organizations that supply them with the most scarce and significant resources, i.e. organization of education, research and development. That is why, we believe that the main emphasis in the study of food security should be made on the specifics of the functioning of industrial organizations occupying a

  3. Strengthening Dairy Cooperative through National Development of Livestock Region

    Directory of Open Access Journals (Sweden)

    Priyono

    2016-02-01

    Full Text Available Establishment of dairy cattle development region needs to be conducted in accordance with the national dairy industry development plan. Dairy cattle regions have been designed and equipped with infrastructure supplies, supporting facilities, technologies, finance, processing, marketing, institutional and human resources. Dairy cooperative is one of the marketing channels of milk and milk products which have strategic roles to support the national dairy industry. Collaborations between dairy cooperatives and smallholder farmers within a district region have to be done based on agricultural ecosystems, agribusiness system, integrated farming and participatory approach. This may improve dairy cooperatives as an independent and competitive institution. Strengthening dairy cooperatives in national region dairy cattle was carried out through institutional inventory and dairy cooperatives performance; requirement of capital access, market and networks as well as education and managerial training; certification and accreditation feasibility analysis and information and technology utilization. Establishment of emerging dairy cooperatives towards small and micro enterprises is carried out by directing them to establish cooperatives which have legal certainty and business development opportunities. The impact of strengthening dairy cooperative may support dairy cattle development through increase population and milk production. Sustainable dairy cattle development needs to be supported by regional and national government policies.

  4. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  5. 10 CFR 602.16 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  6. 10 CFR 605.18 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  7. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  8. Strengthening DoD Cyber Security with the Vulnerability Market

    Science.gov (United States)

    2014-01-01

    50,000 – $100,000 Windows $60,000 – $120,000 Firefox or Safari $60,000 – $150,000 Chrome or Internet Explorer $80,000 – $200,000 iOS $100,000...the CTB metric for the Google Chrome OS at $110,000. Accordingly, this metric could be used by Google to compare its security to other operating...Mozilla Foundation. (n.d.). Mozilla. Retrieved from https://www.mozilla. org/en-US/foundation/ Thomson, I. (2013, March 8). Pwn2Own: IE10, Firefox

  9. Hot spots, weak links: Strengthening nuclear security in a changing world

    International Nuclear Information System (INIS)

    Taniguchi, Tomihiro; Nilsson, Anita

    2004-01-01

    Protection against nuclear terrorism is one of the critical issues facing the international community today. New and challenging security dimensions must be met. During the Cold War, the main international security concern was the fear of a nuclear war and the spread of nuclear weapons. The post-Cold War era presented new security challenges, which recognized the need to strengthen the international regime of physical protection of nuclear materials. In the post-9/11 period, threat perceptions include the potential terrorist use of an improvised nuclear explosive device, the use of a radiological dispersal device (RDD) and attacks against nuclear facilities, i.e. sabotage. These threats point to the need for an overall strengthening of the global nuclear security regime with attention to 'weak links' that may offer soft targets for terrorists or criminals. This article discusses some of the basic concepts and developments in the field of nuclear security; the legacy of the Cold War and the rise of new challenges to the global nuclear security agenda in the post-Cold War and post-9/11 periods; and efforts of the IAEA to strengthen the global nuclear security regime. The IAEA is filling an important and expanding role, yet more measures are needed

  10. Strengthening Sovereignty: Security and Sustainability in an Era of Climate Change

    Directory of Open Access Journals (Sweden)

    Rymn J. Parsons

    2011-08-01

    Full Text Available Using Pakistan and the Arctic as examples, this article examines security challenges arising from climate change. Pakistan is in crisis, and climate change, a transnational phenomenon perhaps better characterized as radical enviro-transformation, is an important reason. Its survival as a state may depend to great extent on how it responds to 2010’s devastating floods. In the Arctic, the ice cap is melting faster than predicted, as temperatures there rise faster than in almost any other region. Unmanaged, a complex interplay of climate-related conditions, including large-scale “ecomigration”, may turn resource competition into resource conflict. Radical enviro-transformation has repeatedly overborne the resilience of societies. War is not an inevitable by-product of such transformation, but in the 21st Century climate-related instability, from resource scarcity and “ecomigration”, will likely create increasingly undesirable conditions of insecurity. Weak and failing states are one of today’s greatest security challenges. The pace of radical enviro-transformation, unprecedented in human history, is accelerating, especially in the Arctic, where a new, open, rich, and accessible maritime environment is coming into being. The international community must work together to enhance security and stability, promote sustainability, and strengthen sovereignty. Radical enviro-transformation provides ample reason and plentiful opportunity for preventative, collaborative solutions focused broadly on adaptation to climate change, most particularly the effects of “ecomigration”. Nations must work together across the whole of government and with all instruments of national power to create conditions for human transformation—social, political, and economic—to occur stably and sustainably, so as to avoid or lessen the prospects for and consequences of conflict. Collaborative international solutions to environmental issues, i.e., solutions that

  11. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  12. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  13. Strengthening Safety Culture as an Overriding Priority, in Achieving Global Nuclear Security Approach

    International Nuclear Information System (INIS)

    Kolundzija, V.

    2006-01-01

    In the IAEA glossary safety culture is defined as the assembly of characteristics and attitudes in organizations and individuals, which establishes that, as an overriding priority, protection and safety issues receive the attention warranted by their significance. It has been observed that a safety culture, as a part of both security and safety, possesses a few obstacles that should be noticed: safety culture cannot be directly regulated; variation in national cultures means that what constitutes as a good approach to enhancing safety culture in one country may not be the best approach in another. Three stages have been identified in developing and strengthening safety culture: 1 A technical issue (rules and regulations)/ first stage 2 Good safety performance (primarily in terms of safety targets or goals)/ second stage 3 A continuing process of improvement to which everyone can contribute/ third stage There are several key issues in safety culture, such as: a commitment, use of procedures, a conservative decision making (STAR) a reporting culture. Organizations and individuals should have attention on these. Overall common goals are to achieve and maintain a high level of safety and security of radioactive sources as well as facilities. Measures that are concerned on safeguards restrict access to the radioactive sources, conditioning and/or recycling of sources, and systems for detection the passage of the radioactive sources at strategic points, have gained main support. The main partners in implementation these measures are: IAEA, USA, Russian Federation, G8- Global Partnership, and European Union The member states of the IAEA have at their disposal internationally agreed standards. Current differences in applying standards in the IAEA member states are mainly related to state preparedness to cope with demands. Developing and less developed countries with small and medium nuclear programmes have difficulties to accept rules and regulations, to establish

  14. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  15. Theoreticalaspects ofinformation war and national security

    Directory of Open Access Journals (Sweden)

    A. V. Shumka

    2015-07-01

    Organization of effective ensuring information security system provides centralized control of specific functions that provide monitoring and control of all components of the national information space.

  16. Economics and Security: Resourcing National Priorities

    Science.gov (United States)

    2010-05-21

    Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu Report Documentation Page Form ApprovedOMB No...2010 William B. Ruger Chair of National Security Economics Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu

  17. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-02-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0002] President's National Security... National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, February 21, 2013... matters related to national security and emergency preparedness telecommunications policy. Agenda: The...

  18. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  19. The National Security Council: An Organizational Assessment

    National Research Council Canada - National Science Library

    Best Jr, Richard A

    2009-01-01

    The National Security Council (NSC) was established by statute in 1947 to create an interdepartmental body to advise the President with respect to the integration of domestic, foreign, and military policies relating to the national...

  20. NATIONAL SECURITY AND THE CONSTITUTIONAL RIGHT TO ...

    African Journals Online (AJOL)

    Such conduct has sacrificed the country's national security at the altar of soldiers' ..... may one day intervene directly or indirectly in politics of the country thereby .... Because this matter does not affect the National Council of Provinces or.

  1. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  2. Strengthening biosecurity in Iraq: Development of a national biorisk management system

    Directory of Open Access Journals (Sweden)

    Gregory D Koblentz

    2016-02-01

    Full Text Available Since 2004, the Republic of Iraq has undertaken a concerted effort to comply with all of its international obligations to prevent the proliferation of chemical, biological, radiological, and nuclear (CBRN weapons. A centerpiece of this effort is Iraq’s development of a national biorisk management system to prevent, prepare for, and respond to naturally occurring and deliberate biological threats. The Iraqi National Monitoring Authority (INMA, which is responsible for CBRN security and nonproliferation in Iraq, has played a key role in establishing this system. This article provides an overview of Iraq’s international nonproliferation commitments, describes the legal and organizational steps it has taken to implement these commitments, and examines current initiatives to strengthen Iraq’s biosecurity.

  3. 76 FR 40296 - Declassification of National Security Information

    Science.gov (United States)

    2011-07-08

    ... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security Information...

  4. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  5. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  6. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  7. Japan's National Security: Structures, norms, and policies

    International Nuclear Information System (INIS)

    Katzenstein, P.J.; Okawara, N.

    1993-01-01

    Japan's national security policy has two distinctive aspects that deserve analysis. First, Japan's definition of national security goes far beyond traditional military notions. National security is viewed in comprehensive terms that also include economic and political dimensions. The second feature of Japan's security policy worth explanation is a distinctive mixture of flexibility and rigidity in the process of policy adaptation to change: flexibility on issues of economic security, rigidity on issues of military security, and flexibility combined with rigidity on issues of political security. With the end of the Cold War and changes in the structure of the international system, it is only natural that we ask whether and how Japan's national security policy will change as well. Optimists insist that the Asian balance of power and the US-Japan relationship will make Japan aspire to be a competitive, noninterventionist trading state that heeds the universal interest of peace and profit rather than narrow aspirations for national power. Pessimists warn us instead that the new international system will finally confirm Herman Kahn's prediction of 1970: Japan will quickly change to the status of a nuclear superpower, spurred perhaps by what some see as a dangerous rise of Japanese militarism in the 1970s and 1980s

  8. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    Science.gov (United States)

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  9. Liberia: National Security Interests in Transformational Development

    National Research Council Canada - National Science Library

    Coleman, Carolyn I

    2008-01-01

    Liberia is of national security interest to the United States of America. Liberia's 14-year civil war ended in 2003, leaving the country with a collapsed government and failing economic, physical, and social infrastructures...

  10. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  11. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  12. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  13. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  14. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...

  15. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  16. A Call for National Security System Transformation

    Science.gov (United States)

    2012-06-01

    Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Fox News Corporation. “Last American Troops Leave Iraq...by Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Stewart, Douglas. “Constructing the Iron Cage: The...1947 National Security Act.” In Affairs of State: The Interagency and National Security. Edited by Gabriel Marcella . Carlisle, PA: Strategic

  17. 31 CFR 500.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  18. 31 CFR 515.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  19. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... the objectives of Executive Order 13526, Classified National Security Information. The rule allows... signed Executive Order 13526, Classified National Security Information, which was published in the...

  20. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  1. Los Alamos National Lab: National Security Science

    Science.gov (United States)

    SKIP TO PAGE CONTENT Los Alamos National Laboratory Delivering science and technology to protect Museum New Hires Publications Research Library Mission Science & Innovation Science & Innovation Facilities Science Pillars Research Library Science Briefs Science News Lab Organizations Science Programs

  2. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  3. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  4. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  5. Strengthening the safety and security of radioactive sources worldwide: a perspective on Philippine contributions

    International Nuclear Information System (INIS)

    Murray, Allan

    2009-01-01

    Radioactive sources have been used for many decades in a wide variety of applications in all countries. The safety of radioactive sources and the associated radiation protection have been implemented by national and international programs during this time with cooperation through the IAEA intended to achieve application of minimum standards and harmonization of approach. The security of radioactive sources is however relatively new consideration. A perspective on the Philippine contributions to the safety and security of radioactive sources will be provided with reference to the following: What is radioactive source security and why it is important?; International cooperation, including the IAEA Code of Conduct; Regulation for radioactive source security; Implementation of radioactive source security measures for licenses, operators and others; Impact of regulatory and operational matters such as professional development and training, emergency preparedness and response, and radiation protection. (author)

  6. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    Science.gov (United States)

    2013-05-24

    Secretary of Homeland Security also has the responsibility for establishing International Security Cooperation with the countries of Canada and Mexico ...and goals”84 to improve its culture and morale issues. However, further study is required to determine ways to: de -conflict the overlap of...National Preparedness Description is one of the requirements for Presidental Policy Directive-8. 55 the Joint Staff integrates internal and external

  7. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  8. Promoting Agricultural Research and Development to Strengthen Food Security in South Asia

    Directory of Open Access Journals (Sweden)

    Ghose Bishwajit

    2014-01-01

    Full Text Available This study aims to highlight the status of agricultural R&D in South Asia and contends that creating an effective agricultural research and innovation systems is a vital element to ensure food security in this region. South Asia is home to around one-fourth of mankind and houses the largest proportion of undernourished people in the world. Despite a period of marked economic growth averaging 6% a year over the past two decades, it remains the world's second poorest region contributing a mere 2.2% in global annual GDP. Agriculture is the mainstay of South Asian economy employing around 60% of the total workforce and generating around 20% of total GDP. South Asia has the recognition of being the second most food-insecure region next only to sub-Saharan Africa. Though there is growing evidence that technological innovation has a key role to play in increasing agricultural production and strengthening food security, agricultural research and development (R&D sector has failed to garner sufficient attention till now. This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.

  9. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  10. Security Implications Of Italian Nationalism

    Science.gov (United States)

    2016-03-01

    www.economist.com/news/europe/21635792-beppe-grillo-says-he-tired-and-his-movement-tired-his- autocratic - leadership -falling-star. 114 “Italy’s Five Star Movement...and-his-movement-tired-his- autocratic - leadership -falling-star. ———. “Salve Salvini: The Northern League Could Overtake Forza Italia as Italy’s Right...their passionate and flamboyant style , yet there are many more layers underlying the national character. Regional divides within the nation are distinct

  11. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  12. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  13. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2010-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  14. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  15. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  16. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities exchange...

  17. The Inevitability of Strengthening the Nation-Building Subjectivity of Ethnic and National Groups

    Directory of Open Access Journals (Sweden)

    Dr.sc. Harun Hadzic

    2013-12-01

    Full Text Available This paper presents a very courageous, scientifically founded prediction, concerning the imminent and inevitable process of strengthening  the political and nation-building subjectivity of national minorities and ethnic groups, i.e., minority indigenous people. For, a more lasting peace and stability, for which we want to dominate in Europe and the world, can only be achieved by deflection of the discontent of these nationalities, on one hand, and strengthening of the public recognition of their international legal subjectivity, on the other hand. This implies the exercise of their right to self-determination and the creation of independent autonomies, regions or countries, which also implies reclassification and conversion of the internal, but also of the interstate borders. These new limits must be established precisely in those parts of the world where there is a political struggle, and a long-time demand of these organized groups, which would, in effect, mean that the international community should accept their demand for creation of new states, or, at least, another, lower, level of independence.

  18. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership status of any of...

  19. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  20. Alternate Energy for National Security.

    Science.gov (United States)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  1. 76 FR 80205 - Instituting a National Action Plan On Women, Peace, And Security

    Science.gov (United States)

    2011-12-23

    ... strengthen its efforts to prevent--and protect women and children from--harm, exploitation, discrimination... systems through the integration of gender perspectives, and invest in women and girls' health, education... Instituting a National Action Plan On Women, Peace, And Security By the authority vested in me as President by...

  2. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  3. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  4. The Internal Aspects of Ukrainian National Security

    National Research Council Canada - National Science Library

    Bazhenov, Igor

    1997-01-01

    .... Poor economic conditions, organized crime, high levels of corruption within the government, and an irresponsible parliament are the primary causes of instability in Ukraine. Resolution of these issues is vital to Ukrainian National Security as well as the continuation of Ukrainian independence.

  5. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-07-26

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. [[Page 45256... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Tuesday, August 20... related to national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The...

  6. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-01-25

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will be open to the... implementing national security and emergency preparedness telecommunications policy. Notice of this meeting is...

  7. Transboundary natural area protection: Broadening the definition of national security

    Science.gov (United States)

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  8. MEMS and MOEMS for national security applications

    Science.gov (United States)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  9. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  10. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  11. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  12. Scientific Openness and National Security at the National Laboratories

    Science.gov (United States)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  13. 40 CFR 1042.635 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption for...

  14. 40 CFR 85.1708 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  15. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  16. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  17. Selecting RMF Controls for National Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Witzke, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  18. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  19. Wildlife on the Nevada National Security Site

    Science.gov (United States)

    Longshore, Kathleen M.; Wessells, Stephen M.

    2017-09-05

    Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.

  20. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  1. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  2. Theoreticalaspects ofinformation war and national security

    OpenAIRE

    A. V. Shumka; P. H. Chernyk

    2015-01-01

    A wide and comprehensive analysis of methods of conducting information war to create an effective mechanism of counteraction has extremely important significance. Information warfare ­ acts committed to achieve information superiority in support of national military strategy due to the impact of information and information systems enemy while ensuring the security of its own information and information systems. Today the term «information war» is used in two areas: in the broadest sense ­ ...

  3. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  4. Seismic strengthening of building 111 at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    Eli, M.; Coats, D.; Freeland, G.; Kamath, M.

    1991-01-01

    Since being designed and constructed in the late 1960s, the Director's Building (Building 111) at Lawrence Livermore National Laboratory (LLNL) has been evaluated for 1988 seismic criteria and has been upgraded to withstand a major earthquake in the Livermore area. During and immediately after a large earthquake in the Livermore area, Building 111 occupants would be able to exit safely without loss of life. Building 111 itself would be severely damaged, but would not collapse. Highlights of the seismic upgrade design criteria and of the design, analyses, and construction that resulted are presented in this paper

  5. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  6. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  7. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  8. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2012-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  9. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2013-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: DOE hazardous and non-hazardous non-radioactive classified waste; DOE low-level radioactive waste (LLW); DOE mixed low-level waste (MLLW); and, U.S. Department of Defense (DOD) classified waste. The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  10. THE STRENGTHENING OF NATIONALISM AMONG THE PEOPLE OF PAPUA, INDONESIA

    Directory of Open Access Journals (Sweden)

    Bernada Meterai

    2015-07-01

    Full Text Available This study is the phenomenon of "problem Indonesian Papuans" often questionable when the "conflict-torn Papua." LIPI in 2007 questioned why it's been 62 years of independent Indonesia, Papua Indonesia nationalism began to be questioned again. We all know that Papua is the province of the very rich natural resources, beautiful panoramic views both on land and at sea to original culture from a number of ethnic groups. the Papua origin ball players like Boaz Salosa, Patrik Wanggai, Ferdinando Pahabol and Riki Kayame continued fighting defend their self-esteem as a nation of Indonesia in the field that when dealing with other countries. However, when the conflict in Papua occurred, appeared a wide pernyataantentang of Papua New Guinea such as: dark, human resources is relatively low, people are still poor and primitive, and the flag frequently offered up morning, arcane, the shooting of human rights violations, the referendum and the independence of the territory of a unitary State the Republic of Indonesia

  11. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-12-29

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1005] National Maritime Security Advisory...

  12. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-07-02

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0586] National Maritime Security Advisory...

  13. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  14. Strengthening the European Union Climate and Energy Package. To build a low carbon, competitive and energy secure European Union

    International Nuclear Information System (INIS)

    Guerin, E.; Spencer, Th.

    2011-01-01

    As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy

  15. National viewpoints: Views on strengthened safeguards from Australia, Cuba and South Africa

    International Nuclear Information System (INIS)

    Biggs, I.; Saburido, E.F.; Mxakato-Diseko, N.J.

    1999-01-01

    This paper presents views of Australia, Cuba and South Africa concerned with strengthened safeguards regime. Australia has been involved with the IAEA safeguards system since the first plenary meeting of the Conference on the IAEA Statute in 1956, joined the NPT in 1973 and began concluding bilateral safeguards agreements in 1977. Australia has the greatest respect for the IAEA coordinated efforts started in 1998 to strengthen and integrate the safeguards system. Cuba has always attached special importance to nuclear safeguards activities, recognizing their high priority as well as the important role they have in respect to international disarmament and security. South Africa supports the efforts in strengthening the safeguards activities and remains hopeful that the international community will address the challenges posed by the Trilateral Initiative between Russian federation, USA and IAEA in a mature and cooperative way

  16. National Security and the Right to Information in Europe

    DEFF Research Database (Denmark)

    Jacobsen, Amanda Lynn

    2013-01-01

    Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/......Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/...

  17. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-12-19

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... Security Telecommunications Advisory Committee (NSTAC) will meet on Friday, January 11, 2013, via... related to national security and emergency preparedness telecommunications policy. Agenda: The NSTAC...

  18. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...

  19. CNSS: Interagency Partnering to Protect Our National Security Systems

    National Research Council Canada - National Science Library

    Grimes, John G

    2008-01-01

    .... The CNSS performs the vital function of mobilizing the full, interagency National Security Community for the protection of telecommunications and information systems that support U.S. national security...

  20. Strengthening the safety of radiation sources and the security of radioactive materials: Timely action

    International Nuclear Information System (INIS)

    Gonzalez, A.J.

    1999-01-01

    When used as they should be, commercial radiation sources and radioactive materials are useful tools that pose no unacceptable risks to people or environment. In fact, their applications in fields such as medicine, industry, agriculture, and environmental research help countries to achieve sizeable social and economic benefits important to global goals of sustainable development. For most of the past half century, the IAEA has been instrumental in advancing the application of techniques that constructively make use of ionizing radiation properties, particularly in developing countries. But though global standards are in place, and being strengthened, a disturbing picture is emerging. It is regrettably framed by tragic consequences from accidents that involved unsafe, abandoned, lost, or uncontrolled radiation sources, including illicit trafficking of radioactive materials, notably in the 1990s. A turning point in global awareness of serious problems came in 1998, at an international conference in France. In March 1999, the IAEA Board of Governors discussed the issue, and a multi faced Action Plan is being submitted to the general Conference. This edition of IAEA Bulletin looks closely at the problems and issues the international community is facing, and the steps States are taking to reinforce the safety and security of radioactive materials

  1. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...-2011-0268] RIN 3150-AJ07 Facility Security Clearance and Safeguarding of National Security Information..., Classified National Security Information. The rule would allow licensees flexibility in determining the means... licensee security education and training programs and enhances the protection of classified information...

  2. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-11-19

    ... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... Executive Order 13526, Classified National Security Information. In addition, this direct final rule allowed... licensees (or their designees) to conduct classified [[Page 69287

  3. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  4. 48 CFR 6.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...

  5. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  6. 39 CFR 267.5 - National Security Information.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as the...

  7. 28 CFR 501.2 - National security cases.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is a...

  8. 40 CFR 90.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  9. 40 CFR 92.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must be...

  10. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  11. 40 CFR 91.1008 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  12. 3 CFR 101.4 - National Security Council.

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI. ...

  13. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  14. 10 CFR 871.1 - National security exemption.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security...

  15. 40 CFR 211.110-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency...

  16. 40 CFR 94.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary. (2...

  17. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  18. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  19. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  20. 36 CFR 1256.46 - National security-classified information.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National Security...

  1. 48 CFR 204.470-2 - National security exclusion.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...

  2. 40 CFR 204.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  3. 40 CFR 89.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  4. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  5. Data security on the national fusion grid

    International Nuclear Information System (INIS)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  6. Data security on the national fusion grid

    Energy Technology Data Exchange (ETDEWEB)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  7. Empowering Smallholder Farmers in Markets: strengthening the advocacy capacities of national farmer organisations through collaborative research

    NARCIS (Netherlands)

    Ton, G.; Grip, de K.; Lançon, F.; Onumah, G.; Proctor, F.J.

    2014-01-01

    The Empowering Smallholder Farmers in Markets programme (ESFIM) supported the advocacy capacities of national farmer organisations (NFOs) for improving smallholder market access. The programme gave NFOs in 11 countries the opportunity to contract local experts to strengthen the evidence-base of

  8. US National Security Strategy and preemption

    International Nuclear Information System (INIS)

    Kristensen, H.M.

    2006-01-01

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  9. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  10. Security Economics and Critical National Infrastructure

    Science.gov (United States)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  11. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  12. Overview of Scientific Freedom and National Security

    Science.gov (United States)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  13. 29 CFR 1606.3 - The national security exception.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the national...

  14. Extreme Scale Computing to Secure the Nation

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the

  15. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...

  16. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    ethnicity in favour of social stability as a pre-requisite for security. ... Humanities, National Identity, Ethnicity, Security and Political. Stability. .... instability. They are often used in open violence during elections where contending political ...

  17. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  18. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  19. Nevada National Security Site Radiological Control Manual

    International Nuclear Information System (INIS)

    2012-01-01

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  20. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  1. Strengthening systems for integrated early childhood development services: a cross-national analysis of governance.

    Science.gov (United States)

    Britto, Pia Rebello; Yoshikawa, Hirokazu; van Ravens, Jan; Ponguta, Liliana Angelica; Reyes, Maria; Oh, Soojin; Dimaya, Roland; Nieto, Ana María; Seder, Richard

    2014-01-01

    While there has been substantial growth in early childhood development (ECD) services in low- and middle-income countries (LMICs), there is considerable inequity in their distribution and quality. Evidence-based governance strategies are necessary, but currently they are insufficient for widespread, quality implementation. In particular, there is a limited understanding of the use of systems approaches for the analysis of ECD services as they go to scale. The aim of this paper is to present findings from four countries, using a cross-national case study approach to explore governance mechanisms required to strengthen national systems of ECD services. While different sets of governance strategies and challenges were identified in each country, overarching themes also emerged with implications for systems strengthening. Study results focus on local, mid-level and central governance, with recommendations for effective coordination and the integration of ECD services in LMICs. © 2014 New York Academy of Sciences.

  2. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  3. Neuroscience, ethics, and national security: the state of the art.

    Directory of Open Access Journals (Sweden)

    Michael N Tennison

    Full Text Available National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  4. Neuroscience, ethics, and national security: the state of the art.

    Science.gov (United States)

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  5. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  6. Guns, guards, gates and geeks: Romania strengthens computer security at nuclear installations

    International Nuclear Information System (INIS)

    Gil, Laura

    2016-01-01

    A cyberattack could swipe all the information stored on your computer or even prevent it from working. That’s bad enough. But a cyberattack on a nuclear power plant could lead to sabotage or theft of nuclear material. Computer security, concerned with the protection of digital data and the defence of systems and networks against malicious acts, is a critical component of nuclear security. “The advance of computers and their use in all aspects of nuclear operations has changed the security paradigm,” said Donald Dudenhoeffer, Information Technology Security Officer at the IAEA. “Information and computer security must be considered as components in the overall nuclear security plan.”

  7. INFORMATION SECURITY: Strengthened Management Needed to Protect Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dodaro, Gene

    1998-01-01

    .... Our most recent report, done at the request of this Committee, delineates the serious information security weaknesses placing critical operations and assets at risk and outlines actions needed...

  8. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  9. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  10. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  11. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  12. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  13. Economics and National Security: The Case of China

    National Research Council Canada - National Science Library

    Hughes, Edward

    2001-01-01

    The purpose of the conference was to explore the national security dimensions of the U.S. - China economic relationship and identify possible roles for the economic element of national power in formulating policy options...

  14. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  15. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  16. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  17. National Security Imperatives and the Neorealist State: Iran and Realpolitik

    National Research Council Canada - National Science Library

    Grogan, Michael

    2000-01-01

    .... Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for spreading its brand of Islamic revolution abroad...

  18. Pakistan’s national Centre of Excellence contributes to sustaining nuclear security

    International Nuclear Information System (INIS)

    Dixit, Aabha

    2016-01-01

    Pakistani front line officers and first responders are in a better position to fight illicit trafficking in nuclear and other radioactive materials, as well as to use advanced radiation detection and monitoring equipment, thanks to training they have received at the country’s Centre of Excellence for Nuclear Security. This is just one of the benefits the country has reaped from the Centre, which is collaborating with the growing International Network for Nuclear Security Training and Support Centres (NSSC Network), building national capacity through training and strengthening technical and scientific support programmes. Since the establishment of the Centre of Excellence, Pakistan has organized training courses on nuclear security for personnel from national and regional organizations. The Centre of Excellence also offers technical support to personnel involved in the maintenance and upgrade of facilities, with a focus on enhancing technical and scientific skills and quality control of equipment.

  19. Nuclear power and national energy security

    International Nuclear Information System (INIS)

    Addae, A.K.

    2001-01-01

    The demand for energy in Ghana is expected to grow rapidly in the next couple of decades if the objectives of the Vision 2020 Programme are to become a reality. In particular, the demand for electric power is expected to increase 3 to 5 fold over 1997 levels by the year 2020.This calls for early planning. Adequate and dependable central station electric power supplies in the next couple of decades is therefore very critical to sustainable development and the achievement of the objective of the Vision 2020 Programme. Curtailment in electric power supplies cause disruption in economic activities and consequent economic losses. The recent cases in point are the 1983/84 and 1997/1998 power curtailments in Ghana due to low water levels in the Akosombo Reservoir. These led not only to substantial disruptions in economic activities but also to the erosion of invest confidence in the economy. It is, therefore, very essential that the country's central station electric power supply system should not continue to depend on hydro-electric power as in the past years but should be based on a mix of energy sources to provide an acceptable level of national energy security under all circumstances

  20. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  1. The Factor of Food in Biopolitics and National Security

    Directory of Open Access Journals (Sweden)

    Sergey A. Kravchenko

    2014-01-01

    Full Text Available The paper examines the role of food factor in the liberal biopolitics from its birth to the present day. According to the author, the consequences of this policy of food administration are ambivalent in character. On the one hand, there are real gains in mass production of food, its delivery to the consumer, medical supervision of the implementation of its quality. However, on the other hand, the basic principles of this biopolitics - scientism, formal rationalism, pragmatism and commercialism have not allowed to solve the problems of social inequality in the access to healthy food and of illuminating the hunger. In the end of the last century the liberal biopolitics acquired globo-networked and neo-liberal character but the corresponding transition from the national to the global scale administration of food production only intensified risks and challenges of modern human nutrition. In a number of countries including Russia there appeared the problems of food security. The adopted national programs to address these challenges in a "world risk society" (U. Beck will not solve them without fully understanding and practical implementation of the principle of the indivisibility of food security for all peoples of the world and implementation of the global food security. To achieve this, the author believes, it is necessary to abandon the "repair" of the current neo-liberal wing of biopolitics and its pragmatic and mercantilist approaches to human nutrition and pass over to a humanistic biopolitics. There offered a concrete roadmap motion to it, in particular, intending to strengthen the natural sciences and engineering for the production of food with the theoretical instruments of social sciences and humanities; to replace the outdated positivistic, scientistic postulate «knowledge - power" with the formula of ethical, humanistically oriented responsibility of scientists: "the integral knowledge of all sciences - quality food for the health of all

  2. RUSSIA'S ECONOMIC SECURITY: THREATS TO NATIONAL INTERESTS AND THEIR REFLECTION

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2014-01-01

    Full Text Available The relevance of this study due to the fact that at the present time the situation inRussiais complemented by the negative consequences of market reforms in the economy. According to statistical studies in the country with infl ation of about 10% per year among the total population of more than 20% of people with incomes below the subsistence minimum, and the income gap between the highest-income populations and low-income groups more than 12 times. The inequitable distribution of material and spiritual wealth, unemployment (over 9%, ignoring the legitimate rights and interests of a particular person and their direct violation, corruption, alcoholism, drug addiction largely led to the reproduction of aggression, violence in the country. The recession has limited the ability of the material support of the institutions of culture, education, health. The majority of the population is a feeling of uncertainty, future uncertainty, anxiety, loss of landmarks.Objectives The purpose of this work is the identifi cation and characterization of threats to economic security of theRussian Federationat the present time, and to develop recommendations for the prevention of threats to the national interests ofRussia.Method’s. The methodological basis of this article was legal, comparative and economic-statistical methods of analysis. Results. In the framework of the submitted article, the authors found that threats to the economic security ofRussiaare potential dangers that can occur when inept and ineffi cient use of economic resources ofRussiaon the domestic and foreign markets. Major threats to the economic security of theRussian Federationare: bankruptcy, weak absorption lines; corruption; threats to small business development; investment crisis, the massive outfl ow of capital; the crisis in the social sphere; food addiction; the crisis of industrial policy, as well as strengthening the role and place of TNCs.Conclusions and Relevance. The practical

  3. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the arti...

  4. Strengthening the role of Community Health Representatives in the Navajo Nation

    Directory of Open Access Journals (Sweden)

    Caroline King

    2017-04-01

    Full Text Available Abstract Background Strengthening Community Health Worker systems has been recognized to improve access to chronic disease prevention and management efforts in low-resource communities. The Community Outreach and Patient Empowerment (COPE Program is a Native non-profit organization with formal partnerships with both the Navajo Nation Community Health Representative (CHR Program and the clinical facilities serving the Navajo Nation. COPE works to better integrate CHRs into the local health care system through training, strengthening care coordination, and a standardized culturally appropriate suite of health promotion materials for CHRs to deliver to high-risk individuals in their homes. Methods The objective of this mixed methods, cross sectional evaluation of a longitudinal cohort study was to explore how the COPE Program has effected CHR teams over the past 6 years. COPE staff surveyed CHRs in concurrent years (2014 and 2015 about their perceptions of and experience working with COPE, including potential effects COPE may have had on communication among patients, CHRs, and hospital-based providers. COPE staff also conducted focus groups with all eight Navajo Nation CHR teams. Results CHRs and other stakeholders who viewed our results agree that COPE has improved clinic-community linkages, primarily through strengthened collaborations between Public Health Nurses and CHRs, and access to the Electronic Health Records. CHRs perceived that COPE’s programmatic support has strengthened their validity and reputation with providers and clients, and has enhanced their ability to positively effect health outcomes among their clients. CHRs report an improved ability to deliver health coaching to their clients. Survey results show that 80.2% of CHRs feel strongly positive that COPE trainings are useful, while 44.6% of CHRs felt that communication and teamwork had improved because of COPE. Conclusions These findings suggest that CHRs have experienced

  5. Strengthening Africa's capacity to design and implement strategies for food and nutrition security

    OpenAIRE

    Babu, Suresh Chandra; Rhoe, Valerie; Temu, Andrew; Hendriks, Sheryl

    2004-01-01

    "Among the capacity-strengthening challenges the region faces are inadequate in-country capacity, institutional weaknesses, lack of multidisciplinary approaches to problem solving, expatriates' limited incountry experience, poor governance, and failure to monitor the sustainability of development efforts and to plan for future capacity generation....The current gaps in capacity are known, but as political, environmental, technical, and social contexts change, new needs will arise. Therefore, ...

  6. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  7. More work to do: a pathway for future progress on strengthening nuclear security

    NARCIS (Netherlands)

    Herbach, J.; Pitts-Kiefer, S.

    2015-01-01

    With the nuclear security summit process winding down but much work remaining, it is vital to initiate a process by which states can continue and expand on the substantial progress that already has been made.

  8. Report: EPA Needs to Strengthen Financial Database Security Oversight and Monitor Compliance

    Science.gov (United States)

    Report #2007-P-00017, March 29, 2007. Weaknesses in how EPA offices monitor databases for known security vulnerabilities, communicate the status of critical system patches, and monitor the access to database administrator accounts and privileges.

  9. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  10. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  11. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  12. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  13. National security through the preservation and development of cultural sphere

    Directory of Open Access Journals (Sweden)

    Malakshinova N.Sh.

    2016-10-01

    Full Text Available matters of national security in the context of the inextricable interrelationship and interdependence of national security and socio-economic development are presented in the article. The particular attention is paid to the legislative consolidation of security categories, the system of national security elements, and changes in the domestic legislation updates. Therefore, safety, a list of national interests, highlighted by long-term perspective, and questions about the means of implementation of strategic national priorities, including the named culture as a sphere of life are very important. Sphere of culture as a national priority and an important factor in the quality of life growth and harmonization of public relations, collateral dynamic socio-economic development and the preservation of a common cultural space and sovereignty of Russia are studied more detailed.

  14. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  15. A deeper look at climate change and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  16. The Security Impact of Oil Nationalization: Alternate Futures Scenarios

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2010-01-01

    Full Text Available This article highlights the security impact of oil nationalization, develops and analyzes four energy security scenarios, and suggests options to reduce the potential negative impact of oil nationalization. In addition to the use of oil as a weapon, nationalization of oil can also lead to competition for scarce resources among states, facilitate the funding of terrorists or insurgents, contribute to destabilizing regional arms races, influence intra-state conflict, and sustain antagonistic political agendas.

  17. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  18. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1993-01-01

    The three notions, disarmament, national security and interdependence, which are well known, need a new reading in the today's mission for the United Nations, to facilitate the democratic, evolutionary renewal of the the interdependent world, in which disarmament could play an important role without putting at risk national security, which is of primary concern for the majority of Member States. The recognition of the unity of the wold and its interdependence is the main focal point in the process of transition of the international community to the new world system of peace, cooperation and security based on United Nations Charter. This system was outlined at the Forty-fourth session of the General Assembly, and adopted by Member States as a resolution entitled 'Enhancing international peace, security and international cooperation in all its aspects in accordance with the Charter of United Nations'

  19. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and registered national securities associations of changes in the membership status of any of their members...

  20. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  1. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  2. Language Can: Ensuring National Security through Effective Use of ...

    African Journals Online (AJOL)

    First Lady

    2012-10-27

    Oct 27, 2012 ... Indexed African Journals Online: www.ajol.info. An International ... Key words: Language, Language Can, Security, National Security, and. Language Use .... message and transmit it to a second party, who then decodes it in order to. Vol. ..... would be seen as a game rather than ―a do or die affair‖. It is the ...

  3. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  4. The Curious National Security Pendulum: Openness and/or Censorship.

    Science.gov (United States)

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  5. THE NATIONAL SECURITY - MEDIA POWER LINKAGE. A THEORETICAL FRAMEWORK

    Directory of Open Access Journals (Sweden)

    KARIN MEGHEŞAN

    2013-05-01

    Full Text Available The mechanism of national security policy is an issue of increasing interests in post cold war era. But what is the impact of the media upon national security policy decision making? New world wide events show us that more than ever national policy is often at the mercy of the media. The Wiki leaks, the Murdoch inquiry, the impact of new social media on Arab democratic movements are just some examples regarding the effect of nearly simultaneous presentation of information around the world. The world is changing, and the processes by which national policy is developed may also be changing especially in the security domain. The essence of this study, as the title suggests is the idea of a „dual use” media in the national security issues. This study employs a relatively narrow definition of national security issues as only those which are concerned with national survival and preservation of our society. The media affects us as individuals and as a collective body so we will like to focus on a realistic understanding of the media-secrecy-security linkage, noting that we will do nothing else but advance and underline the main points of view from the public and scientific discourse.

  6. Recommendations for strengthening the national systems and the international regime for combating of illicit trafficking. Keynote address/session 10

    International Nuclear Information System (INIS)

    Ek, P.; Wredberg, L.

    2001-01-01

    internal control, quality assurance, security culture and individual responsibilities; Shortage of suitable and modern equipment for monitoring and detection of radioactive material; Shortage of staff and training capabilities and insufficient financial resources concerning supervision and law enforcement authorities; Insufficient access to relevant information and data bases. A first step to improve national systems would be to assist states, by educating key-persons and authority staff, how to establish good, state-of-the-art national systems for combating of illicit trafficking, which would meet the requirements of international legal instruments, recommendations and guidelines. State Governments need to be made more aware of the seriousness of the proliferation threat and be convinced that supervision and law enforcement resources must be reinforced for bringing their national systems up to international standard. On the international level, combating of illicit trafficking would be ameliorated by improving the communication links between national authorities bi-laterally and with the international organisations. Also increased information exchange between national and international databases would improve prevention and detection capabilities. For the effective and consequent combating of illicit trafficking of nuclear material and equipment, it is, however, necessary that the international non-proliferation regime be strengthened through new initiatives and approaches. These should focus on, inter alia, a set of minimum requirements to be implemented, and to pursue, impose, follow-up and audit the implementation of those requirements into the national systems for combating of illicit trafficking. The IAEA is the recognised international organisation, both for nuclear energy promoting activities, and for the implementation of the international non-proliferation regime. The IAEA has, within its area of competence, relevant know-how and capability, including qualified

  7. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  8. At the Crossroads: Counterproliferation and National Security Strategy

    National Research Council Canada - National Science Library

    2004-01-01

    .... national security and an enormous challenge for the entire international community. In the hands of rogue states, failing states, or substate terrorist groups, these weapons threaten not only U.S...

  9. The Air Warrior's Value of National Security Space

    National Research Council Canada - National Science Library

    Loftis, J

    2003-01-01

    .... With more focused high-level attention on national security space decisions a measure that captures and quantities the value of space capabilities to combat operations professionals is desired...

  10. Organizational resilience in national security bureaucracies: Realistic and practicable?

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2017-01-01

    Resilience is increasingly highlighted as a necessary organizational property in national security bureaucracies. This article explores the resulting management dilemmas via interviews with Danish executives, who attempt to balance resilience, fiscal austerity and democratic accountability...

  11. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  12. Organized Crime and National Security: The Albanian Case

    National Research Council Canada - National Science Library

    Gjoni, Ilir

    2004-01-01

    .... This thesis proceeds from the premise that organized en me constitutes a threat to democracy, in particular a serious threat to new democracies and subsequently to the national security of the country...

  13. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-10-26

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the conference... President regarding their review of the Department of Homeland Security's (DHS) National Cybersecurity and...

  14. Globalization Crisis and National Security: A Reflection on Nigeria ...

    African Journals Online (AJOL)

    Globalization Crisis and National Security: A Reflection on Nigeria Textile Industry. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... Thus, while globalization has several palpable positive effects on the countrys industrial growth, it also ...

  15. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  16. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  17. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  18. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  19. Post-Apartheid South Africa and United States National Security

    National Research Council Canada - National Science Library

    Cochran, Edwin

    1998-01-01

    .... It is based on the realist premise that the U.S. has limited national interests in Sub-Saharan Africa which would be best served by a regional security strategy explicitly predicated on engagement with South Africa...

  20. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  1. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    Science.gov (United States)

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that…

  2. Strengthening health security at the Hajj mass gatherings: characteristics of the infectious diseases surveillance systems operational during the 2015 Hajj.

    Science.gov (United States)

    Alotaibi, Badriah M; Yezli, Saber; Bin Saeed, Abdul-Aziz A; Turkestani, Abdulhafeez; Alawam, Amnah H; Bieh, Kingsley L

    2017-05-01

    Hajj is one of the largest and the most ethnically and culturally diverse mass gatherings worldwide. The use of appropriate surveillance systems ensures timely information management for effective planning and response to infectious diseases threats during the pilgrimage. The literature describes infectious diseases prevention and control strategies for Hajj but with limited information on the operations and characteristics of the existing Hajj infectious diseases surveillance systems. We reviewed documents, including guidelines and reports from the Saudi Ministry of Health's database, to describe the characteristics of the infectious diseases surveillance systems that were operational during the 2015 Hajj, highlighting best practices and gaps and proposing strategies for strengthening and improvement. Using Pubmed and Embase online search engines and a combination of search terms including, 'mass gatherings' 'Olympics' 'surveillance' 'Hajj' 'health security', we explored the existing literature and highlighted some lessons learnt from other international mass gatherings. A regular indicator-based infectious disease surveillance system generates routine reports from health facilities within the Kingdom to the regional and central public health directorates all year round. During Hajj, enhanced indicator-based notifiable diseases surveillance systems complement the existing surveillance tool to ensure timely reporting of event information for appropriate action by public health officials. There is need to integrate the existing Hajj surveillance data management systems and to implement syndromic surveillance as an early warning system for infectious disease control during Hajj. International engagement is important to strengthen Hajj infectious diseases surveillance and to prevent disease transmission and globalization of infectious agents which could undermine global health security. © International Society of Travel Medicine, 2017. Published by Oxford University

  3. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  4. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  5. National aspects of food security of Russia

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2017-01-01

    Full Text Available Instability of a foreign policy situation and deepening of financial crisis actualize need of monitoring of food security’s condition as objective condition of economic sovereignty of Russia. Modern approaches to definition of food security of the state are considered in article. Critical evaluation of separate provisions of the Doctrine of food security of the Russian Federation is given. The analysis of a condition of food security of Russia in the directions of independence, economic and physical availability of the food is carried out on the basis of statistical data. Food security in Russia was reflected in the political decisions that defined the new economic policy of the state in the foreign market. modern import substitution program has shown its effectiveness, which is based on the absence of alternative paths of development. An important condition is the slow pace of development of the internal economy of Russia in conditions when domestic markets competition is virtually nonexistent. Food is a priority in the development of society, ensuring political and social balance, therefore, organizational solutions discussed in this material has a transdisciplinary character. The author’s conclusions can be useful to researchers who are trying to decide how macroeconomic objectives, and conducting research for innovative solutions in many sectors of the economy.

  6. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available in a real world system. The data examined will then be applied to a case study that will show the results of applying available open source security information against the model to relate to the current South African cyber landscape....

  7. Digital Dimension Disruption: A National Security Enterprise Response

    Science.gov (United States)

    2017-12-21

    PRISM 7, NO. 2 FEATURES | 41 Digital Dimension Disruption A National Security Enterprise Response By Charles Rybeck, Lanny Cornwell, and Philip Sagan...1 The slow-motion collapse of parts of the 20th century’s legacy is now accelerating in ways that likely will usher in a monumental realignment of...societal institutions, methods of business, and fundamental ideas about national security. This realignment will , of necessity, change the frameworks

  8. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  9. Regional Innovation System Strengthening Program (SIDa as an Exit Strategy National Community Development Program (PNPM

    Directory of Open Access Journals (Sweden)

    Teguh Narutomo

    2014-06-01

    Full Text Available The aim of this study was to evaluate the PNPM program and follow the program with SIDA Strengthening Program. The research method used is a qualitative method approach of this research through the evaluation research design that builds on the CIPP evaluation model (Context-Input-Process-Product. Since the failure of theories and models of development are too glorifies growth, makes many people turn to focus on people development, which includes requiring optimization of local resources, participation, and empowerment. Since then, "empowerment" which was introduced in Indonesia has been anesthetized and made many hopes among many parties. In 2007 started the National Program for Community Empowerment (PNPM which continue Kecamatan Development Program (KDP. PNPM 2014 which is part of the United Indonesia Cabinet Volume 2 is going to end. For that we need to look for an exit strategy program that can maintain sustainability of PNPM. Regional Innovation Systems Strengthening Program (SIDA is a program of the whole process in one system to foster innovation made between government institutions, local governments, research institutions, educational institutions, innovation support institutions, businesses, and communities in areas that have been implemented since the 2012 SIDA program is an empowerment program as well, both to the public and even empowering to all elements such as academia, private industry, government and society.

  10. Mapping HPV Vaccination and Cervical Cancer Screening Practice in the Pacific Region-Strengthening National and Regional Cervical Cancer Prevention

    DEFF Research Database (Denmark)

    Obel, J; McKenzie, J; Buenconsejo-Lum, L E

    2015-01-01

    OBJECTIVE: To provide background information for strengthening cervical cancer prevention in the Pacific by mapping current human papillomavirus (HPV) vaccination and cervical cancer screening practices, as well as intent and barriers to the introduction and maintenance of national HPV vaccinatio...... of prevention programs, operational research and advocacy could strengthen political momentum for cervical cancer prevention and avoid risking the lives of many women in the Pacific....

  11. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... upon physical inspection thereof and upon examination of the books of the custodian. The physical... a member of a national securities exchange of any obligation under existing law or under the rules...

  12. National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments

    National Research Council Canada - National Science Library

    Doyle, Charles

    2006-01-01

    .... These National Security Letters (NSLs) seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies...

  13. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  14. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  15. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Science.gov (United States)

    2010-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  16. Strengthening national health laboratories in sub-Saharan Africa: a decade of remarkable progress.

    Science.gov (United States)

    Alemnji, G A; Zeh, C; Yao, K; Fonjungo, P N

    2014-04-01

    Efforts to combat the HIV/AIDS pandemic have underscored the fragile and neglected nature of some national health laboratories in Africa. In response, national and international partners and various governments have worked collaboratively over the last several years to build sustainable laboratory capacities within the continent. Key accomplishments reflecting this successful partnership include the establishment of the African-based World Health Organization Regional Office for Africa (WHO-AFRO) Stepwise Laboratory Quality Improvement Process Towards Accreditation (SLIPTA); development of the Strengthening Laboratory Management Toward Accreditation (SLMTA) training programme; and launching of a Pan African-based institution, the African Society for Laboratory Medicine (ASLM). These platforms continue to serve as the foundations for national health laboratory infrastructure enhancement, capacity development and overall quality system improvement. Further targeted interventions should encourage countries to aim at integrated tiered referral networks, promote quality system improvement and accreditation, develop laboratory policies and strategic plans, enhance training and laboratory workforce development and a retention strategy, create career paths for laboratory professionals and establish public-private partnerships. Maintaining the gains and ensuring sustainability will require concerted action by all stakeholders with strong leadership and funding from African governments and from the African Union. Published 2014. This article is a U.S. Government work and is in the public domain in the U.S.A.

  17. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  18. Materials @ LANL: Solutions for National Security Challenges

    Science.gov (United States)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  19. Arms control, nonproliferation, and US national security

    International Nuclear Information System (INIS)

    Pilat, J.F.

    1985-01-01

    The continuation of the arms race and the failure of arms control and disarmament negotiations lend support to the belief that US and Soviet power, prestige, and security depend upon nuclear weapons. Therefore, the argument goes, the non-nuclear-weapon states (particularly those that are not allied with nuclear-weapon states and do not share their nuclear shield) may conclude that they would be well served by possession of these weapons. In this sense, the failure of nuclear arms reductions could create incentives for further proliferation

  20. Security in cyberspace targeting nations, infrastructures, individuals

    CERN Document Server

    Giacomello, Giampiero

    2014-01-01

    Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as ""cybersecurity."" Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This colle

  1. Demographics and the Changing National Security Environment

    National Research Council Canada - National Science Library

    2000-01-01

    .... Long- term fertility trends, urbanization, migration, and changes in the ethnic composition and age profile of populations can influence the likelihood and nature of conflict among and within nations...

  2. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-03-31

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will hold its annual meeting on May 6, 2010. The meeting will be open... preparedness telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee...

  3. Boko haram insurgency and national security in Nigeria | Okoroafor ...

    African Journals Online (AJOL)

    There are insinuations and charges that the insidious Boko Haram terrorist organization was created by the northern political opposition with strong support from the Islamic Middle East terrorist elements to destabilize the government, national security and peace of the nation, Nigeria. The truth remains that this deadly group ...

  4. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  5. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  6. A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security

    Science.gov (United States)

    2017-12-21

    machine is being bridged by wearables, augmented reality (AR), and artificial intelligence (AI). In this near-future the uncanny valley no longer...and security represent key pol- icy, security, and business tradeoffs, connectivity and national cybersecurity are similarly dialectical choices. On...Consumer Electronics Show (CES), is at once the digital sycophant’s dream and the cybersecurity hermit’s nightmare, as each connected gewgaw and

  7. Reducing Postharvest Losses during Storage of Grain Crops to Strengthen Food Security in Developing Countries

    Directory of Open Access Journals (Sweden)

    Deepak Kumar

    2017-01-01

    Full Text Available While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers’ livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%–60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%–2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail.

  8. Reducing Postharvest Losses during Storage of Grain Crops to Strengthen Food Security in Developing Countries.

    Science.gov (United States)

    Kumar, Deepak; Kalita, Prasanta

    2017-01-15

    While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers' livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%-60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%-2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail.

  9. Security vs. Nations: a lost battle?

    CERN Multimedia

    Computer Security Team

    2013-01-01

    “Know the enemy” is one of the basic recommendations of the ancient Chinese military strategist Sun Tzu (544–496 BC). In the cyber-world, the usual suspects are not only script kiddies, criminals and hacktivists, but also nation states.   Companies worldwide have prepared their defences to fight off the first three. Likewise, CERN, despite its wish for academic freedom, is constantly considering how best to prevent successful attacks. But when nation states are the antagonists, defence is impossible (unless you have plenty of money). Today, the most popular computing services in the western hemisphere are run from the US. We already know that the US and the UK are tapping into Facebook, Google, Yahoo and others (see our Bulletin article on “Prison or “Prism”? Your data in custody”). But what about one level down? Nowadays, IT hardware (routers, laptops, smartphones, etc.) is built in China. How can we be sure that these ...

  10. Narcocultura: A Threat to Mexican National Security?

    Science.gov (United States)

    2012-12-01

    Postcolony: The Zapatistas and Narcocultura,” PhD Essay , University of British Colombia: Department of Political Science, 2011, 18. 7 Rafael López...humorous lyrics or tones in some narcocorridos29 Edberg concludes by stating, “cultural images cross...provided inspiration for the lyrics of classical corridos.63 These original corridos became a source of Mexican national identity and a vehicle for

  11. UNIFIL Peacekeeping and Lebanese National Security

    Science.gov (United States)

    2012-03-22

    together with the Lebanese Armed Forces.”43 Nicholas de Riviere, Chief of the International Organizations Department at the French Foreign Ministry...Hezbollah War, (Center for Strategic and International Studies, Washington, D.C., 2007), 7. 37 lbid., 24. 38 Stephen Biddle ,Jeffrey Friedman, The...William Mooney, “Stabilizing Lebanon: peace or nation-building,” Parameters, (USAWC, Autumn 2007): 28. 40 Biddle and Friedman, The 2006 Lebanon

  12. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  13. 37 CFR 5.1 - Applications and correspondence involving national security.

    Science.gov (United States)

    2010-07-01

    ... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...

  14. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  15. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  16. National security and the comprehensive test ban treaty

    International Nuclear Information System (INIS)

    Landauer, J.K.

    1980-08-01

    For nearly three years now, the US, UK, and USSR have been working on the draft of a treaty that would ban all nuclear explosions (both peaceful applications and weapon tests) and institute verification and monitoring provisions to ensure compliance with the treaty. The status of the draft treaty is summarized. The question, Is a CTBT really in the interest of US national security. is analyzed with arguments used by both proponents and opponents of the CTBT. It is concluded that there are arguments both for and against a CTBT, but, for those whose approach to national security can be expressed as peace through preparedness, the arguments against a CTBT appear persuasive

  17. The Intersection of National Security and Climate Change

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fankhauser, Jana G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kurzrok, Andrew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sandusky, Jessica A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  18. Strengthening control over radioactive sources in authorized use and regaining control over orphan sources. National strategies

    International Nuclear Information System (INIS)

    2004-02-01

    The objective of this report is to provide practical guidance to States on the development of a national strategy for improving control over radioactive sources, particularly dangerous sources (Categories 1-3). Part of this process involves the determination of the magnitude of the potential problem with orphan and vulnerable sources and indeed, whether or not a national strategy is needed. The ultimate objective is that States will use this report to develop and then implement a plan of action that will result in all significant sources being managed in a safe and secure manner. This report attempts to provide both the background knowledge and the methodology necessary for an individual or small team of responsible persons to develop a national strategy for improving control over all radioactive sources, but especially orphan and vulnerable sources. The background knowledge given in Chapter 3 is an update of the information on practices that was given in IAEA-TECDOC-804, which focused on spent radioactive sources. After some introductory material, this report provides both the factual information and the general steps needed to develop and implement a national strategy. Part I contains background information for those who are not already familiar with the subject including the need for national strategies, the generic causes of loss of control of sources, with specific examples and the common applications of radioactive sources. Part II details the actual process for the development and implementation of a national strategy, which includes assessing the problem by first gathering specific and national information, determining the nature and magnitude of the problem, developing the national strategy by evaluating, and prioritizing possible solutions, implementing the strategy subsequent to a high level decision; and evaluating the effectiveness of the plan and making changes as a result until the desired objective is achieved. Searches for sources will be part of

  19. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  20. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  1. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  2. A policy study in strengthening the national infrastructure for radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Park, Chan Il [Korean Association for Radiation Protection, Seoul (Korea, Republic of); Lee, Jai Ki; Chang, Jaik Won; Lee, Choon Sik [Hanyang Univ., Seoul (Korea, Republic of); Whang, Joo Ho; Kim, Ki Ho [Kyunghee Univ., Seoul (Korea, Republic of)

    1999-03-15

    Public attitude declined further toward against the nuclear technology and eventually caused undue societal costs. Since the general public are aware of, or even afraid of, effects of radiation, it is hard to expect successful nuclear program without making them ease about radiation. In order to make the public feel easy and think that they get adequate protection, the infrastructure for radiation protection should be strengthened to the level corresponding to the utilization of nuclear/radiation technologies in the country. Public confidence in the role of the regulatory body is utmost important. The objectives of this study are to figure out a good model of regulatory body for radiation protection in Korea and to promulgate a draft legislations including provisions on the competent authority, the national policy and programs for upgraded infrastructure for radiation protection. As an appropriate form for the regulatory body in Korea, 'board of nuclear and radiation regulation', an independent and specialized organization under the direction of the prime minister, was proposed. It is expected that disadvantages dominate if the organization for radiation protection is separated from one for nuclear regulation. The proposed draft radiation protection acts consist of 8 chapters and 55 articles and some supplementary provisions. Copious footnotes provide explanations of the articles including the basis, considerations. justification.

  3. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  4. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    Energy Technology Data Exchange (ETDEWEB)

    Guerin, Emmanuel; Spencer, Thomas

    2011-10-11

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  5. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    International Nuclear Information System (INIS)

    Guerin, Emmanuel; Spencer, Thomas

    2011-01-01

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  6. Neutron and Gamma Imaging for National Security Applications

    Science.gov (United States)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.

  7. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  8. Rotting from Within: American Education and National Security

    Science.gov (United States)

    2011-03-04

    advantage and place its future prosperity and security at risk. Problems in America‘s Education System (K-12) Why are U.S. student doing poorly? A...nation‘s education problems. Students are fatter, slower, and weaker than their international counterparts in developed nations. Our children have...national, and international issues and events into the classroom on a regular basis.50 Additionally, educators should design programs that give

  9. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION... approval and safeguarding of National Security Information and Restricted Data. The requirements for...

  10. Language Can: Ensuring National Security through Effective Use of ...

    African Journals Online (AJOL)

    This paper is one of such efforts to show that ineffective language use can threaten national security while effective use can enhance it. Language use in interpersonal relationship is like a double- edged sword. It can be used to destroy as well as be used to mend. The present democratic dispensation in Nigeria has been ...

  11. National security and the constitutional right to join military trade ...

    African Journals Online (AJOL)

    The unionisation of the South African Military Forces has tested both lawyers and the South African legal system. However, there is very little academic commentary on this important subject. In this article, the policy, which allowed the unionisation of the South African military, the influence of the policy on national security, ...

  12. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-07-30

    ... its business. ADDRESSES: The meeting will be held via a conference call. For access to the [[Page... of their review of the Department of Homeland Security's (DHS) National Cybersecurity and... the NSTAC's proposed Joint Collaboration Center that the NSTAC envisioned in its 2009 Cybersecurity...

  13. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  14. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    Science.gov (United States)

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  15. Flexibility and security : National social models in transitional labour markets

    NARCIS (Netherlands)

    Muffels, R.J.A.; Crouch, Colin; Wilthagen, A.C.J.M.

    2014-01-01

    Aggregate and individual data are used to test the association between employment performance and different ways of reconciling flexibility and security in European labour markets. Particular use is made of statistics on individuals’ labour market transitions as revealed by national labour force

  16. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  17. Impact of the national special programme for food security on ...

    African Journals Online (AJOL)

    Impact of the national special programme for food security on poverty alleviation among women in Oyo State, Nigeria. ... In addition, majority (60.2%) of the participants were literate and participated more in cassava and maize production, while insufficient loan ranked first among the problems encountered by the ...

  18. Academics and National-Security Experts Must Work Together

    Science.gov (United States)

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  19. The National Security Language Initiative and the Teaching of Hindi

    Science.gov (United States)

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  20. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  1. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Science.gov (United States)

    2010-01-01

    ... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.4 Criteria...

  2. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...

  3. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Science.gov (United States)

    2010-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice, and...

  4. 78 FR 46622 - Application of Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...

    Science.gov (United States)

    2013-08-01

    ... Exchange, LLC for Registration as a National Securities Exchange; Findings, Opinion, and Order of the... Registration as a National Securities Exchange (``Form 1 Application'') \\1\\ under Section 6 of the Securities... substantive, are consistent with the existing rules of other registered national securities exchanges, or are...

  5. Strengthening Rehabilitation in Health Systems Worldwide by Integrating Information on Functioning in National Health Information Systems.

    Science.gov (United States)

    Stucki, Gerold; Bickenbach, Jerome; Melvin, John

    2017-09-01

    A complete understanding of the experience of health requires information relevant not merely to the health indicators of mortality and morbidity but also to functioning-that is, information about what it means to live in a health state, "the lived experience of health." Not only is functioning information relevant to healthcare and the overall objectives of person-centered healthcare but to the successful operation of all components of health systems.In light of population aging and major epidemiological trends, the health strategy of rehabilitation, whose aim has always been to optimize functioning and minimize disability, will become a key health strategy. The increasing prominence of the rehabilitative strategy within the health system drives the argument for the integration of functioning information as an essential component in national health information systems.Rehabilitation professionals and researchers have long recognized in WHO's International Classification of Functioning, Disability and Health the best prospect for an internationally recognized, sufficiently complete and powerful information reference for the documentation of functioning information. This paper opens the discussion of the promise of integrating the ICF as an essential component in national health systems to secure access to functioning information for rehabilitation, across health systems and countries.

  6. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    Energy Technology Data Exchange (ETDEWEB)

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  7. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  8. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  9. Evaluation of regional project to strengthen national health research systems in four countries in West Africa: lessons learned.

    Science.gov (United States)

    Sombié, Issiaka; Aidam, Jude; Montorzi, Gabriela

    2017-07-12

    Since the Commission on Health Research for Development (COHRED) published its flagship report, more attention has been focused on strengthening national health research systems (NHRS). This paper evaluates the contribution of a regional project that used a participatory approach to strengthen NHRS in four post-conflict West African countries - Guinea-Bissau, Liberia, Sierra Leone and Mali. The data from the situation analysis conducted at the start of the project was compared to data from the project's final evaluation, using a hybrid conceptual framework built around four key areas identified through the analysis of existing frameworks. The four areas are governance and management, capacities, funding, and dissemination/use of research findings. The project helped improve the countries' governance and management mechanisms without strengthening the entire NHRS. In the four countries, at least one policy, plan or research agenda was developed. One country put in place a national health research ethics committee, while all four countries could adopt a research information management system. The participatory approach and support from the West African Health Organisation and COHRED were all determining factors. The lessons learned from this project show that the fragile context of these countries requires long-term engagement and that support from a regional institution is needed to address existing challenges and successfully strengthen the entire NHRS.

  10. National Character vs. National Security: Conflict in the Making?

    Science.gov (United States)

    2011-03-01

    liberties. Since the 9/11 terrorist attacks, the U.S. public has watched the Patriot Act, full-body scanners and restricted access to public buildings...from 1.3 trillion to 3.5 trillion dollars, representing some 40% of total U.S. debt.”36 However, that debt restricts fiscal freedom of action for the...the American public has to keep in check its tendency toward national egoism .39 It would be the natural inclination of any leader of a uni-polar

  11. A Strategic Approach to Establishing and Strengthening National Infrastructure for Radiation, Transport and Waste Safety

    International Nuclear Information System (INIS)

    Mastauskas, A.

    2016-01-01

    In Lithuania, as in the other countries of the world, in various areas, such as medicine, industry, education and training, agriculture the different technologies with the radioactive substances or devices, which generate ionizing radiation, are used. The responsibilities of each party and concern is to ensure the safe use ensure the radiation protection of the population and the environment. For every IAEA Member State in order to ensure the radiation safety, it is necessary to create the States radiation safety infrastructure: legislation, Regulatory Authority, technical support organizations. The International Atomic Energy Agency (IAEA) develops safety standards and assists Member States to create radiation safety infrastructure according the IAEA safety standards requirements. Noting that many Member States would benefit from bringing their radiation safety infrastructure more in line with IAEA Safety Standards, the Secretariat organized a meeting in May of 2014 of senior radiation safety experts from Africa, Asia & the Pacific, Europe, Latin America and North America, with the aim of developing a model strategic approach to establishing and strengthening national radiation safety infrastructure, with a special focus on Member States receiving assistance from the Agency. This model approach was presented to a wider audience on the margins of the IAEA General Conference in September 2014, where it was well received. This paper describes how the key elements of the model strategic approach were applied in Lithuania. The outcome of which showed that there is an adequate radiation safety infrastructure in place covering more than 50 legal acts, the establishment and empowerment of a Regulatory Authority – Radiation Protection Centre, technical support organizations – metrology and dosimetry services, and training centres. In Lithuania there exists a State registry of sources of ionizing radiation and occupational doses of exposure, a strong system of the

  12. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  13. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  14. Providing Criminological Security of Minors at the National Level

    Directory of Open Access Journals (Sweden)

    Andrei I. Savelev

    2017-08-01

    Full Text Available The article discusses issues related to the provision of criminological security of minors at the national level. The Author analyzes the normative legal basis and main directions of activity of subjects of prevention of the violation of child rights in the Russian Federation. The Author believes that the current system of legal guarantees of criminological security of minors not fully meet modern requirements of protection of rights, freedoms and legitimate interests of adolescents. In particular, the legislation of the Russian Federation is largely focused on protecting the interests of disadvantaged segments of the population, including minors, being in socially dangerous position. It is proposed to improve the existing legislation through the adoption of a new federal law “The bases of the system of prevention of offences and security of minors”, which will be an important step towards building a legal state.

  15. The new terrorism and the American national security strategy : implications for Turkey's security

    OpenAIRE

    Türe, Nail

    2004-01-01

    Cataloged from PDF version of article. This thesis analyzes the consequences of the American National Security Strategy, carried out as part of the post September 11 ‘war on terrorism’, in terms of Turkey’s security. Whether the reasons or aims of a declaration of war on terrorism are right or not, the reality is that the U.S. has made important steps with significant implications for the whole world as well as for Turkey. Terrorism, which has changed some of its features by th...

  16. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  17. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  18. Current energy situation affecting national economy, security, and psyche

    International Nuclear Information System (INIS)

    Blundell, H.; Culbreath, H.L.

    1979-01-01

    Nuclear energy should be perceived by Americans as the energy option that can fill the gap left by petroleum shortages. Opposition to nuclear power symbolizes a drive to slow economic growth and return to a decentralized society, but it overlooks the implications that not going nuclear will have for the economy and national security. The General Accounting Office plotted the consequences for three scenarios and concluded that only nuclear power can provide enough domestic energy to meet projected electrical needs. The impact of higher energy prices that will follow energy-supply shortages will result in social change and in a decline in national security. The issues of import dependence, proliferation, economic competition, and morality are not valid reasons to forego nuclear development because the connections are not valid

  19. On the Perception of National Security Issues at Regional Level

    Directory of Open Access Journals (Sweden)

    Ponedelkov Aleksandr Vasilyevich

    2015-12-01

    Full Text Available The article explores the issue on the perception of the concept “national security” areas, models and methods of its maintenance by the population. The author uses materials of the sociological survey conducted by the Laboratory of problems of increasing the efficiency of state and municipal management of the South-Russian Institute of Management – branch of the Russian Presidential Academy of National Economy and Public Administration. The survey was carried out with the participation of leading experts in various aspects of national security, representing 27 Russian higher educational institutions and research centers in Moscow, Astrakhan, Barnaul, Belgorod, Dushanbe, Krasnodar, Nizhny Novgorod, Omsk, Pyatigorsk, Rostov-on-Don, Saint Petersburg, Syktyvkar, Sochi, Ufa. It is noted that as a priority political governance model that implements the basic concept of national security, respondents identified a democratic model. Most respondents believe that a unified security model in the Russian regions is ineffective, and such model should be developed taking into account the specificity of each subject. The study showed that the public’s attention to the issue of national security is not sustainable, as determined by situational factors. It is proved that the motives of anxiety formed in the Russian public mind are not sustainable, and situational. Respondents see the economic cooperation more effective incentive to maintain national interests than by force. Estimation of the population of the priority issues of security shows that most respondents appreciate the organization of work to ensure the safety and anti-terrorism security in the sphere of national relations. The findings give grounds to assert that the focus of public attention to the problem of national security does not yet occupy the leading positions. To a greater extent, respondents focused on the issues of public safety, reducing threats and risks in their daily lives

  20. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  1. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    Japanese penchant for situational ethics allowed a sharp psychological about-face following the war, enabling them to accept the American policies. Power...Reagan/Bush Administrations have exaggerated the nation’s defense needs and that selfish interests are overriding objectivity and common sense in the ...security.195 They view the United States as having benign political motives and having the largest domestic market needed to develop regional

  2. Infectious Disease and National Security: Strategic Information Needs

    Science.gov (United States)

    2006-01-01

    to the National Security Council. Most current federal employees we interviewed offered one or more specific sugges- tions for a centralized, time...and preparedness information for health professionals Open 156 Ministry of Health Malaysia Government of Malaysia http://dph.gov.my/ddc/index. html...Open 206 Asian Network for Surveillance of Resistant Pathogens (ANSORP) Various (primary: Samsung Medical Center, Sungkyunkwan University, Seoul

  3. Project on National Security Reform: Forging a New Shield

    Science.gov (United States)

    2008-11-01

    quoted by Joseph Nye in ―Leaders and Managers,‖ Project Syndicate , 1 May 2008, 30 September 2008 < http://www.project-syndicate.org/commentary/nye56...Bulletin of the Atomic Scientists, 18 Sept 2007, 30 Sept 2008 < http://www.thebulletin.org/web-edition/ columnists / gordon-adams/ when-national-security... Syndication ) 1179 tagging, ambient awareness, 1180 message boards, virtual social networking, document storage, and virtual meetings. Heavy emphasis is

  4. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  5. Heavy Lift for National Security: The Ares V

    Science.gov (United States)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  6. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  7. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    Energy Technology Data Exchange (ETDEWEB)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  8. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    International Nuclear Information System (INIS)

    Herron, Kerry G.; Jenkins-Smith, Hank C.; Hughes, Scott D.

    2000-01-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community

  9. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives as well...

  10. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  11. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  12. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    Science.gov (United States)

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  13. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... of the National Security Education Board. This meeting was to be held on June 20, 2012, from 8:30 a.m. to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite...

  14. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice... Succession for the Office of Disaster Management and National Security. This is the first order of succession... L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and...

  15. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...

  16. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  17. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  18. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Science.gov (United States)

    2010-05-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... June 23, 2010, from 8 a.m. to 12:30 p.m. ADDRESSES: The meeting will be held at the National Security.... Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  19. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Science.gov (United States)

    2010-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in subpart A of 17 CFR part 249. All...

  20. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-05-24

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the... announces that the following Federal advisory committee meeting of the National Security Education Board...

  1. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture, or other form of indebtedness effected on a national securities exchange by a member for its own...

  2. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  3. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... Department of Defense gives notice that it is renewing the charter for the National Security Education Board... awards that favors individuals expressing an interest in national security issues or pursuing a career in...

  4. The Impact of Migration Processes on the National Security of Kazakhstan

    Science.gov (United States)

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  5. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Other national security and emergency... COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations; cross...

  6. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0004] National Security Division: Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...

  7. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  8. 10 CFR 2.903 - Protection of restricted data and national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  9. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Science.gov (United States)

    2010-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch information...

  10. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    1993-01-01

    In the face of improved international relations, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being actively encouraged by the international community. Towards this end, the United Nations Office for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground and delineating areas of possible future negotiation and agreement. Within this framework, a Conference on the theme 'Disarmament and national security in an interdependent world' was held in Kyoto, Japan, from 13 to 16 April 1993. The Conference, the third one in a series held in Kyoto on disarmament issues, was organized by the Office for Disarmament Affairs through the Regional Centre for Peace and Disarmament in Asia and the Pacific and in collaboration with the Government of Japan and the Prefecture and City of Kyoto. This publication is based on material presented at that Conference

  11. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  12. SECURITY IN SUSTAINABLE DEVELOPMENT: COMPARING UNITED NATIONS 2030 AGENDA FOR SUSTAINABLE DEVELOPMENT WITH MILLENNIUM DECLARATION

    Directory of Open Access Journals (Sweden)

    Ahmet BARBAK

    2017-06-01

    Full Text Available This study aims to compare United Nations 2030 Agenda for Sustainable Development with Millennium Declaration in terms of their security conceptualizations to explore changes in security thinking and policy components (goals, targets, principles, priorities etc. over time. In doing so, it is envisaged that United Nations’ expectations from member states regarding their national security policies and organizations could be revealed. Security thinking has changed since late 1980’s with the introduction of sustainable development approach by the United Nations. This shift in security thinking encompasses human security and security-development nexus. Holding all member states responsible, Millennium Declaration and 2030 Agenda for Sustainable Development constitute the primary and the most recent outcome documents of United Nations’ sustainable development policy. Both documents have security components. This enables extracting security elements and comparing them with an analytical manner. Consequently, findings are compared and discussed in terms of public policy and organization at national level.

  13. National Security in the Nuclear Age. A Conference for State Social Studies Coordinators on Pre-Collegiate National Security Education (Washington, DC, June 26-July 1, 1983).

    Science.gov (United States)

    Trout, B. Thomas; And Others

    This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…

  14. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  15. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  16. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    International Nuclear Information System (INIS)

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-01-01

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  17. Extreme nationalism and the security of contemporary society

    Directory of Open Access Journals (Sweden)

    Mijalković Saša

    2012-01-01

    Full Text Available Ethnic groups are characterized by certain collective identity whose foundations are made of language, religion, race, and country of origin with its culture and customs. Since ethnic identities differ one from another, in multinational and multicultural societies there is a latent danger of having ideologies that advocate ethnic distancing, imposing a danger to the security of other ethnicities, the change of constitutional order, as well as separation of certain parts of sovereign states with the aim of creating new countries or accession to some other ones. Besides the fact that these phenomena cause collective discrimination and severe violation of human rights, they are also, very often, accompanied by individual and collective violence - terrorism, (civil wars, genocide, war crimes and other forms of inter-ethnic violence. Alongside with the extreme intolerance, these ideologies also propagate particularization of a society by ethnic, religious and race criteria. Given the fact that their base is made of glorification of their own national identity and negation of other ones, it is reasonably justified for them to carry an epithet of extreme-nationalist. Regarding the mentioned, this paper gives a perspective on definition and typology of nationalism, its consequences for the security of contemporary society, as well as on contemporary social reaction to it.

  18. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... of the Executive Order, ``Classified National Security Information'' Memorandum for the Heads of... Security Information'' (the ``order''), which substantially advances my goals for reforming the security... classified information shall provide the Director of the Information Security Oversight Office (ISOO) a copy...

  19. National security and the accelerating risk of climate change

    Directory of Open Access Journals (Sweden)

    Lee Gunn

    2017-06-01

    Full Text Available Since 2006, retired U.S. admirals and generals have been examining our changing physical world and assessing the impact of those changes on the security of the nation. A Military Advisory Board (MAB, convened by the CNA Corporation, a non-profit research and analysis institution that operates the Center for Naval Analyses and Institute for Public Research has issued two reports on the changing climate’s national security implications. The first report, published in 2007, stated that the changing climate would be destabilizing in many parts of the world. Climate change, in fact, would be a “threat multiplier”, the report claimed, and result in new and more urgent calls for the American military to provide humanitarian assistance and disaster relief (HADR as well as help sustain order and ensure conditions that would permit trade and prosperity worldwide. The MAB recommended urgent action by the Defense Department to prepare for new missions in new places; and that the Defense Department explicitly recognize missions stemming from the changing climate. CNA’s MAB then published three reports on energy, relating to climate change, one each on: the coming age of renewables, the nation’s energy dependence, and the future of energy in terms of America’s international competitiveness (CNA-MAB, 2009; CNA-MAB, 2010; CNA-MAB, 2011. In 2014, the Military Advisory Board noted that the climate was changing more quickly than had been forecast in 2007. Undertaking a new climate study, the board concluded that more needed to be done, and done quickly, to prepare for and confront the “catalyst for conflict” that the board now saw in climate change. Guest Editors’ Note: The following commentary derives from a presentation by Vice Admiral Lee Gunn, U.S. Navy (Ret., delivered by invitation at the American Association for the Advancement of Science Meeting, San Jose, California, February 13, 2015. Prior to his advisory role for the U.S. Military and

  20. Pumping Iron in Australia: Prevalence, Trends and Sociodemographic Correlates of Muscle Strengthening Activity Participation from a National Sample of 195,926 Adults.

    Directory of Open Access Journals (Sweden)

    Jason A Bennie

    Full Text Available The current Australian Physical Activity Guidelines recommend that adults engage in regular muscle-strengthening activity (e.g. strength or resistance training. However, public health surveillance studies describing the patterns and trends of population-level muscle-strengthening activity participation are sparse. The aim of this study is to examine the prevalence, trends and sociodemographic correlates of muscle-strengthening activity participation in a national-representative sample of Australians aged 15 years and over.Between 2001 and 2010, quarterly cross-sectional national telephone surveys were conducted as part of the Australian Sports Commission's 'Exercise, Recreation and Sport Survey'. Pooled population-weighted proportions were calculated for reporting: [i] no muscle-strengthening activity; [ii] insufficient muscle-strengthening activity, and [iii] sufficient muscle-strengthening activity. Associations with sociodemographic variables were assessed using multiple logistic regression analyses.Out of 195,926 participants, aged 15-98 years, only 10.4% (95% CI: 10.1-10.7 and 9.3% (95% CI: 9.1-9.5 met the muscle-strengthening activity recommendations in the past two weeks and in the past year, respectively. Older adults (50+ years, and those living in socioeconomically disadvantaged, outer regional/remote areas and with lower education were less likely to report sufficient muscle-strengthening activity (p<0.001. Over the 10-year monitoring period, there was a significant increase in the prevalence of sufficient muscle-strengthening activity (6.4% to 12.0%, p-value for linear trend <0.001.A vast majority of Australian adults did not engage in sufficient muscle-strengthening activity. There is a need for public health strategies to support participation in muscle-strengthening activity in this population. Such strategies should target older and lower educated adults, and those living in socioeconomically disadvantaged, outer regional

  1. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Science.gov (United States)

    2010-01-01

    ... 29, 2009 Implementation of the Executive Order, “Classified National Security Information” Memorandum..., “Classified National Security Information” (the “order”), which substantially advances my goals for reforming... or handles classified information shall provide the Director of the Information Security Oversight...

  2. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  3. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  4. 76 FR 2737 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Science.gov (United States)

    2011-01-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63668; File No. SR-NSCC-2010-09] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change... Facility January 6, 2011. I. Introduction On August 30, 2010, the National Securities Clearing Corporation...

  5. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while...

  6. Critical role of developing national strategic plans as a guide to strengthen laboratory health systems in resource-poor settings.

    Science.gov (United States)

    Nkengasong, John N; Mesele, Tsehaynesh; Orloff, Sherry; Kebede, Yenew; Fonjungo, Peter N; Timperi, Ralph; Birx, Deborah

    2009-06-01

    Medical laboratory services are an essential, yet often neglected, component of health systems in developing countries. Their central role in public health, disease control and surveillance, and patient management is often poorly recognized by governments and donors. However, medical laboratory services in developing countries can be strengthened by leveraging funding from other sources of HIV/AIDS prevention, care, surveillance, and treatment programs. Strengthening these services will require coordinated efforts by national governments and partners and can be achieved by establishing and implementing national laboratory strategic plans and policies that integrate laboratory systems to combat major infectious diseases. These plans should take into account policy, legal, and regulatory frameworks; the administrative and technical management structure of the laboratories; human resources and retention strategies; laboratory quality management systems; monitoring and evaluation systems; procurement and maintenance of equipment; and laboratory infrastructure enhancement. Several countries have developed or are in the process of developing their laboratory plans, and others, such as Ethiopia, have implemented and evaluated their plan.

  7. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  8. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Science.gov (United States)

    2010-04-01

    ... for registration as a national securities association or affiliated securities association. 249.801... Registration of and Reporting by National Securities Associations and Affiliated Securities Associations § 249.801 Form X-15AA-1, for application for registration as a national securities association or affiliated...

  9. National Security Crisis Decision-Making: The Role of Regional Combatant Commander

    National Research Council Canada - National Science Library

    Williams, Sean C

    2007-01-01

    The successful management of the Cuban Missile Crisis of 1962 set an unfortunate precedent for crisis management and national security crisis decision-making that persists into the contemporary security environment...

  10. The National Security Strategy of the United Kingdom: Security in an Interdependent World

    National Research Council Canada - National Science Library

    2008-01-01

    .... Economic trends, including more open global markets, and technological trends, particularly in communications, have strengthened the connections between individuals, businesses, societies and economies...

  11. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  12. Magnetic imaging: a new tool for UK national nuclear security.

    Science.gov (United States)

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-22

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  13. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  14. Magnetic Imaging: a New Tool for UK National Nuclear Security

    Science.gov (United States)

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  15. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  16. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Science.gov (United States)

    2010-07-01

    ... national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2... rate established * * * for transportation provided to the U.S. Government would endanger the National...

  17. 15 CFR 930.122 - Necessary in the interest of national security.

    Science.gov (United States)

    2010-01-01

    ... Trade (Continued) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... proposed. Secretarial review of national security issues shall be aided by information submitted by the...

  18. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  19. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  20. National Security Cutter: Enhanced Oversight Needed to Ensure Problems Discovered during Testing and Operations Are Addressed

    Science.gov (United States)

    2016-01-01

    May Lead to NSCs and Future DHS Assets Deploying without Having Demonstrated Full Capabilities 22 Performance Issues Discovered Outside of IOT &E...Examples of National Security Cutter Critical Operational Issues and Key Performance Parameters 10 Table 3: National Security Cutter Major...Cutter IOT &E Initial Operational Test and Evaluation KPP Key Performance Parameter LRI-II Long-Range Interceptor II NSC National Security Cutter

  1. The role of national security culture in crisis management : the case of Kardak crisis

    OpenAIRE

    Savaş, Özlem

    2008-01-01

    Ankara : The Department of International Relations, Bilkent University, 2008. Thesis (Master's) -- Bilkent University, 2008. Includes bibliographical references leaves 94-103. This thesis analyzes the role of national security culture in crisis management. The use and significance of national security culture in the management of a crisis is the main concern discussed throughout this study. It is assumed that national security culture serves as the main guideline of states d...

  2. Simulating human behavior for national security human interactions.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  3. Integration of Military and Civilians Space Assets: Legal and National Security Implications

    National Research Council Canada - National Science Library

    Waldrop, Elizabeth

    2003-01-01

    .... From a military perspective, intentional reliance on civilian systems must address, inter alia, national security concerns, contractual obligations, licensing restrictions, liability, and long-term...

  4. Strengthening Climate Services Capabilities and Regional Engagement at NOAA's National Climatic Data Center

    Science.gov (United States)

    Shea, E.

    2008-12-01

    The demand for sector-based climate information is rapidly expanding. In order to support this demand, it is crucial that climate information is managed in an effective, efficient, and user-conscious manner. NOAA's National Climatic Data Center is working closely with numerous partners to develop a comprehensive interface that is authoritative, accessible, and responsive to a variety of sectors, stakeholders, and other users. This talk will explore these dynamics and activities, with additional perspectives on climate services derived from the regional and global experiences of the NOAA Integrated Data and Environmental Applications (IDEA) Center in the Pacific. The author will explore the importance of engaging partners and customers in the development, implementation and emergence of a national climate service program. The presentation will draw on the author's experience in climate science and risk management programs in the Pacific, development of regional and national climate services programs and insights emerging from climate services development efforts in NCDC. In this context, the author will briefly discuss some of guiding principles for effective climate services and applications including: - Early and continuous dialogue, partnership and collaboration with users/customers; - Establishing and sustaining trust and credibility through a program of shared learning and joint problem- solving; - Understanding the societal context for climate risk management and using a problem-focused approach to the development of products and services; - Addressing information needs along a continuum of timescales from extreme events to long-term change; and - Embedding education, outreach and communications activities as critical program elements in effective climate services. By way of examples, the author will reference lessons learned from: early Pacific Island climate forecast applications and climate assessment activities; the implementation of the Pacific Climate

  5. Improving U.S. Competitiveness with K-12 STEM Education and Training. Heritage Special Report. SR-57. A Report on the STEM Education and National Security Conference, October 21-23, 2008

    Science.gov (United States)

    Machi, Ethel

    2009-01-01

    From October 21 to 23, 2008, The Heritage Foundation, supported by the McCormick Tribune Foundation, convened leading education and national security experts as well as private-sector representatives to discuss methods for strengthening America's competitiveness by improving its performance in science, technology, engineering, and mathematics…

  6. Hyper-connectivity : intricacies of national and international cyber securities

    OpenAIRE

    Dawson, Maurice

    2017-01-01

    This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets: 1. Security Solutions for Hyperconnectivity and the Internet of Things; 2. Developing Next-Generation Countermeasures for...

  7. CITY, COUNTRYSIDE AND NATURE AS DISCURSIVE DEVICES USED TO STRENGTHEN THE NATIONAL IDENTITY IN ICELANDIC CINEMATOGRAPHY

    Directory of Open Access Journals (Sweden)

    Jakub Sebastian Konefał

    2015-03-01

    Full Text Available Since its inception the Icelandic film industry has used the strategy of combining telluric elements with national- istic narratives. In many films one may also find visual structures that can be linked with the ‘tourist gaze’ – the term as we know it from the texts of John Urry. Despite a focus on some unique qualities of Icelandic nature and its cultural heritage (that can be attractive to foreign viewers the specificity of cinematic production processes on the island belong to the structure of local, national cinema. Moreover, the 1980s, considered as the time of the rebirth of the Icelandic film industry and its rapid modernization, are full of films containing conservative or leftist telluric topics which are difficult for foreign audiences to understand. A new, transnational quality of Icelandic film features began with the film debut of Friðrik Þór Friðriksson in 1987. His fusion of modernist and postmodernist plots has encouraged other filmmakers to start the process of re-interpretation of the classic narrative structures, and to render the ironic demystification of some nationalistic themes.

  8. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  9. "The Islamic State Of Iraq And The Levant" (ISIL In The System Of Threats To The National Security Of Russia

    Directory of Open Access Journals (Sweden)

    Pavel V. Agapov

    2014-09-01

    Full Text Available In the present work authors analyze political, economic, military and many other aspects of the "Islamic State of Iraq and Levant" activity as essential factor of the destabilization in the region of the Middle East. Authors investigate destructive consequences of this terrorist religious group's positions strengthening for the national security of the Russian Federation and border states. Authors note that actions in Syria and Iraq have indirect, but transnational effect, pose threat to the interests of the national security of Russia, especially including one, conducted in Crimea with the use of Islamic radicals for this purpose, who are on the peninsula and territory of the Ukraine. In the present article authors note that every year in the process of the population's psychological fatigue strengthening, new losses among the military personnel and the intelligence services staff and also death of peaceful citizens, their positions will only amplify. "Defeatism" will become a powerful political force. Problem of the international legal aspect of the counteraction to the threat from the actions of foreign fighters-terrorists who are hired or accepted with ISIL, al-Nusra Front and other groups and organizations of the terrorist orientation is connected with the implementation of the UN Security Council Resolution 2178 (2014 made on September 24, 2014. It’s main objective – development of the nonviolent ways of the conflicts prevention and settlement for the purposes of the radicalization to the level generating terrorism risk degree decrease. In the conclusion authors argument that it is especially actual for the Russian regions, which is extremely vulnerable to extremism (North Caucasus, Volga Region.

  10. 17 CFR 240.19c-1 - Governing certain off-board agency transactions by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity... members of national securities exchanges. The rules of each national securities exchange shall provide as...

  11. 17 CFR 240.19c-5 - Governing the multiple listing of options on national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... of options on national securities exchanges. 240.19c-5 Section 240.19c-5 Commodity and Securities... of Exchange Members § 240.19c-5 Governing the multiple listing of options on national securities exchanges. (a) The rules of each national securities exchange that provides a trading market in standardized...

  12. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Science.gov (United States)

    2010-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... national securities exchange, registered as such with the Securities and Exchange Commission pursuant to...

  13. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice of...

  14. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2010-01-28

    ....; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... determination about whether to grant BATS Y Exchange's request to be registered as a national securities...

  15. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2013-03-07

    ...; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... Topaz Exchange's request to be registered as a national securities exchange. The Commission will grant...

  16. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  17. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  18. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  19. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  20. Conflict and cooperation in cyberspace the challenge to national security

    CERN Document Server

    Yannakogeorgos, Panayotis A

    2016-01-01

    Facilitated by the exceptional handiwork of the editors, this book significantly advances the effort to achieve common ground in the debates regarding cyberspace. National security and cyber-related professionals will find it equally useful in their work.-Lt. Gen Bob Elder, USAF (Retired)In this wide-ranging anthology that encompasses expert viewpoints from military, civilian, and private sector contributors, the editors seek to provide a broad framework of issues to be considered. Rather than provide definitive answers (all of the contributors readily admit that none exist), the contributors state that in order to attain the right answers, we must first ask the right questions. Over the course of the book, the authors put forth a common set of concerns to frame the issue at hand. ... The authors undertake a study of how to apply cyber law to cyber war, warning that allowing the Intelligence Community and the military to assist in the defense of privately owned networks may lead to legal and political consequ...

  1. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  2. Strengthening of national capacity in implementation of antimalarial drug quality assurance in Thailand.

    Science.gov (United States)

    Vijaykadga, Saowanit; Cholpol, Sawat; Sitthimongkol, Saipin; Pawaphutanan, Anusorn; Pinyoratanachot, Arunya; Rojanawatsirivet, Chaiporn; Kovithvattanapong, Rojana; Thimasarn, Krongthong

    2006-01-01

    Substandard and counterfeit pharmaceutical products, including antimalarial drugs, appear to be widespread internationally and affect both the developing and developed countries. The aim of the study was to investigate the quality of antimalarial drugs, ie, artesunate (ART), chloroquine (CHL), mefloquine (MEF), quinine (QUI), sulfadoxine/pyrimethamine (S/P) and tetracycline (TT) obtained from the government sector and private pharmacies in 4 Thai provinces: Mae Hong Son, Kanchanaburi, Ranong, and Chanthaburi. Three hundred sixty-nine samples of 6 antimalarial drugs from 27 government hospitals, 27 malaria clinics, and 53 drugstores, were collected. Drug quality was assessed by simple disintegration test and semi-quantitative thin-layer chromatography in each province; 10% passed, 100% failed and doubtful samples were sent to be verified by high performance liquid chromatography (HPLC) at the Thai National Drug Analysis Laboratory, (NL). Fifteen point four percent of ART, 11.1% of CHL and 29.4% of QUI were substandard. Based on the finding, drug regulatory authorities in the country took appropriate action against violators to ensure that antimalarial drugs consumed by malaria patients are of good quality.

  3. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  4. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  5. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  6. Using science to strengthen our Nation's resilience to tomorrow's challenges: understanding and preparing for coastal impacts

    Science.gov (United States)

    Simmons, Dale L.; Andersen, Matthew E.; Dean, Teresa A.; Focazio, Michael J.; Fulton, John W.; Haines, John W.; Mason, Jr., Robert R.; Tihansky, Ann B.; Young, John A.

    2014-01-01

    Hurricane Sandy caused unprecedented damage across some of the most densely populated coastal areas of the northeastern United States. The costly, landscape-altering destruction left in the wake of this storm is a stark reminder of our Nation’s need to become more resilient as we inevitably face future coastal hazards. As our Nation recovers from this devastating natural disaster, it is clear that accurate scientific information is essential as we seek to identify and develop strategies to address trends in coastal landscape change and reduce our future vulnerability to major storm events. To address this need, the U.S. Geological Survey (USGS) received $43.2 million in supplemental appropriations from the Department of the Interior (DOI) to conduct the scientific research needed to guide response, recovery, and rebuilding activities and to develop effective strategies for protecting coastal communities and resources in the future. This fact sheet describes how the USGS is combining interdisciplinary science with state-of-the-art technologies to achieve a comprehensive understanding of coastal change caused by Hurricane Sandy. By assessing coastal change impacts through research and by developing tools that enhance our science capabilities, support coastal stakeholders, and facilitate effective decision making, we continue to build a greater understanding of the processes at work across our Nation’s complex coastal environment—from wetlands, estuaries, barrier islands, and nearshore marine areas to infrastructure and human communities. This improved understanding will increase our resilience as we prepare for future short-term, extreme events as well as long-term coastal change.

  7. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  8. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-03-29

    ...:00 p.m. This meeting may close early if all business is finished. All written material and requests... Obama signed an Executive Order to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...

  9. 78 FR 55089 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-09-09

    ... early if all business is finished. All written material and requests to make oral presentations should... February 12, 2013, President Barack Obama signed an Executive Order \\1\\ to strengthen the cybersecurity of... framework of cybersecurity practices with our industry partners. This is a continuation of a discussion held...

  10. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-03-18

    ... Wednesday, April 3, 2013 from 8:00 a.m. to 11:00 a.m. This meeting may close early if all business is... Executive Order \\1\\ to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...

  11. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for certain derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... Miscellaneous Exemptions § 240.3a12-7 Exemption for certain derivative securities traded otherwise than on a...

  12. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  13. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  14. Grounding the nexus: Examining the integration of small-scale irrigators into a national food security programme in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Brian Dowd-Uribe

    2018-06-01

    Full Text Available The water-food nexus literature examines the synergies and trade-offs of resource use but is dominated by large-scale analyses that do not sufficiently engage the local dimensions of resource management. The research presented here addresses this gap with a local-scale analysis of integrated water and food management in Burkina Faso. Specifically, we analyse the implementation of a national food security campaign (Opération Bondofa to boost maize production in a subbasin that exhibits two important trends in Africa: a large increase in small-scale irrigators and the decentralisation of water management. As surface water levels dropped in the region, entities at different scales asserted increased control over water allocation, exposing the contested nature of new decentralised institutions, and powerful actors’ preference for local control. These scalar power struggles intersected with a lack of knowledge of small-scale irrigators’ cultural practices to produce an implementation and water allocation schedule that did match small-scale irrigator needs, resulting in low initial enthusiasm for the project. Increased attention from national governments to strengthen decentralised water management committees and spur greater knowledge of, and engagement with, small-scale irrigators can result in improved programme design to better incorporate small-scale irrigators into national food security campaigns.

  15. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  16. Emerging Roles of Women in the National Food Security Campaign of the Federal Government of Nigeria: A Review

    OpenAIRE

    Ademilua, O.S; Adeeko, A; Gbotoso, O.A; Akomolafe, A.M; Ishola, O.O

    2017-01-01

    The issue of food security in Nigeria is of national concern as it affects young and old, male and female. The review assessed the emerging roles of women and their contributions to food security in Nigeria. Specifically, it explained the concept of food security, identified the specific roles of women in food security and identified factors affecting women participation in national food security. Food security is a situation that exist when all people at all times, have physical, social and ...

  17. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are

  18. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  19. Engagement of National Board of Examinations in strengthening public health education in India: present landscape, opportunities and future directions.

    Science.gov (United States)

    Sharma, Anjali; Zodpey, Sanjay; Batra, Bipin

    2014-01-01

    A trained and adequate heath workforce forms the crux in designing, implementing and monitoring health programs and delivering quality health services. Education is recognized as a critical instrument for creating such trained health professionals who can effectively address the 21 st century health challenges. At present, the Public Health Education in India is offered through medical colleges and also outside the corridors of medical colleges which was not the scenario earlier. Traditionally, Public Health Education has been a domain of medical colleges and was open for medical graduates only. In order to standardize the Postgraduate Medical Education in India, the National Board of Examinations (NBE) was set up as an independent autonomous body of its kind in the country in the field of medical sciences with the prime objective of improving the quality of the medical education. NBE has also played a significant role in enhancing Public Health Education in India through its Diplomat of National Board (DNB) Programs in Social and Preventive Medicine, Health and Hospital Administration, Maternal and Child Health, Family Medicine and Field Epidemiology. It envisions creating a cadre of skilled and motivated public health professionals and also developing a roadmap for postgraduate career pathways. However, there still exists gamut of opportunities for it to engage in expanding the scope of Public Health Education. It can play a key role in accreditation of public health programs and institutions which can transform the present landscape of education of health professionals. It also needs to revisit and re-initiate programs like DNB in Tropical Medicine and Occupational Health which were discontinued. The time is imperative for NBE to seize these opportunities and take necessary actions in strengthening and expanding the scope of Public Health Education in India.

  20. A Compton Gamma Imager for Criminal and National Security Investigation

    Science.gov (United States)

    2014-05-01

    Services Agency. CSSP is a federally -funded program to strengthen Canada’s ability to anticipate, prevent/mitigate, prepare for, respond to, and...casing housing the NaI(Tl) crystal is seen in the centre. At each end are the PMTs for light collection, and cables for carrying the high voltage...satellites to image galactic and extragalactic sources of gamma radiation [5]. As of the time of submitting the project proposal for CRTI 07-0193RD

  1. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrella, F.

    1993-01-01

    Paper deals with a new emerging international system of security with the emphasis on the regional contribution, especially position of Argentina, non-proliferation policy, comprehensive safeguards, safeguards agreements, technology developments and responsibilities and opportunities related to the disarmament issues

  2. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...

  3. After the Cold War: A National Security Vision for America

    National Research Council Canada - National Science Library

    Pollick, Glenn

    1997-01-01

    .... The author examines the question of what role America, as the world's sole superpower, should play in international affairs in light of an apparently reduced threat to its security and the increasing...

  4. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  5. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  6. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  7. Remarks on nuclear non-proliferation and nuclear disarmament, United Nations Security Council, 24 September 2009, New York, USA

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2009-01-01

    IAEA Director General Dr. Mohamed ElBaradei, Director General of the International Atomic Energy Agency (IAEA) limited his speech to a few key issues. First he stated that the global nuclear non-proliferation regime is fragile and has many shortcomings because the IAEA's legal authority is severely limited in some countries and the IAEA verification mandate is centred on nuclear material and not on weaponization activities. Secondly there is a growing number of states that have mastered uranium enrichment or plutonium reprocessing. Any one of these states could develop nuclear weapons in a short span of time, if, for example, it decided to withdraw from the NPT. There is a need to move from national to multinational control of the nuclear fuel cycle. Thirdly the highest level of protection for nuclear and radioactive material has to be provided. A fourth issue is the need to strengthen the IAEA. A fifth issue is that the IAEA cannot do its work in isolation but depends on a supportive political process, with the Security Council at its core. A sixth issue is that the Security Council must put more emphasis on addressing the insecurities that lie behind many cases of proliferation, such as endemic conflicts, security imbalances and lack of trust. Finally, Dr. Mohamed ElBaradei is gratified to see nuclear disarmament back at the top of the international agenda, as well as recognition of the intrinsic link between nuclear disarmament and non-proliferation

  8. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From  -­‐  To)   September 2012 - April 2013 4.  TITLE  AND  SUBTITLE   Private Military and Security Companies - Counterinsurgency and

  9. Ares V: Game Changer for National Security Launch

    Science.gov (United States)

    Sumrall, Phil; Morris, Bruce

    2009-01-01

    NASA is designing the Ares V cargo launch vehicle to vastly expand exploration of the Moon begun in the Apollo program and enable the exploration of Mars and beyond. As the largest launcher in history, Ares V also represents a national asset offering unprecedented opportunities for new science, national security, and commercial missions of unmatched size and scope. The Ares V is the heavy-lift component of NASA's dual-launch architecture that will replace the current space shuttle fleet, complete the International Space Station, and establish a permanent human presence on the Moon as a stepping-stone to destinations beyond. During extensive independent and internal architecture and vehicle trade studies as part of the Exploration Systems Architecture Study (ESAS), NASA selected the Ares I crew launch vehicle and the Ares V to support future exploration. The smaller Ares I will launch the Orion crew exploration vehicle with four to six astronauts into orbit. The Ares V is designed to carry the Altair lunar lander into orbit, rendezvous with Orion, and send the mated spacecraft toward lunar orbit. The Ares V will be the largest and most powerful launch vehicle in history, providing unprecedented payload mass and volume to establish a permanent lunar outpost and explore significantly more of the lunar surface than was done during the Apollo missions. The Ares V consists of a Core Stage, two Reusable Solid Rocket Boosters (RSRBs), Earth Departure Stage (EDS), and a payload shroud. For lunar missions, the shroud would cover the Lunar Surface Access Module (LSAM). The Ares V Core Stage is 33 feet in diameter and 212 feet in length, making it the largest rocket stage ever built. It is the same diameter as the Saturn V first stage, the S-IC. However, its length is about the same as the combined length of the Saturn V first and second stages. The Core Stage uses a cluster of five Pratt & Whitney Rocketdyne RS-68B rocket engines, each supplying about 700,000 pounds of thrust

  10. Strengthening national decision-making on immunization by building capacity for economic evaluation: Implementing ProVac in Europe.

    Science.gov (United States)

    Blau, Julia; Hoestlandt, Céline; D Clark, Andrew; Baxter, Louise; Felix Garcia, Ana Gabriela; Mounaud, Bérénice; Mosina, Liudmila

    2015-05-07

    For many years, low- and middle-income countries have made efforts to strengthen national decision-making on immunization. The Pan American Health Organization (PAHO) ProVac Initiative was established to help expedite the use of evidence-based decision-making around new vaccine introduction. This initiative provides training in user-friendly cost-effectiveness models and supports the development of country-led economic evaluations. Due to the success of the ProVac Initiative in the Americas, and following requests from countries from outside the Americas, the Bill & Melinda Gates Foundation funded a two-year pilot effort to expand the initiative to other world regions. Called the ProVac International Working Group (IWG), this endeavor took place in 2012 and 2013. It was coordinated by PAHO and carried out in collaboration with several international partners, including the Agence de Médecine Préventive (AMP), London School of Hygiene & Tropical Medicine (LSHTM), Program for Appropriate Technology in Health, Sabin Vaccine Institute, United States Centers for Disease Control and Prevention, and the World Health Organization (WHO). In the WHO European Region, technical support was provided by AMP, in close collaboration with the WHO Regional Office for Europe and other ProVac IWG partners. In 2012, AMP, the WHO Regional Office for Europe, and other partners held a training workshop in Dubrovnik, Croatia, for 31 participants from four countries of the WHO European Region. The aim was to train health professionals in standard methods of economic evaluation and to assess regional demand for economic studies to support decision-making on immunization. AMP and the other organizations also supported four national cost-effectiveness studies in the WHO European Region. The assistance included country visits and support over a period of six months, the establishment of multidisciplinary teams of experts, ongoing training on the TRIVAC decision-support model for new

  11. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene

    2018-03-01

    . Frenchman Flat is currently the only UGTA CAU in the CR stage. Sampling requirements for this CAU are described in Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada (NNSA/NFO, 2016).

  12. Prospects for Strengthening the Security of Ukraine’s Energy Supply through Development of Unconventional Natural Gas Production

    Directory of Open Access Journals (Sweden)

    Kyzym Mykola O.

    2016-05-01

    Full Text Available The article presents an analysis of the American experience in development of natural shale gas in the US, identifies the causes that led to the shale revolution. Its current state is characterized by achieving the peak production simultaneously with shift in the emphasis from natural shale gas to shale oil. The potential technically extracted gas reserves as well as trends in terms of the growth of conventional natural gas reserves and the development of trade in liquefied natural gas are regarded as global preconditions for enlargement of the shale natural gas output. Natural shale gas can be considered as an alternative project only for liquefied natural gas while, compared to pipeline gas, its production is uncompetitive. The national preconditions for development of the industry of nonconventional natural gas production are determined on the basis of the current trends in Ukraine’s gas market. The main obstacles to the realization of this direction are reduction of the gas needs and liberalization of natural gas trade on the basis of European principles. Economic evaluation of the feasibility of natural shale gas production made it possible to forecast its production cost at the wellhead at different depths and estimate its investment attractiveness in different aggregate states. On the basis of the approbation of the presented methodological approach carried out for the Dnieper-Donets and Carpathian shale basins, it was concluded that the investment attractiveness of the first one is higher, given its reservoir properties and the presence of deposits of nonconventional hydrocarbons in different states of aggregation.

  13. The National Security Strategy of the United Kingdom: Security in an Interdependent World

    Science.gov (United States)

    2008-03-01

    security architecture has yet to adapt satisfactorily to the new landscape. The UN Security Council has failed to adapt to the rise of new powers. Across...including cinemas , theatres, pubs, nightclubs, restaurants, hotels and commercial centres, hospitals, schools and places of worship); work with architects...and export control regimes, and improving the international monitoring architecture . Countering the threat of nuclear weapons and other weapons of

  14. 78 FR 16471 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Science.gov (United States)

    2013-03-15

    ...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...

  15. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  16. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  17. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Science.gov (United States)

    2010-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice the...

  18. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Science.gov (United States)

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of... applicable): (i) “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS...

  19. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Science.gov (United States)

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or foreign...

  20. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  1. From DDR to Security Promotion: Connecting national programs to community initiatives

    NARCIS (Netherlands)

    Verkoren, W.; Willems, R.C.; Kleingeld, J.; Rouw, H.

    2010-01-01

    Disarmament, demobilization and reintegration (DDR) is a set of activities that forms part of strategies for peacebuilding after civil war. DDR has become the standard way of addressing security threats in immediate post-conflict situations. However, DDR is designed to promote national security,

  2. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  3. 75 FR 51867 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Science.gov (United States)

    2010-08-23

    ... VII (CNS Accounting Operation) NSCC will modify Procedure VII to provide for the tracking of customer.... I. Introduction On June 4, 2010, National Securities Clearing Corporation (``NSCC'') filed with the... 19(b)(1) of the Securities Exchange Act of 1934 (``Act'').\\1\\ The proposed rule change was published...

  4. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Science.gov (United States)

    2011-08-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: In accordance with the Secure Rural Schools and Community Self Determination Act of 2000 (Pub. L. 106-393), [as...

  5. 78 FR 69168 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Science.gov (United States)

    2013-11-18

    ... approve a proposed rule change of a self-regulatory organization if it finds that such proposed rule... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70848; File No. SR-NSCC-2013-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To...

  6. 78 FR 79028 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2013-12-27

    ... finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) By order... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71156; File No. SR-NSCC-2013-13] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change...

  7. Transportation management and security during the 2004 Democratic National Convention

    Science.gov (United States)

    2005-01-05

    The transportation operations plan for the 2004 Democratic National Convention (DNC) in Boston, Massachusetts, was not a typical transportation plan driven by goals such as mobility and air quality. The DNC was the first national political convention...

  8. COLLECTIVE SECURITY AND ITS MECHANISMS IN THE COVENANT OF THE LEAGUE OF NATIONS

    Directory of Open Access Journals (Sweden)

    Gordan Struić

    2017-12-01

    Full Text Available Although the idea of collective security has long existed in the history of international relations, the League of Nations was the first modern international organisation based on the idea of collective security at the global level. In this context, the author aims at giving a systematic review of collective security and its mechanisms comprised in the Covenant of the League of Nations. To this end, after introductory considerations and a short review of the conceptual definition, postulates, roots, and critiques of collective security, the paper discusses its mechanisms in the Covenant of the League of Nations in order to examine, firstly, which provisions encompassed these mechanisms and what they were composed of and secondly, why these mechanisms failed to achieve their purpose. For this reason, the conclusions in this paper rely on a normative analysis of the Covenant of the League of Nations, as well as on the specific examples from the history of international relations during the period considered.

  9. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  10. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  11. An Assessment of the United States National Security Strategy for Combating Terrorism

    National Research Council Canada - National Science Library

    Chambliss, John

    2004-01-01

    .... While terrorism may be simply viewed as a crime against humanity the United States must pursue a comprehensive policy and strategy to deal with such acts anywhere and anytime because they threaten its national security...

  12. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  13. Potential Emissions of Tritium in Air from Wells on the Nevada National Security Site

    International Nuclear Information System (INIS)

    Warren, R.

    2012-01-01

    This slide-show discusses the Nevada National Security Site (NNSS) and tritium in the groundwater. It describes the wells and boreholes and potential airflow from these sources. Monitoring of selected wells is discussed and preliminary results are presented

  14. National Security Strategy: A Flawed Guide to the Future, Political Science

    National Research Council Canada - National Science Library

    Leahy, Michael

    2003-01-01

    The Goldwater-Nichols Defense Department Reorganization Act of 1986 requires the executive branch to periodically provide written documentation of the United States National Security Strategy (NSS). The George W...

  15. The Interagency Breakdown: Why We Need Legislative Reform to Coordinate Execution of the National Security Strategy

    National Research Council Canada - National Science Library

    Borkowski, David C

    2008-01-01

    To meet the national security demands of the 21st century, the U.S. Government's interagency structure and process require legislative reform equivalent to an interagency Goldwater-Nichols Act. The U.S...

  16. U. S. National Security Implications of Chinese Involvement in Latin America

    National Research Council Canada - National Science Library

    Ellis, R. E

    2005-01-01

    In this monograph, the author argues that China's pursuit of longterm strategic objectives is leading the country to increase its presence in Latin America, with serious national security implications...

  17. Striking First: Preemptive and Preventive Attack in U.S. National Security Policy

    National Research Council Canada - National Science Library

    Mueller, Karl P; Castillo, Jasen J; Morgan, Forrest E; Pegahi, Negeen; Rosen, Brian

    2006-01-01

    .... U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by violent nonstate actors and by states from which they might acquire nuclear, biological, or chemical...

  18. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    Science.gov (United States)

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  19. Notification: Follow-up Review of EPA’s Classification of National Security Information

    Science.gov (United States)

    Project #OPE-FY15-0057, July 20, 2015. The EPA OIG plans to begin preliminary research on the OARM actions taken to improve policies and procedures related to the classification of national security information.

  20. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  1. The Role of Non-Governmental Organization (NGO in Advocating the National Security Bill

    Directory of Open Access Journals (Sweden)

    Yusa Djuyandi

    2016-05-01

    Full Text Available The role run by a coalition of NGOs in advocating the National Security Bill aimed at encouraging the birth of national security policy to appropriate to the purpose of reform. However, until now the role of NGOs in advocating National Security Bill has not been able to encourage the authorities to reconstruct the draft of national security policy that is consistent with the objectives of security sector reform. This study is conducted to analyze the role of NGOs in the security sector reform in Indonesia, particularly through the advocacy of the National Security Bill. The method used in this study is a qualitative method. The result shows that NGOs, which are members of the KMSRK, have been running the multiple roles, such as: popularly involved in policy making, providing political education to the community, promoting or encouraging reform, and promoting the interests of the community. The study also suggests the existence of new findings of the role of NGOs, which is forming a coherent unity of interests.

  2. National Security Reform 2010: A Mid-Term Assessment

    Science.gov (United States)

    2011-08-01

    ministration that has not pressed Congress to do the right thing. The poster child for the lack of integrated effort is the challenge of homeland security...26, 2006, available from www.heritage.org/research/lecture/herding-cats-understanding- why-government-agencies- dont -cooperate-and-how-to-fix-the

  3. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  4. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    Science.gov (United States)

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  5. Is further proliferation of nuclear weapons irrelevant to US national security

    International Nuclear Information System (INIS)

    Pendley, R.E.

    1985-01-01

    For almost four decades, the United States has insisted that any increase in the number of states possessing nuclear weapons should be discouraged, claiming that nuclear proliferation would undermine international security and stability, and threaten the national security interests of the United States. This view was clearly emphasized by the Reagan administration when the President stated in 1981 that the basis of US nonproliferation policy was to ''establish the prevention of the spread of nuclear weapons as a fundamental national security and foreign policy objective.'' However, actual implementation of this policy, seeking to obviate moves toward increased regional nuclear capabilities, will call for a variety of bilateral security dealings with so-called problem countries in regions important to the United States, relationships that US governments have been largely chary of so far. It will also require discrimination and forcefulness in identifying the security interests of the United States in these key regions, and crafting specific foreign policies to further those interests

  6. Confusion surrounding the concept of nuclear 'security'. 'Preventing Japan from going nuclear contributes to Japan's national security'?

    International Nuclear Information System (INIS)

    Kubota, Masafumi

    2012-01-01

    A law enacted on June 20 to establish a new Nuclear Regulatory Authority (NRA) fully separated from the nuclear promotional authorities. It added the provision, which says nuclear safety should be guaranteed not only to defend lives, people's health and the environment but also to 'contribute to Japan's national security', to Article 2 of the Atomic Energy Basic Law. NRA integrated the existing regulatory authorities for safety, security and safeguards, into one. Supporters of an amendment quietly slipped into the law were denying it could provide cover for military use of nuclear technology, but arouse international concern about recycling program of extracting plutonium from spent fuels. Nuclear policy minister said: 'The safeguards are in place to prevent nuclear proliferation. The world 'security' precisely means the prevention of nuclear proliferation.' If not used explicitly about safeguards, they left room for stretched interpretation. The author recommended the world' contribute to Japan's national security' should be deleted instead of explaining appropriately, both at home and abroad, the use of nuclear power in Japan limited to peaceful purposes. (T. Tanaka)

  7. Understanding Law Enforcement Support to National Security Problems and Prospects

    National Research Council Canada - National Science Library

    Davies, Jeffrey S

    2008-01-01

    This paper explores law enforcement as an element of national power, defines its contributions, limitations, and challenges, and provides recommendations to maximize interagency competencies and unity...

  8. National Security Issues and Defense Reform in Ukraine

    National Research Council Canada - National Science Library

    Maslovskyi, Sergiy

    2007-01-01

    .... As an important component of national development, military reforms have being initiated and aimed at the transformation of all levels of Ukraine's military organization, which includes the Armed...

  9. The Exon-Florio National Security Test for Foreign Investment

    National Research Council Canada - National Science Library

    Jackson, James K

    2006-01-01

    .... While the United States actively promotes internationally the policy of relaxing rules concerning foreign investment, including the national treatment of foreign firms, some Members of Congress...

  10. National Security and the Accelerating Risks of Climate Change

    Science.gov (United States)

    2014-05-01

    there would be too much. Over the coming decades, projected climate change likely will cause Australia, portions of India , and much of inland China...significant potential water , food, and energy insecurity; political instability; extreme weather events; and other manifestations of climate change ...production, and human sustenance. In light of projected climate change , stresses on the water -food-energy nexus are a mounting security concern

  11. THE NORTHERN BORDER A FORGOTTEN NATIONAL SECURITY THREAT

    Science.gov (United States)

    2017-04-06

    Deputy Director of the DEA, Jack Riley.70 However, they have been seen recently expanding their physical and permanent presence in Canada. In 2015...balanced approach. Notes 1 Jane A. Bullock, George D. Haddow, and Damon P. Coppola, Homeland Security: The Essentials (Waltham, MA : Butterworth -Heinemann...Michoacán Family (La Familia Michoacána or LFM), Knights Templar (Los Caballeros Templarios or LCT), and Los Zetas.” Jack Riley, Acting Deputy

  12. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  13. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    Energy Technology Data Exchange (ETDEWEB)

    Poling, Jeanne; Arnold, Pat [National Security Technologies, LLC (NSTec), P.O. Box 98521, Las Vegas, NV 89193-8521 (United States); Saad, Max [Sandia National Laboratories, P.O. Box 5800, Albuquerque, NM 87185 (United States); DiSanza, Frank [E. Frank DiSanza Consulting, 2250 Alanhurst Drive, Henderson, NV 89052 (United States); Cabble, Kevin [U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States)

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  14. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    International Nuclear Information System (INIS)

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-01-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  15. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  16. Religious Conflicts and Education in Nigeria: Implications for National Security

    Science.gov (United States)

    Ushe, Ushe Mike

    2015-01-01

    The persistent religious conflicts and insecurity in Nigeria has given meaningful Nigerians a cause for deep concern in recent times. Many of them wonder why religion which used to be the cohesive factor and core of national unity, peaceful co-existence and national development has become a tool for political manipulation, violence, destruction of…

  17. Summary of Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  18. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    International Nuclear Information System (INIS)

    Bragg-Sitton, S.; Bess, J.; Werner, J.

    2011-01-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  19. National Security Issues and Defense Reform in Ukraine

    National Research Council Canada - National Science Library

    Maslovskyi, Sergiy

    2007-01-01

    ...: is the Ukrainian nation able to build a modern, independent, and democratic state? Ukraine has created new opportunities for solving current problems, crafting an active foreign and domestic policy based on universal democratic values...

  20. The National Security Strategy of the United States of America

    National Research Council Canada - National Science Library

    Bush, George

    2002-01-01

    ...: freedom, democracy, and free enterprise. In the twenty-first century, only nations that share a commitment to protecting basic human rights and guaranteeing political and economic freedom will be able to unleash the potential...

  1. National Guard Engagement in the Pacific: No Threat to Security

    National Research Council Canada - National Science Library

    Bour, Mark

    2002-01-01

    This thesis evaluates recent decisions to expand the National Guard (NGE) State Partnership Program into the Asia-Pacific region and examines potential effects this expansion will have on the new partners created...

  2. 28 CFR 0.72 - National Security Division.

    Science.gov (United States)

    2010-07-01

    .... 1203); terrorist acts abroad, including murder, against United States nationals (18 U.S.C. 2332); acts... to murder, kidnap, or maim persons or to damage property overseas (18 U.S.C. 956); providing material...

  3. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-11-23

    ...: [email protected]hq.dhs.gov . Include the docket number in the subject line of the email message. Fax: (703) 235... receive an update from the Cloud Computing Subcommittee, and receive an update on the National Public...

  4. Turning on the Dime: Diplomacy's Role in National Security

    National Research Council Canada - National Science Library

    Smith, Anton K

    2007-01-01

    The differences in approach and culture between the U.S. Departments of State and Defense are stark despite the fact that these organizations are members of the same team and share related national objectives...

  5. Homeland Security: Protecting Airspace in the National Capital Region

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    .... While the administration is currently seeking to make the airspace restrictions in the National Capital Region permanent, Congress has pushed for an easing of restrictions on GA aircraft at Ronald...

  6. THE CYBERSECURITY OF AUTOMATED CONTROL SYSTEMS AS A KEY COMPONENT OF NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Galin R. Ivanov

    2016-10-01

    Full Text Available This article focuses on the current problems raised by the necessity to provide and ensure national cybersecurity. Moreover, it suggests measures for adequate counteraction to present-day cyber threats to automated control systems employed in the sector of national security.

  7. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  8. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    Science.gov (United States)

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  9. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Science.gov (United States)

    2010-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security program...

  10. Cost of Peace Accounting and National Security in Nigeria: Does it Really Matter?

    Directory of Open Access Journals (Sweden)

    Okoro Godsday Edesiri

    2016-12-01

    Full Text Available Purpose of the article: The cost of ensuring national security is very high, but measuring this cost has received little attention. One way of reacording and ascertaining the financial resources expended on national security is via Peace Accounting. Peace Accounting is an innovative idea that is taking a firm root in Nigeria and the world over. Peace accounting deals with ascertaining and reporting the financial resources accompanying domestic violence such as insecurity, political violence, insurgency, militancy, economic predicament, corruption and all other costs associated with national security. Methodology/methods: Secondary data were obtained from the Central Bank of Nigeria Statistical Bulletin and the International Monetary Fund Cross Country Macroeconomic Statistics from 1996–2015. Ordinary Least Square estimation technique was employed in analyzing the data and analysis performed via SPSS. Scientific aim: This paper gauged the costs of peace accounting and its implication for national security in Nigeria. Findings: The study found that expenditure on internal security, cost of peace keeping and gross fixed capital formation are dynamics of peace accounting. Furthermore, cost of peace keeping is statistically significant except that expenditure on internal security and gross fixed capital formation were statistically flawed. Expenditure on internal security has negative impact on GPI. Conclusions: On the basis of the above, we recommend among others that countries like Nigeria faced with security challenges should engage professionals/experts that can help develop peace accounting models aimed at measuring the cost of peace. Also, special attention should be paid to expenditure on internal security since it has negative effect on GPI.

  11. Transforming the Roles of a Public Extension Agency to Strengthen Innovation: Lessons from the National Agricultural Extension Project in Bangladesh

    Science.gov (United States)

    Chowdhury, Ataharul Huq; Odame, Helen Hambly; Leeuwis, Cees

    2014-01-01

    Purpose: The rapidly evolving nature of agricultural innovation processes in low-income countries requires agricultural extension agencies to transform the classical roles that previously supported linear information dissemination and adoption of innovation. In Bangladesh, strengthening agricultural innovation calls for facilitation of interactive…

  12. Minapadi Development Strategy in Supporting National Food Security

    Science.gov (United States)

    Lestari, Sri; Bambang, Azis Nur

    2018-02-01

    Efforts to achieve food security, especially food self-sufficiency, face severe challenges. Intensification needs to be done in optimizing the existing land by applying integrated agriculture. One of them is by integrating agriculture and fishery aspect with implementation of minapadi. Minapadi cultivation has actually grown since a long time, but in the course of time this system Began displaced because of pesticides and chemical fertilizers. Become flagship Minapadi back in line with the increasing public awareness of the importance of sustainable environment, health, increasing demand for organic products that are free from pesticide residues which means safe for consumption. Minapadi is the answer to the fulfillment of people's need for carbohydrate and protein food. Blending the fulfillment of carbohydrates is rice as the staple food of most people with the fulfillment of animal protein from fish commodities to add nutritional value. In realizing the food security strategy is required Minapadi development. This descriptive research aims to find out various minapadi development strategies in several regions with different methods based on the literature and previous studies. The result is the formulation of minapadi development strategy in an area not necessarily can be applied in other areas.This occurs because of differences in setting criteria/ variables based on the characteristics and potential of a region, the strengths and opportunities, as well as the weaknesses and threats that the area may encounter.

  13. 17 CFR 249.803 - Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

    Science.gov (United States)

    2010-04-01

    ... consolidated supplement of a national securities association or an affiliated securities association. 249.803... Registration of and Reporting by National Securities Associations and Affiliated Securities Associations § 249.803 Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

  14. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  15. Niger Delta Crisis and Security Implications for the Nation State ...

    African Journals Online (AJOL)

    The Niger Delta is the nation's treasure base, the Niger Delta provides over 80 percent of government revenue, 95 percent of export receipts, and 90 percent of ... The government should tackle the fundamental issue of basic necessities – provision of good motorable roads, pipe borne water, electricity, good hospitals, good ...

  16. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-10-23

    .... Please note that the meeting may close early if the committee has completed its business. ADDRESSES: The... Commission will brief members on its cybersecurity activities. Finally, the EOP will facilitate a roundtable discussion with members on the National Institute of Standards and Technology's Cybersecurity Framework...

  17. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-02-09

    ... instructions for submitting written comments. Email: [email protected]hq.dhs.gov . Include the docket number in the... Schaffer, Assistant Secretary for Cybersecurity and Communications, an update on the Cloud Computing Subcommittee from Mr. Mark McLaughlin, Chair of the Cloud Computing Subcommittee, and an update on the National...

  18. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    Gross Domestic Product GMO Genetically Modified Organisms HDL High Density Lipo Protein xiv HFCS High Fructose Corn Syrup LDL Low Density Lipo...index and as little of any processed or modified GMO grains. There is a means to return the nation to a healthier food state and also increase local

  19. U.S. Army War College Guide to National Security Issues. Third Edition, Volume 2. National Security Policy and Strategy

    Science.gov (United States)

    2008-06-01

    Great cautioned: “Diplomacy without arms is music without instruments.” So did John F. Kennedy: “Diplomacy and defense are not substitutes for one... Tourism Administration Federal Communications Commission National Oceanic & Atmospheric Agency Federal Maritime Commission National Marine Fisheries...legitimate objects of attack in war and others are not. All recognized that there were times, seasons, and religious festivals , etc. during which warfare

  20. Legitimizing Vetoes : A Discourse Analysis of How Vetoes are Motivated in the United Nations Security Council

    OpenAIRE

    Wernersson, Hanna

    2016-01-01

    How is a veto justified? Within the discipline of International Relations, discourse analysis is gaining a higher status. However, there is a surprising lacuna in the literature as a discursive approach to the veto in the United Nations Security Council, is yet to be taken. This is unfortunate, given the Security Council’s prominence. The way in which the council members make meaning through their word choice has profound effects for politics in the international system. There is, nonetheless...