WorldWideScience

Sample records for united states securities

  1. IAEA Completes Nuclear Security Review Mission in United States

    International Nuclear Information System (INIS)

    2013-01-01

    Full text: A team of nuclear security experts led by the International Atomic Energy Agency (IAEA) today completed a mission to review nuclear security practices of civil nuclear facilities licensed by the United States Nuclear Regulatory Commission (NRC). Conducted at the U.S. Government's request, the two-week International Physical Protection Advisory Service (IPPAS) mission reviewed the United States' nuclear security-related legislative and regulatory framework. As part of this work, the IPPAS team, led by John O'Dacre of Canada and comprising nine experts from eight IAEA Member States, met with NRC officials and reviewed the physical protection systems at the Center for Neutron Research (NCNR) at the National Institute of Standards and Technology. The IPPAS team concluded that nuclear security within the U.S. civil nuclear sector is robust and sustainable and has been significantly enhanced in recent years. The team identified a number of good practices in the nation's nuclear security regime and at the NCNR. The IPPAS team also made a recommendation and some suggestions for the continuing improvement of nuclear security overall. The mission in the United States was the 60th IPPAS mission organized by the IAEA. 'Independent international peer reviews such as IAEA IPPAS missions are increasingly being recognized for their value as a key component for exchanges of views and advice on nuclear security measures', said Khammar Mrabit, Director of the IAEA Office of Nuclear Security. 'The good practices identified during this mission will contribute to the continuous improvements of nuclear security in other Member States'. The IPPAS team provided a draft report to the NRC and will submit a final report soon. Because it contains security-related information about a specific nuclear site, IPPAS reports are not made public. 'The IPPAS programme gives us a chance to learn from the experience and perspective of our international partners', said NRC Chairman Allison M

  2. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  3. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Science.gov (United States)

    2010-07-01

    ... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities of the United States. The existing distinctive papers shall be used for the printing of interest...

  4. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  5. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Science.gov (United States)

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of...: United States Coast Guard Auxiliary Database (AUXDATA). Security classification: Unclassified. System...

  6. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  7. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  8. The welfare state, pensions, privatization: the case of Social Security in the United States.

    Science.gov (United States)

    Du Boff, R B

    1997-01-01

    In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.

  9. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  10. An assessment of the cyber security legislation and its impact on the United States electrical sector

    Science.gov (United States)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  11. An Assessment of the United States National Security Strategy for Combating Terrorism

    National Research Council Canada - National Science Library

    Chambliss, John

    2004-01-01

    .... While terrorism may be simply viewed as a crime against humanity the United States must pursue a comprehensive policy and strategy to deal with such acts anywhere and anytime because they threaten its national security...

  12. United States and Israeli Homeland Security: A Comparative Analysis of Emergency Preparedness Efforts

    National Research Council Canada - National Science Library

    Pockett, Consuella B

    2005-01-01

    This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland Security's Emergency Preparedness and Response directorate and the Israel Defense Forces Home Front Command...

  13. Presidential elections in the United States: implications for international and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    In conclusion it should be noted that the full implementation of D. Trump’s plans for international and European security will depend on how the declared initiatives will correspond to his real actions. Perhaps this would require more than a year, but now the world and the European community must be ready for serious structural and geopolitical changes. The presence of a number of acute problems makes the role of the United States in the process of ensuring international and European security hardly predictable.

  14. Securing the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  15. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  16. 75 FR 9238 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-03-01

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  17. Increasing the resilience and security of the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  18. The united states and the world oil security. US oil policy and production of a global collective good

    International Nuclear Information System (INIS)

    Noel, P.

    2004-07-01

    The aim of this paper is to define and discusses the part of the Unites States in the world oil system operating and more particularly the US oil security policy in the world policy. It refutes some established ideas as the necessity of the US military supremacy to provide the oil security, the necessity of ''agreements'' with oil exporting countries facing the US energy consumption increase or the limitation of the resources access to other countries. At the opposite the United States seem to invest in the production of a global public good in matter of energy security. In order to illustrate this opinion the author defines the problem of the US oil security in a world context. He analyzes then the US policies to show the impacts in the world oil security and studies the specific part of the military factor in the security policy. (A.L.B.)

  19. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  20. 26 CFR 1.864-2 - Trade or business within the United States.

    Science.gov (United States)

    2010-04-01

    ... States, as his agent to effect transactions in the United States in stocks and securities for the account... A ordinarily effects transactions in the United States in stocks or securities. Under the agency..., effects transactions in the United States in stocks or securities for the partnership's own account or...

  1. 7 CFR 1212.32 - United States Customs Service.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States Customs Service. 1212.32 Section 1212... § 1212.32 United States Customs Service. “United States Customs Service” or “Customs” means the United States Customs and Border Protection, an agency of the Department of Homeland Security. Honey Packers and...

  2. Statement at NRC International Regulators Conference on Nuclear Security, 4 December 2012, Washington, United States

    International Nuclear Information System (INIS)

    Amano, Y.

    2012-01-01

    I would like to begin by thanking NRC Chairman Allison Macfarlane for hosting this first regulatory Conference on nuclear security involving regulators, law enforcement agencies and the IAEA. The United States has been a very important partner in the IAEA's nuclear security activities right from the start. It is by far the largest donor to our Nuclear Security Fund. It has actively supported our programmes and has been generous in providing funding, equipment and training to other Member States. When President Obama hosted the first Nuclear Security Summit in April 2010, he said it was important that that event should be part of a ''serious and sustained effort'' to improve nuclear security throughout the world. Since then, a growing number of governments have given high-level attention to this vitally important issue. This is very encouraging. Today, I am especially pleased to see regulators coming together to focus on this subject. I am confident that your meeting will make a valuable contribution to strengthening global nuclear security. I would like to share with you some important recent milestones in the IAEA's nuclear security work. As you know, primary responsibility for ensuring nuclear security lies with national governments. However, governments have recognized that international cooperation is vital. Terrorists and other criminals do not respect international borders and no country can respond effectively on its own to the threat which they pose. In September, our Member States - there are now 158 - reaffirmed the central role of the IAEA in e nsuring coordination of international activities in the field of nuclear security, while avoiding duplication and overlap . Our central role reflects the Agency's extensive membership, our mandate, our unique expertise and our long experience of providing technical assistance and specialist, practical guidance to countries. To put it simply, our work focuses on helping to minimize the risk of nuclear and other

  3. 6 CFR 13.45 - Deposit in Treasury of United States.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Deposit in Treasury of United States. 13.45 Section 13.45 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.45 Deposit in Treasury of United States. All amounts collected pursuant to this part...

  4. SECURITY IN SUSTAINABLE DEVELOPMENT: COMPARING UNITED NATIONS 2030 AGENDA FOR SUSTAINABLE DEVELOPMENT WITH MILLENNIUM DECLARATION

    Directory of Open Access Journals (Sweden)

    Ahmet BARBAK

    2017-06-01

    Full Text Available This study aims to compare United Nations 2030 Agenda for Sustainable Development with Millennium Declaration in terms of their security conceptualizations to explore changes in security thinking and policy components (goals, targets, principles, priorities etc. over time. In doing so, it is envisaged that United Nations’ expectations from member states regarding their national security policies and organizations could be revealed. Security thinking has changed since late 1980’s with the introduction of sustainable development approach by the United Nations. This shift in security thinking encompasses human security and security-development nexus. Holding all member states responsible, Millennium Declaration and 2030 Agenda for Sustainable Development constitute the primary and the most recent outcome documents of United Nations’ sustainable development policy. Both documents have security components. This enables extracting security elements and comparing them with an analytical manner. Consequently, findings are compared and discussed in terms of public policy and organization at national level.

  5. The Energy Puzzle Between the United States and China

    Science.gov (United States)

    2013-03-01

    securing China’s status as a great power.2 As of 2011, China is the second largest consumer of natural resources (oil, liquefied petroleum gas ( LPG ...pursuit of natural resources, (oil, natural gas , coal or renewable energy sources) is reshaping the world’s energy security. The United States is...pursuit of natural resources, (oil, natural gas , coal or renewable energy sources) is reshaping the world’s energy security. The United States is

  6. United States Strategy for Mexico

    National Research Council Canada - National Science Library

    Centner, Robert C

    2005-01-01

    The security and stability of Mexico is of national interest to the United States, and a strong, effective alliance between the two countries is pivotal to our national defense strategy and economic prosperity...

  7. 33 CFR 2.38 - Waters subject to the jurisdiction of the United States; waters over which the United States has...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Waters subject to the jurisdiction of the United States; waters over which the United States has jurisdiction. 2.38 Section 2.38 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL JURISDICTION...

  8. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  9. Energy problems of the United States

    International Nuclear Information System (INIS)

    Pertuzio, A.

    2006-01-01

    The united states are the third world producer of oil which accounts for 440% of world production and 20 million barrels/day of which 60% are imported. That dependence on imports is likely to increase in the next decades. Such supplies and their security are therefore a fundamental factor of the United States foreign policy in combination with their political, economic and strategic objectives in a world both unsure and dangerous

  10. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  11. United States Responses to Japanese Wartime Inhuman Experimentation after World War II: National Security and Wartime Exigency

    Science.gov (United States)

    Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul

    2015-01-01

    In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743

  12. Unites States and the oil of the Middle-East

    International Nuclear Information System (INIS)

    Noel, P.

    2005-08-01

    The author discusses different aspects of the United States intervention and behavior in the Middle-East petroleum management. The Iraq and Iran potentials are largely under used. The Saudi Arabia defines its own oil policy, but benefits of the Unites States military help. The United States intervention is in the domain of the security of flux on the world market. (A.L.B.)

  13. Promoting Safe, Secure, and Peaceful Growth of Nuclear Energy: Next Steps for Russia and the United States

    OpenAIRE

    Bunn, Matthew G.; Vyacheslav P. Kuznetzov

    2010-01-01

    Russia, the United States and other countries must cooperate to enable large-scale growth of nuclear energy around the world while achieving even higher standards of safety, security, and nonproliferation than are in place today. This will require building a new global framework for nuclear energy, including new or strengthened global institutions. The Belfer Center's Managing the Atom (MTA) Project and the Russian Research Center's Kurchatov Institute developed these and additional recommend...

  14. 77 FR 64031 - United States-Peru Trade Promotion Agreement

    Science.gov (United States)

    2012-10-18

    ... Trade Promotion Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States-Peru Trade Promotion Agreement... other customs-related provisions of the United States-Peru Trade Promotion Agreement (PTPA). Please...

  15. United States Military in Central Asia: Beyond Operation Enduring Freedom

    Science.gov (United States)

    2009-10-23

    Malinowski , advocacy director for Human Rights Watch, stated, “the United States is most effective in promoting liberty around the world when people...26 U.S. President, The National Security Strategy of the United States of America, page? 27 Thomas Malinowski , “Testimony

  16. Contemporary United States Foreign Policy Towards Indonesia

    National Research Council Canada - National Science Library

    McAslan, Hugh

    2004-01-01

    United States national interests in Indonesia have traditionally being based on strategic security requirements given Indonesia's geographic location between the Indian and Pacific Oceans, and strong...

  17. United States Energy Policy: Security Not Independence

    Science.gov (United States)

    2013-03-01

    on leased land, ensuring fracking is done responsibly, and getting more natural gas and hybrid systems into U.S. mass transit. Internationally, the...fewer environ disturbances -Can store underground -Environ impacts of fracking unknown -uses large amount of water -potential for saline...from shale continues to rise as the United States determines how to drill safely. However, the impact of fracking on the environment is still

  18. Neuroscience, ethics, and national security: the state of the art.

    Directory of Open Access Journals (Sweden)

    Michael N Tennison

    Full Text Available National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  19. Neuroscience, ethics, and national security: the state of the art.

    Science.gov (United States)

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  20. Communication dated 4 March from the Governor for the Russian Federation and the Resident Representatives of China, France, Germany, the United Kingdom and the United States of America concerning UN Security Council resolution 1803 (2008)

    International Nuclear Information System (INIS)

    2008-01-01

    The Director General has received a letter dated 4 March 2008 from the Governor for the Russian Federation and the Resident Representatives of China, France, Germany, the United Kingdom and the United States of America, attaching the text of a statement agreed by the Foreign Ministers of China, France, Germany, Russia, the United Kingdom and the United States of America, with the support of the High Representative of the European Union and read by the Permanent Representative of the United Kingdom on the occasion of the adoption on 3 March 2008 of United Nations Security Council resolution 1803 (2008). The letter and, as requested therein, the attached text, are herewith circulated for the information of Member States

  1. Reflective practices at the Security Council: Children and armed conflict and the three United Nations.

    Science.gov (United States)

    Bode, Ingvild

    2018-06-01

    The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.

  2. Nuclear power in the United States

    International Nuclear Information System (INIS)

    Johnston, J.B.

    1985-01-01

    All over the world except in the United States, nuclear energy is a low cost, secure, environmentally acceptable form of energy. In the United States, civilian nuclear power is dead. 112 nuclear power plants have been abandoned or cancelled in the last decade, and there has been no new order for nuclear plants since 1978. It will be fortunate to have 125 operating nuclear plants in the United States in the year 2000. There are almost 90 completed nuclear power plants and about 45 under construction in the United States, but several of those under construction will eventually be abandoned. About 20 % of the electricity in the United States will be generated by nuclear plants in 2000 as compared with 13 % supplied in the last year. Under the present regulatory and institutional arrangement, American electric utilities would not consider to order a new nuclear power plant. Post-TMI nuclear plants became very expensive, and there is also ideological opposition to nuclear power. Coal-firing plants are also in the similar situation. The uncertainty about electric power demand, the cost of money, the inflation of construction cost and regulation caused the situation. (Kako, I.)

  3. Security central processing unit applications in the protection of nuclear facilities

    International Nuclear Information System (INIS)

    Goetzke, R.E.

    1987-01-01

    New or upgraded electronic security systems protecting nuclear facilities or complexes will be heavily computer dependent. Proper planning for new systems and the employment of new state-of-the-art 32 bit processors in the processing of subsystem reports are key elements in effective security systems. The processing of subsystem reports represents only a small segment of system overhead. In selecting a security system to meet the current and future needs for nuclear security applications the central processing unit (CPU) applied in the system architecture is the critical element in system performance. New 32 bit technology eliminates the need for program overlays while providing system programmers with well documented program tools to develop effective systems to operate in all phases of nuclear security applications

  4. Securing Fatherhood through Kin Work: A Comparison of Black Low-Income Fathers and Families in South Africa and the United States

    Science.gov (United States)

    Madhavan, Sangeetha; Roy, Kevin

    2012-01-01

    In this article, the authors examine how low-income Black men in South Africa and the United States work with their kin to secure fathering and ensure the well-being of children. They use ethnographic and life history data on men who fathered children from 1992 to 2005 to demonstrate how fathers' roles as kin workers enable them to meet culturally…

  5. The association between state attachment security and state Mindfulness.

    Directory of Open Access Journals (Sweden)

    Christopher A Pepping

    Full Text Available Recent research suggests that attachment and mindfulness are related, though the nature of this association is unclear. Here we present two studies examining whether there is a causal relationship between state attachment and state mindfulness. Study 1 investigated the effects of experimentally increasing state mindfulness on state attachment security. State mindfulness was successfully enhanced, but this led to no change in state attachment security. Study 2 investigated the effects of experimentally enhancing state attachment security on state mindfulness. State attachment security was successfully enhanced, but this did not lead to any change in state mindfulness. These findings suggest that there is not a direct, immediate causal relationship between state attachment and state mindfulness as a result of brief experimental manipulations. Future research should examine these associations in longer term interventions.

  6. National Security Strategy of the United States of America

    Science.gov (United States)

    2017-12-18

    build new partnerships based on the principle of reciprocity. Economic tools—including sanctions, anti-mon- ey- laundering and anti-corruption...parency, and help ensure that money reaches its intended destination. INCENTIVIZE REFORMS: The United States will use diplomacy and assistance to

  7. 78 FR 32356 - United States-Korea Free Trade Agreement

    Science.gov (United States)

    2013-05-30

    ...-Korea Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... treatment and other customs-related provisions of the United States-Korea Free Trade Agreement entered into...-Korea Free Trade Agreement (hereinafter ``UKFTA'' or the ``Agreement''). On December 3, 2010, the United...

  8. 78 FR 60191 - United States-Colombia Trade Promotion Agreement

    Science.gov (United States)

    2013-10-01

    ... Trade Promotion Agreement AGENCY: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States- Colombia Trade Promotion... States-Colombia Trade Promotion Agreement (``CTPA'' or ``Agreement''), and on June 28, 2007, the Parties...

  9. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory

  10. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.

  11. The United States' Second Major Theater of War: A Bridge Too Far?

    National Research Council Canada - National Science Library

    Christie, R. A

    2000-01-01

    The United States National Security Strategy (NSS), as set forth by President William Jefferson Clinton in 1998, articulated the "Imperative for Engagement" abroad in order to remain secure at home in the aftermath of the "Cold War...

  12. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  13. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  14. 31 CFR 515.321 - United States; continental United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States; continental United... General Definitions § 515.321 United States; continental United States. The term United States means the United States and all areas under the jurisdiction or authority thereof, including the Trust Territory of...

  15. 31 CFR 500.321 - United States; continental United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States; continental United... General Definitions § 500.321 United States; continental United States. The term United States means the United States and all areas under the jurisdiction or authority thereof, including U.S. trust territories...

  16. 31 CFR 535.321 - United States; continental United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States; continental United... General Definitions § 535.321 United States; continental United States. The term United States means the United States and all areas under the jurisdiction or authority thereof including the Trust Territory of...

  17. Use of Security Officers on Inpatient Psychiatry Units.

    Science.gov (United States)

    Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B

    2018-04-02

    Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, pSecurity officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.

  18. Migration Reform in the United States: Perspectives of Change and Continuity

    Directory of Open Access Journals (Sweden)

    Marco Vinicio Méndez Coto

    2017-06-01

    Full Text Available The article proposes an analysis of migration from the perspective of security (as it has been addressed by countries such as the United States mainly receiving international immigrants, and within the terrorism and the prevention context in which the international community is. The complexity of the migration issue has an impact on changes in the United States internal policy and generates transformations in the immigration system. These transformations appear in certain aspects like those contemplated in the Border Security, Economic Opportunity, and Immigration Modernization Bill (S.744 which was promoted by the President Obama. This section explains the process of change in the American political and electoral panorama since 2008 elections, the Latin America role in the foreign policy of Obama’s administration, the growing electoral power of Hispanic descendant population in the United States, the current situation of the immigrant population in an irregular administrative situation, and the current context of the bill within the American political system.

  19. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  20. 20 CFR 408.228 - When do we consider you to be residing outside the United States?

    Science.gov (United States)

    2010-04-01

    ... outside the United States? 408.228 Section 408.228 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS SVB Qualification and Entitlement Residence Outside the United States § 408.228 When do we consider you to be residing outside the United States? (a) Effect of...

  1. Rapanos v. United States & Carabell v. United States

    Science.gov (United States)

    Documents associated with guidance for implementing the definition of waters of the United States under the Clean Water Act following the Rapanos v. United States, and Carabell v. United States Supreme Court decision.

  2. Turkey’s New Regional Security Role: Implications for the United States

    Science.gov (United States)

    2014-09-01

    organizational reform, economic restructuring, and integrating recent members. Efforts to develop a Eu- ropean Security and Defense Identity (ESDI...the fed- eral state of Iraq. Turkish officials have also developed ties with moderate Kurdish leaders such as Iraqi Pres- ident Jalal Talabani and...most vis- ible presence is its pop culture, especially cinema , and Turkish goods. Turkish clothes, furniture, toys, build- ing materials, and other

  3. Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Long, J.D.

    2013-01-01

    The IAEA has described the Safeguards by Design (SBD) concept as an approach in which international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning. Often, international safeguards features are added following completion of the facility design. Earlier consideration of safeguards features has the potential to reduce the need for costly re-designs or retrofits of the facility and can result in a more efficient and effective safeguards design. The U.S. Department of Energy's National Nuclear Security Administration (NNSA) initiated a project in 2008 through its Next Generation Safeguards Initiative (NGSI) to establish a global norm for the use of SBD. The NGSI SBD program is evolving in parallel with a similar effort at the IAEA, while taking into account the IAEA's SBD achievements and future plans. The NGSI program includes DOE laboratory studies, international workshops, engagement with industry and the IAEA, and setting an example through its planned use in new nuclear facilities in the United States. Consistent with this effort, the NGSI program has sponsored 'Lessons Learned' studies and the preparation of facility-specific SBD Guidance documents. The NGSI program also takes into account successes that the NNSA has had with implementing safeguards early into facility designs within the U.S. The purpose of this paper is the presentation of the most recent developments in SBD under NGSI within the U.S. as well as the presentation of 'Lessons Learned' integrating safeguards into new nuclear facility designs of the U.S. Nuclear Security Enterprise (NSE), namely the Uranium Processing Facility (UPF) project at the Y-12 National Security Complex in Oak Ridge, Tennessee and to discuss its relevance to international safeguards. The paper is followed by the slides of the presentation. (author)

  4. 8 CFR 215.4 - Procedure in case of alien prevented from departing from the United States.

    Science.gov (United States)

    2010-01-01

    ... departing from the United States. 215.4 Section 215.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROLS OF ALIENS DEPARTING FROM THE UNITED STATES § 215.4 Procedure in case of alien prevented from departing from the United States. (a) Any alien, other than an enemy alien, whose departure...

  5. The United States and world energy markets

    International Nuclear Information System (INIS)

    Ramsay, W.C.

    1992-01-01

    The United States, dominating the world's energy markets as a producer and consumer, is sensitive to changes in this market and intends to influence the development of global energy policy. Supply will be increased by nations such as Venezuela, Indonesia and perhaps in the future a United Yemen and the Commonwealth of Independent States, moving to freer market economies which will allow investment opportunities previously inaccessible to foreign companies. Although world energy demand will grow, little of this will be in the US where, under the National Energy Strategy, comprehensive measures are being introduced to improve energy efficiency. The US energy security will be further improved by such measures as diversification of supply, larger domestic production and increasing interdependence between suppliers, traders and consumers. (author)

  6. Estimates of the Resident Nonimmigrant Population in the United States: 2008

    Data.gov (United States)

    Department of Homeland Security — This report presents estimates on the size and characteristics of the resident nonimmigrant population in the United States in 2008.1 The estimates were based on...

  7. 8 CFR 215.2 - Authority of departure-control officer to prevent alien's departure from the United States.

    Science.gov (United States)

    2010-01-01

    ... prevent alien's departure from the United States. 215.2 Section 215.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROLS OF ALIENS DEPARTING FROM THE UNITED STATES § 215.2 Authority of departure-control officer to prevent alien's departure from the United States. (a) No alien...

  8. 76 FR 65365 - United States-OMAN Free Trade Agreement

    Science.gov (United States)

    2011-10-21

    ... Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... other customs-related provisions of the United States--Oman Free Trade Agreement entered into by the... the U.S.-Oman Free Trade Agreement (``OFTA'' or ``Agreement''). The provisions of the OFTA were...

  9. An Analytical Review of the United States National Interests in Korea

    National Research Council Canada - National Science Library

    Swope, Frederick

    2004-01-01

    ... and interests for continued security on the peninsula and in the region. It will address these new growing tensions and review the United States National interests and policy differences with South Korea...

  10. What Can the United States Learn from India to Counter Terrorism?

    National Research Council Canada - National Science Library

    Latimer, William

    2004-01-01

    Terrorism is the principal threat to global and national security in the post-11 September world, Facing terrorist threats at home and abroad, the United States has declared counterterrorism its top priority...

  11. United States Foreign Policy and the Second Liberian Civil War

    African Journals Online (AJOL)

    chifaou.amzat

    2013-09-28

    Sep 28, 2013 ... Council for the Development of Social Science Research in Africa, 2013 .... Diaspora groups based in the United States to intervene in the war. Ulti- .... take security sector reform as required by the Abuja II Peace Accord.

  12. United States Army Weapon Systems 2010

    Science.gov (United States)

    2009-09-18

    equipment, tractor, van, wrecker, 8.8-ton Load Handling System (LHS), 8.8-ton LHS trailer, and 10-ton dump truck models). Three truck variants and...NJ) hydraulic pump and motor: Vickers (Jackson, MS) 131 UnIteD StAteS Army ACqUISItIon phASe InveStment Component High Mobility Engineer Excavator...MEDEVAC and hoist configuration, the UH-72A is also being fielded in a VIP, National Guard Homeland Security (HLS) and a Combined Training Center

  13. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  14. Information Assurance within the United States Air Force

    Science.gov (United States)

    Cherry, John D.

    2010-01-01

    According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…

  15. How to Fund Homeland Security without Federal Dollars: State and Local Funding of Homeland Security Initiatives in Light of Decreased Support by the Federal Government

    National Research Council Canada - National Science Library

    Emler, Jay S

    2008-01-01

    .... This thesis, therefore, examined alternatives states and local units of government might use to fund homeland security initiatives, ranging from conventional alternatives such as, asset forfeiture...

  16. Energy policies of IEA countries: United States - 2007 review

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-02-15

    The United States is the largest economy and energy user in the world. Significant developments have taken place in its energy policy since the last IEA review in 2002. Most important is the Energy Policy Act 2005 - a comprehensive energy legislation which has set new directions, including opening the way for a nuclear renaissance. Two closely connected challenges shape all debates on the nation's energy policy path: how to increase security by reducing the dependence on imported supplies; and how to address growing emissions of greenhouse gases. The United States national strategy is to find solutions largely through technology. It is a world leader in R&D and is driving development of carbon capture and storage and second-generation biofuels. But thus far, no federal government policy is in place to establish as a target an absolute reduction of CO2 emissions. The resulting uncertainty risks holding back investments into new technologies and may delay projects that are urgently required. The transport sector will be a key to a sustainable success. In the short to medium term, reduced fuel demand through higher vehicle efficiency will increase security and reduce CO2 emissions. Yet the policy for the revision of CAFE (the corporate average fuel economy) standards will leave consumers with vehicles that fall short of the technological possibilities. This review takes an in-depth look at these issues and provides recommendations on how the United States can do more to answer the challenges of both improving its security of energy supply and lowering its emissions intensity, demonstrating the significant improvements that can already be realised through existing technologies.

  17. Energy policies of IEA countries: United States - 2007 review

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-02-15

    The United States is the largest economy and energy user in the world. Significant developments have taken place in its energy policy since the last IEA review in 2002. Most important is the Energy Policy Act 2005 - a comprehensive energy legislation which has set new directions, including opening the way for a nuclear renaissance. Two closely connected challenges shape all debates on the nation's energy policy path: how to increase security by reducing the dependence on imported supplies; and how to address growing emissions of greenhouse gases. The United States national strategy is to find solutions largely through technology. It is a world leader in R&D and is driving development of carbon capture and storage and second-generation biofuels. But thus far, no federal government policy is in place to establish as a target an absolute reduction of CO2 emissions. The resulting uncertainty risks holding back investments into new technologies and may delay projects that are urgently required. The transport sector will be a key to a sustainable success. In the short to medium term, reduced fuel demand through higher vehicle efficiency will increase security and reduce CO2 emissions. Yet the policy for the revision of CAFE (the corporate average fuel economy) standards will leave consumers with vehicles that fall short of the technological possibilities. This review takes an in-depth look at these issues and provides recommendations on how the United States can do more to answer the challenges of both improving its security of energy supply and lowering its emissions intensity, demonstrating the significant improvements that can already be realised through existing technologies.

  18. Nuclear material control and accounting safeguards in the United States

    International Nuclear Information System (INIS)

    Woltermann, H.A.; Rudy, C.R.; Rakel, D.A.; DeVer, E.A.

    1982-01-01

    Material control and accounting (MC and A) of special nuclear material (SNM) must supplement physical security to protect SNM from unlawful use such as terrorist activities. This article reviews MC and A safeguards of SNM in the United States. The following topics are covered: a brief perspective and history of MC and A safeguards, current MC and A practices, measurement methods for SNM, historical MC and A performance, a description of near-real-time MC and A systems, and conclusions on the status of MC and A in the United States

  19. Inspection of licensed nuclear power plants in the United States

    International Nuclear Information System (INIS)

    Thornburg, H. D.

    1977-01-01

    Inspection of licensed nuclear power plants in the United States is performed by the Office of Inspection and Enforcement (IE), United States Nuclear Regulatory Commission. IE has several key functions : a) Inspection of licensees and investigation of incidents, occurrences and allegations. b) Detection and correction of safety and security problems. c) Enforcement of rules, regulations, and Commission orders. d) Feedback to the industry and others regarding safety experience. e) Informing the public and others. Major enforcement actions and events involving operating power reactors for the past several years will be summarized. (author)

  20. 75 FR 409 - Privacy Act of 1974; United States Citizenship and Immigration Services-010 Asylum Information...

    Science.gov (United States)

    2010-01-05

    ... 1974; United States Citizenship and Immigration Services--010 Asylum Information and Pre-Screening... system of records to the Department of Homeland Security's inventory, entitled Unites States Citizenship... Citizenship and Immigration Services (202-272-1663), 20 Massachusetts Avenue, NW., 3rd Floor, Washington, DC...

  1. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  2. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  3. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  4. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  5. An Analysis of United States Marine Corps Enlisted Entry-Level Training Using Supply Chain and Operations Management

    Science.gov (United States)

    2010-12-01

    An Analysis of United States Marine Corps Enlisted Entry-Level Training Using Supply Chain and Operations Management ______________________________________ By...Report 4. TITLE AND SUBTITLE: An Analysis of United States Marine Corps Enlisted Entry-Level Training Using Supply Chain and Operations Management 6...Level Training; United States Marine Corps; Operations Management ; Supply Chain Management; Process Analysis 16. PRICE CODE 17. SECURITY

  6. Foreign direct investment in the United States and u.s. Interests.

    Science.gov (United States)

    Graham, E M

    1991-12-20

    Foreign direct investment entered the United States at unprecedented rates during the second half of the 1980s. The result has been much higher levels of foreign ownership of U.S. economic activities than those to which the nation has been accustomed. The reasons for this investment include loss of competitiveness of U.S. firms compared to international rivals as well as attractions to foreign investors of the United States itself. The economic effects of greater levels of foreign ownership are generally positive, although some problems with levels of competition could ensue. National security considerations might cause the United States to place some restrictions on this investment, but other restrictions at the present time appear to be unwarranted.

  7. Reactor licensing in the United States and Federal Republic of Germany

    International Nuclear Information System (INIS)

    Salvatore, J.E.L.

    1980-02-01

    The licensing procedure for nuclear power plants in the United States and in the Federal Republic of Germany is analysed. The security policy, the inspections and the supervision during their construction and operation are discussed. (A.L.) [pt

  8. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  9. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  10. Social Security Number Protection Laws: State-by-State Summary Table

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  11. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  12. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  13. PV Project Finance in the United States, 2016

    Energy Technology Data Exchange (ETDEWEB)

    Feldman, David; Lowder, Travis; Schwabe, Paul

    2016-09-01

    This brief is a compilation of data points and market insights that reflect the state of the project finance market for solar photovoltaic (PV) assets in the United States as of the third quarter of 2016. This information can generally be used as a simplified benchmark of the costs associated with securing financing for solar PV as well as the cost of the financing itself (i.e., the cost of capital). Three sources of capital are considered -- tax equity, sponsor equity, and debt -- across three segments of the PV marketplace.

  14. North Atlantic Treaty Organization, the United States, and International Legitimacy

    Science.gov (United States)

    2014-05-22

    compared to other Allied 17Walter McDougall , Promised Land, Crusader State: The American Encounter with the World Since 1776 (Boston: Mariner Books, 1998...Russia–Georgia War was carried out largely under EU, Organization for Security and Cooperation, and United States leadership. Bush assisted...Operation Unified Protector provided a means for the international community to carry out R2P in order to protect the Libyan population from the

  15. Estimates of the Lawful Permanent Resident Population in the United States: January 2013

    Data.gov (United States)

    Department of Homeland Security — This report presents estimates of the lawful permanent resident (LPR) population living in the United States on January 1, 2013. The LPR population includes persons...

  16. Estimates of the Lawful Permanent Resident Population in the United States: January 2014

    Data.gov (United States)

    Department of Homeland Security — This report presents estimates of the lawful permanent resident (LPR) population living in the United States on January 1, 2014. The LPR population includes persons...

  17. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  18. Fueling the dragon: Alternative Chinese oil futures and their implications for the United States

    Science.gov (United States)

    Eberling, George G.

    This study examines how Chinese oil energy will likely shape future Sino-American relations under conditions of dependency and non-dependency. The study will list and describe three possible Chinese oil energy futures or scenarios (Competitive Dependency, Competitive Surplus and Cooperative Surplus) using Scenario Analysis to subsequently estimate their associated likelihoods using the PRINCE forecasting system and discuss and evaluate their strategic implications for the United States. Further, this study will determine the most likely oil energy future or scenario. Finally, the study will list and describe the most likely United States political, economic and/or military policy responses for each future or scenario. The study contributes to the literature on Chinese and United States energy security, foreign policy, political economy and political risk analysis by showing how China will most likely address its growing oil energy dependence and by determining what will be the most likely U.S. foreign policy consequences based on the most current literature available on energy security and foreign policy.

  19. A Perspective on United States Policy toward the Arab Gulf Countries and Iraq

    National Research Council Canada - National Science Library

    Al Shamisi, Ibrahim A

    2005-01-01

    .... The events of September 2001 caused important changes in the United States' national security policy, which led it to initiate aggressive foreign policies toward Islam in general, and Arabs in particular...

  20. An Unlikely Trusting Relationship? The United States and Japan since 1945

    DEFF Research Database (Denmark)

    Ruzicka, Jan; Keating, Vincent

    The U.S.-Japanese security relationship since 1945 has provided a fertile ground for the study of international politics. Constructivists have used it to demonstrate that security is ultimately dependent on cultural norms and identity. Realists, on the other hand, maintain that the relationship...... is best understood in terms of alliance politics where one state (Japan) passes the costs of its own defence onto its ally (the United States). Given the previously-identified weaknesses in both explanations, this article explores whether the relationship could better serve as an example of a trusting...... relationship in international politics by focussing on the mutual reduction of hedging strategies....

  1. Unites States and the oil of the Middle-East; Les Etats-Unis et le petrole du Moyen-Orient

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    2005-08-15

    The author discusses different aspects of the United States intervention and behavior in the Middle-East petroleum management. The Iraq and Iran potentials are largely under used. The Saudi Arabia defines its own oil policy, but benefits of the Unites States military help. The United States intervention is in the domain of the security of flux on the world market. (A.L.B.)

  2. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2008

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2008 by period of entry, region and country of...

  3. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2007

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2007 by period of entry, region and country of...

  4. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2012

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2012 by period of entry, region and...

  5. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2009

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2009 by period of entry, region and country of...

  6. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2006

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the number of unauthorized immigrants residing in the United States as of January 2006 by period of entry, region and country of...

  7. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2011

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2011 by period of entry, region and...

  8. Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2010

    Data.gov (United States)

    Department of Homeland Security — This report provides estimates of the size of the unauthorized immigrant population residing in the United States as of January 2010 by period of entry, region and...

  9. The Key to Stability on the Korean Peninsula - United States, Japan and China

    National Research Council Canada - National Science Library

    Hine, Douglas

    2003-01-01

    ...). This paper will explore the national security relationships between the United States, China and Japan and how they relate to both the Republic of Korea and the Democratic Peoples Republic of Korea (DPRK...

  10. 8 CFR 212.5 - Parole of aliens into the United States.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Parole of aliens into the United States. 212.5 Section 212.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DOCUMENTARY REQUIREMENTS: NONIMMIGRANTS; WAIVERS; ADMISSION OF CERTAIN INADMISSIBLE ALIENS; PAROLE § 212.5...

  11. The United States, NATO and the European Union: A New Trans-Atlantic Relationship?

    National Research Council Canada - National Science Library

    Barry, Charles

    1994-01-01

    .... The United States wants the concept of a "European Security and Defense Identity" (ESDI) implemented in such a way that it neither duplicates NATO nor threatens to dismantle or replace the alliance. U.S...

  12. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [fr

  13. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States

  14. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [es

  15. Fracking in the United States

    International Nuclear Information System (INIS)

    Cho, Renee

    2015-01-01

    Over the last decade, advances in technology have made it profitable to extract natural gas from shale, leading to a boom in shale gas development in the United States. Hydraulic fracturing, or fracking, the controversial method for extracting natural gas, offers numerous benefits: relatively cheap energy, enhanced energy security, job creation, tax revenues and decreased dependence on dirty coal. Fracking, however, can also increase greenhouse gas emissions, pollute the air and result in health effects, consume huge quantities of water, and cause earthquakes. While some areas welcome fracking for the economic benefits it brings, other communities are attempting to ban fracking altogether. This article examines the benefits and risks of fracking in the U.S

  16. The Description of Health Among Iraqi Refugee Women in the United States.

    Science.gov (United States)

    Salman, Khlood F; Resick, Lenore K

    2015-08-01

    The purpose of this study was to understand the description of health among Iraqi women refugees, their health status, and health experiences during resettlement in the United States. Twelve women, ages 21-67 years old, who resettled in the United States during or after 2003 where interviewed. The women described health as a gift determined by God, the ability to function, the absence of physical symptoms, and the need to feel safe and secure in the context of resettlement. Although the Iraqi women valued health, during the resettlement process, seeking safety and feeling secure were the foremost priorities. Findings revealed that this is a vulnerable population which has experienced the violence of war and, as a result, have unique physical, mental, economic, and social concerns related to health. Implications are for a multidisciplinary approach to best meet the unique individual health needs of this vulnerable population.

  17. Policy drivers and barriers for coal-to-liquids (CtL) technologies in the United States

    International Nuclear Information System (INIS)

    Vallentin, Daniel

    2008-01-01

    Because of a growing dependence on oil imports, powerful industrial, political and societal stakeholders in the United States are trying to enhance national energy security through the conversion of domestic coal into synthetic hydrocarbon liquid fuels-so-called coal-to-liquids (CtL) processes. However, because of the technology's high costs and carbon intensity, its market deployment is strongly affected by the US energy, technology and climate policy setting. This paper analyses and discusses policy drivers and barriers for CtL technologies in the United States and reaches the conclusion that an increasing awareness of global warming among US policy-makers raises the requirements for the technology's environmental performance and, thus, limits its potential to regional niche markets in coal-producing states or strategic markets, such as the military, with specific security and fuel requirements

  18. Intervention pursuant to article 4(h) of the Constitutive Act of the African Union without United Nations Security Council authorisation

    OpenAIRE

    Amvane, Gabriel

    2015-01-01

    Article 4(h) of the Constitutive Act of the African Union (AU) establishes the right of the Union to intervene in a member state to prevent grave violations of human rights. It does not state whether the AU should request prior authorisation from the United Nations (UN) Security Council, leading to many interpretations. Many articles were written on this issue at a time when the AU and the Security Council were not in confrontation. However, the situation has changed since the controversy ove...

  19. Post-Apartheid South Africa and United States National Security

    National Research Council Canada - National Science Library

    Cochran, Edwin

    1998-01-01

    .... It is based on the realist premise that the U.S. has limited national interests in Sub-Saharan Africa which would be best served by a regional security strategy explicitly predicated on engagement with South Africa...

  20. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    Science.gov (United States)

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  1. Analysis of Maize versus Ethanol Production in Nebraska, United States and International Agricultural Droughts: Lessons for Global Food Security

    Science.gov (United States)

    Boken, V.; Tenkorang, F.

    2012-04-01

    Nebraska is one of the eight main corn (maize) belt states of the United States. Maize is the major crop of Nebraska with an average annual production of about 38 million tons (about 12% of U.S. production), which contributes billions of dollars to the state's economy. The yield of maize has increased significantly over the past century - from 1.6 t/ha in 1900 to 10.4 t/ha in 2010. While the majority of maize (about 40%) is currently used for animal feed and ethanol production, only about six percent is exported. It is estimated that about one billion people accounting for about 15% population of the world live in chronic hunger because of low agricultural productivity and drought. Most of these people depend on the U.S. for grains including maize. If a greater quantity of maize is diverted to ethanol production, considerably less quantity of maize would be available for export to developing countries where it could be used for human consumption and to mitigate hunger and improve food security. This paper presents analysis of maize production in Nebraska for the past three decades and examines how its commercialization for ethanol production has affected its exports in the face of drought at an international level.

  2. Is further proliferation of nuclear weapons irrelevant to US national security

    International Nuclear Information System (INIS)

    Pendley, R.E.

    1985-01-01

    For almost four decades, the United States has insisted that any increase in the number of states possessing nuclear weapons should be discouraged, claiming that nuclear proliferation would undermine international security and stability, and threaten the national security interests of the United States. This view was clearly emphasized by the Reagan administration when the President stated in 1981 that the basis of US nonproliferation policy was to ''establish the prevention of the spread of nuclear weapons as a fundamental national security and foreign policy objective.'' However, actual implementation of this policy, seeking to obviate moves toward increased regional nuclear capabilities, will call for a variety of bilateral security dealings with so-called problem countries in regions important to the United States, relationships that US governments have been largely chary of so far. It will also require discrimination and forcefulness in identifying the security interests of the United States in these key regions, and crafting specific foreign policies to further those interests

  3. United States foreign oil policy since World War 1 : for profits and security. 2 ed.

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J.

    2005-07-01

    This book provided a historical context for United States global oil politics, with a focus on the goals, accomplishments and challenges of United States foreign oil policy, as well as on the relationship between the state and private sectors. This second edition has integrated developments in global politics since the end of the Cold War. It was suggested that many factors have provided the context for oil policy formation: a succession of crises in Iran since the 1950s; 2 wars in Iraq; U.S. intervention in Afghanistan; the threat of international terrorism since September 11, 2001; ongoing conflicts between Israel and the Arab nations in the Middle East; political instability in Saudi Arabia and in Venezuela and the trend towards trade and investment liberalization in Latin America in the 1990s. In addition, the emergence of oil sands reserves in Canada and other sources of non-conventional oil were discussed. Nationalism and oil policies in the Depression and World War 2 were examined. The structure of decision-making in oil policies was examined. Domestic and offshore resources were reviewed, and an outline of international agreements and relationships was presented. Issues concerning OPEC countries and the Iranian Revolution were examined. It was concluded that the United States has become more and not less vulnerable, despite its military strength. The author suggested that the main policy challenge to the United States may well be the tension between its commitment to Israel and its determination to avoid alienating the Arab oil-producing states. refs., tabs., figs.

  4. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  5. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  6. 76 FR 13973 - United States Warehouse Act; Processed Agricultural Products Licensing Agreement

    Science.gov (United States)

    2011-03-15

    ... security of goods in the care and custody of the licensee. The personnel conducting the examinations will..., Warehouse Operations Program Manager, FSA, United States Department of Agriculture, Mail Stop 0553, 1400... continuing compliance with the standards of approval and operation. FSA will conduct examinations of licensed...

  7. Quantum Secure Direct Communication Using W State

    International Nuclear Information System (INIS)

    Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng

    2008-01-01

    A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure

  8. A Comparative Analysis of the Influence of China and the United States in the Southeast Asia Region under the Obama Administration

    Directory of Open Access Journals (Sweden)

    Wu Xue

    2015-12-01

    Full Text Available With China’s rapid rise and the implementation of the Obama Administration’s ”Return to the Asia Pacific” strategy, both China and the United States have significantly changed their relations with Southeast Asia in recent years. Also, the influence of China and the United States in this region has changed too. Both China and the United States have strengthened relations with the Southeast Asia region in terms of political, economic, military, cultural and other aspects, and their influence has also risen in varying degrees. In comparison, China has a greater impact on the economy of Southeast Asia, while the US has more influence on its military and security. China vigorously implements the neighborhood diplomacy featuring amity, sincerity, mutual benefit and inclusiveness. The United States actively promotes the Asia-Pacific rebalancing strategy. The Southeast Asian countries continue to choose the balance of power strategy, relying on China regarding the economy, relying on the United States regarding the security. This has resulted in the continuous game between China and the United States in the Southeast Asian region.

  9. 7 CFR 1220.615 - State and United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false State and United States. 1220.615 Section 1220.615... CONSUMER INFORMATION Procedures To Request a Referendum Definitions § 1220.615 State and United States. State and United States include the 50 States of the United States of America, the District of Columbia...

  10. 7 CFR 1220.129 - State and United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false State and United States. 1220.129 Section 1220.129... CONSUMER INFORMATION Soybean Promotion and Research Order Definitions § 1220.129 State and United States. The terms State and United States include the 50 States of the United States of America, the District...

  11. Exploring the Future of Security in the Caribbean: a Regional Security Partnership?

    Science.gov (United States)

    2007-12-14

    by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and

  12. The Development of Logistics Services in the United States

    OpenAIRE

    Yang, Yeonglin H; San Diego State University

    2015-01-01

    This research studies third party logistics (3PL) providers in the United States to investigate how the industry has strategically developed its service offerings in response to the customers’ growing needs in managing global supply chains. Logistics management has significant impacts on various aspects of supply chains such as response time, total supply chain cost, sourcing risk, customer service, security, etc. The results show that 3PL services vary based on industry served, region served...

  13. Food irradiation: outlook for commercialization in the United States

    International Nuclear Information System (INIS)

    Giddings, G.G.

    1985-01-01

    An account is presented of the long-term and near-term outlooks for food irradiation in the United States, with particular reference to US regulatory status and to the problems of securing public acceptance of the process. Actions taken by international organizations to consider and determine whether irradiated food is wholesome are summarized. A table is included showing dose levels for various food applications. Political and sociological aspects are discussed. (U.K.)

  14. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  15. 21ST Century United States Military Strategy for East Asia: Countering an Emerging China

    National Research Council Canada - National Science Library

    LeBlanc, Lee

    2004-01-01

    .... The United States National Security Strategy (NSS) suggests that the U.S. has relied on a U.S. forward military presence in the East Asian region for over 50 years enabling it to achieve its NSS objectives...

  16. The Caspian energy game: views from the United States and United Kingdom

    International Nuclear Information System (INIS)

    Bird, H.

    2003-01-01

    The importance of the Caspian Sea region to energy production is increasing and the forces influencing it are changing. The attention on this region focuses on its oil and natural gas reserves. A series of interviews with Western experts mainly from the United States and United Kingdom, including those in international organizations, academia, policy institutions, and government and industry officials identified key trends and issues that are important to their future policies and the significance of the Caspian oil and gas to the world energy market. The overriding issues are: The influence of Russia on regional security, stability, and the transportation of oil and gas products in the Caspian region. The outcome of the test between the United States and Iraq and the major effects it could have on commercial interests in the region and on who will be the major actors. Tensions caused by Iran refusal to settle the international demarcation of the Caspian Sea. Turkey position as a player, the affect of its new islamic-dominated government and its energy policies. Europe need to import gas and to diversify its supply. The construction of a pipeline to China. The impact of September 11, 2001 and terrorism on the Caspian region issues. The stability of the former Soviet Republics in the region. (author)

  17. The Caspian energy game: views from the United States and United Kingdom

    Energy Technology Data Exchange (ETDEWEB)

    Bird, H

    2003-07-01

    The importance of the Caspian Sea region to energy production is increasing and the forces influencing it are changing. The attention on this region focuses on its oil and natural gas reserves. A series of interviews with Western experts mainly from the United States and United Kingdom, including those in international organizations, academia, policy institutions, and government and industry officials identified key trends and issues that are important to their future policies and the significance of the Caspian oil and gas to the world energy market. The overriding issues are: The influence of Russia on regional security, stability, and the transportation of oil and gas products in the Caspian region. The outcome of the test between the United States and Iraq and the major effects it could have on commercial interests in the region and on who will be the major actors. Tensions caused by Iran refusal to settle the international demarcation of the Caspian Sea. Turkey position as a player, the affect of its new islamic-dominated government and its energy policies. Europe need to import gas and to diversify its supply. The construction of a pipeline to China. The impact of September 11, 2001 and terrorism on the Caspian region issues. The stability of the former Soviet Republics in the region. (author)

  18. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  19. The United States

    International Nuclear Information System (INIS)

    Art, R.J.

    1991-01-01

    This paper reports that at least in the national security arena, the outcomes of bureaucratic infighting and domestic political struggles are not determined wholly by what goes on with the state. Rather struggles among contending groups are greatly affected by what is perceived to be happening outside the nation. Because external conditions give greater potency to some domestic forces over other, the external environment is never neutral in its domestic impact. The decisions of the period 1950-53 discussed above illustrate the point. But so too do the decisions of 1947, 1960-61 and 1969-72. In the 1947 case, Soviet intransigence provoked US nuclear rearmament. In the 1960-61 case, extended deterrent considerations pushed the United States to preserve its again newly discovered nuclear superiority. In the 1969-72 case, a Soviet determination to remain equal forced US acceptance of nuclear equality. And perhaps the best evidence of all, the perpetuation of parity ended the US inclination to resort to nuclear brinkmanship. In each instance, concerns about relative position heavily affected nuclear choice. Finally, the events of the past three years testify to the effects of international events on domestic choice. Under the terms of the 1987 INF Treaty, the two superpowers decided to dismantle and destroy an entire class of missiles of intermediate range (500-3000 kilometers) that both had deployed in Europe in the 1970s and 1980s, and in their June 1990 joint statement on strategic nuclear weapons, President Gorbachev and Brush agreed to cut the number of Soviet and US long range nuclear forces by 30 per cent. This agreement marks a watershed in US-Soviet strategic arm negotiations because for the first time the United States and the Soviet Union agreed in principals to reduce the number of weapons aimed at one another. Between 1985 and 1990 the cold war was brought to a close

  20. Could the United States Reinstitute an Official Torture Policy?

    Directory of Open Access Journals (Sweden)

    Adam Jacobson

    2017-06-01

    Full Text Available In 2015, the United States passed legislation that reaffirmed its ban on using torture and abusive techniques in national security interrogations. However, the Republican president-elect Donald Trump has repeatedly promised to revive torture as official policy, and the idea of torturing suspected terrorists is popular with the American public. Given these facts, what are the vulnerabilities within the current prohibition that makes a return to an official torture policy possible? This paper examines the weaknesses within each branch of government and other factors that could contribute to making a return to official torture by the United States more likely. It shows that the prohibition against torture does face vulnerabilities that can be exploited to reinstitute a torture policy, and that while this may not be likely in the current political environment, it is possible.

  1. The reestablishment of radiochemistry academic programs in the United States - 59025

    International Nuclear Information System (INIS)

    Williamson, Craig

    2012-01-01

    Document available in abstract form only. Full text of publication follows: Despite its importance in national security, medicine, energy, and in waste management radiochemistry education in the United States has gone through two lost decades. In the 1970's ten to fifteen universities were granting between thirty (30) and forty (40) doctoral degrees a year. By the 1980's those numbers had declined to twenty (20) and thirty (30) a year, by the 1990's the numbers had again decreased to below fifteen (15) Ph.D.s a year. In the year 2000, the data shows that only 5 Ph.D.s in radiochemistry were awarded. The causes for this decline is directly attributed to the lack of federal support for an academic discipline that for the most part depends on federal funding. In 2011, it is expected that over thirty (30) doctoral degrees in radiochemistry will be conferred. The turn around in radiochemistry education in the United States can be directly attributed to the support provided by the U.S. Departments of Energy, Defense and Homeland Security. In addition, support has come from the U.S. Nuclear Regulatory Commission and from the National Nuclear Security Administration. The form of this support has been extensive from proposed undergraduate research programs, scholarships, graduate fellowships, junior faculty awards, curriculum awards, and grants

  2. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  3. The National Intelligence Strategy of the United States of America: Transformation Through Integration and Innovation

    National Research Council Canada - National Science Library

    2005-01-01

    ... and President Bush's National Security Strategy of the United States of America. The President signed the new law with the expectation that "our vast intelligence enterprise will become more unified, coordinated, and effective...

  4. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  5. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  6. IAEA verification of weapon-origin fissile material in the Russian Federation and the United States

    International Nuclear Information System (INIS)

    2000-01-01

    The document informs about the meeting of the Minister of the Russian Federation on Atomic Energy, the Administrator of the National Nuclear Security Administration of the United States, and the Director General of the IAEA, on 18 September 2000 in Vienna, to review progress on the Trilateral Initiative which was launched in 1996 to develop a new IAEA verification system for weapon-origin material designated as released from defense programs by the United States or the Russian Federation

  7. Special Inspector General for Iraq Reconstruction Quarterly Report to the United States Congress

    Science.gov (United States)

    2009-10-30

    United States continues to assist in se- curing courthouses and protecting judges and their families by locating judges in secure complexes...of the initiative.482 Soldiers and police who were legal residents of the Kurdistan Region but who are stationed in Ninewa cast absentee ballots in

  8. Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Project and Supply Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Project and Supply Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Poland on 8 January 2007, the United States on 12 January 2007 and by the Director General of the IAEA on 16 January 2007. Pursuant to the Article XII of the Agreement, the Agreement entered into force on 16 January 2007, upon signature by the representatives of Poland, the United States and the Director General of the IAEA

  9. Novel methods for Solving Economic Dispatch of Security-Constrained Unit Commitment Based on Linear Programming

    Science.gov (United States)

    Guo, Sangang

    2017-09-01

    There are two stages in solving security-constrained unit commitment problems (SCUC) within Lagrangian framework: one is to obtain feasible units’ states (UC), the other is power economic dispatch (ED) for each unit. The accurate solution of ED is more important for enhancing the efficiency of the solution to SCUC for the fixed feasible units’ statues. Two novel methods named after Convex Combinatorial Coefficient Method and Power Increment Method respectively based on linear programming problem for solving ED are proposed by the piecewise linear approximation to the nonlinear convex fuel cost functions. Numerical testing results show that the methods are effective and efficient.

  10. Chapter 6. Conservation status of flammulated owls in the United States

    Science.gov (United States)

    D. Archibald McCallum

    1994-01-01

    The status of the flammulated owl will be evaluated in this chapter by asking a series of critical questions about the species and its habitat. Answers to these questions will be used to reach one of the following conclusions: (1) populations in the United States are secure and will likely remain so given current land management practices; (2) populations are in peril...

  11. Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Portugal on 27 June 2006 and the United States on 13 December 2006, and by the Director General of the IAEA on 14 December 2006. Pursuant to the Article XII.1 of the Agreement, the Agreement entered into force on 19 April 2007, the date on which the Agency received written notification from Portugal that its internal requirements for entry into force had been met

  12. Do Small States Matter? : A comparative analysis of the discourses by three of the non-permanent members of the United Nations Security Council on the crisis in Libya and Syria between 2011 and 2012.

    OpenAIRE

    Chowdhury, Afrida

    2017-01-01

    A new era of wars and instability have left the world shaken with the civil wars in Syria and Libya. Although there are many similarities with Syria and Libya, the two states did not have the same end due to actions by the United Nations Security Council. Libya resulted in a military humanitarian intervention, while Syria did not. Studies about the Security Council usually focuses on the actions of the Permanent Five members who holds institutional power and influence over the council, mostly...

  13. The influence of powerful states of the Security Council during democratization processes the case of Côte D’ivoire

    Directory of Open Access Journals (Sweden)

    Vanessa Villalibre Fernández

    2009-01-01

    Full Text Available The Security Council is composed by 15 states: five of them (France, United Kingdom, United States, Russia and China exercising on a permanent basis and ten others exercise for two years. This difference is important to observe their influence on the global policy. Permanent states are in a better position to organize the Council’s agenda, but also to control the decisions to take thanks to their right of veto. Concerning the case of Côte d’Ivoire, France has played a crucial role in fostering the political process and deploys peacekeeping troops, also initiating the Council’s involvement and preparing statements and resolutions. For this reason, the measuresconcerning democratization processes taken by the Security Council in the African continent in general and in Cote d’Ivoire in particular provides a striking example of how the building or dismantling of states depends critically on external influences, both multilateral and unilateral pressures.

  14. 7 CFR 1209.21 - State and United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false State and United States. 1209.21 Section 1209.21... Definitions § 1209.21 State and United States. (a) State means any of the several States, the District of Columbia, and the Commonwealth of Puerto Rico. (b) United States means collectively the several States of...

  15. Information as Power: An Anthology of Selected United States Army War College Student Papers. Volume 3

    Science.gov (United States)

    2009-01-01

    some efforts along this path recently when it worked with the Walt Disney Company to produce a seven minute film and hundreds of still images... Disney Parks and Resorts Partners with Departments 53. of State and Homeland Security to Welcome International Visitors to the United States

  16. Asia-Pacific from the perspective of the United States: an agenda where commercial and security priorities coexist

    Directory of Open Access Journals (Sweden)

    Alfredo Crespo Alcázar

    2017-07-01

    Full Text Available The Barack Obama cabinets (2008-2012; 2012-2016 entailed a significant shift regarding the issues considered as priorities during the former Republican administration (2000-2008. The priority of fighting against jihadist terrorism was coupled with an approach that gave more importance to diplomacy and international institutions. We should not interpret this phenomenon as the United States giving up the development of its role as a global leader. When it comes to the regional level, the main transformation constituted the new geostrategic and geopolitical importance conferred upon the Asia-Pacific region in detriment of the European Union, for instance. This was due to a variety of factors, some of which arise from the recent past (issues related to security and defense or the present (the economic crisis that the EU could not fight effectively. The new US agenda towards the Asia-Pacific generated reactions of different nature, since some international actors reacted cautiously (China, Russia or the European Union, each of them for different motives. Nevertheless, it was positively regarded by the traditional US allies in the region (Australia, Japan and South Korea.

  17. The Role of Europe in Peacekeeping and International Security

    Directory of Open Access Journals (Sweden)

    Pablo Antonio Fernández Sánchez

    1998-09-01

    Full Text Available All of the States in Europe belong to the United Nations and two of them enjoy status as Permanent Members of the Security Council, which is the primordial organism for dealing with peacekeeping and international security. Besides this, one or two European States have almost always been chosen to form part of the Security Council as rotating, non-permanent members, with voting priviliges and the capacity to design policies for peacekeeping and international security. Such State participation in the Security Council is not carried out collectively, but rather individually, which explains, in part, Europe’s political “dwarfism” in regards these two matters. Another aspect to consider is this: The 15 Member States of the European Union pay, on time, 35.41% of the United Nation’s budget, whereas the one State that pays the most, 25%, the United States of America, is a nation in persistent arrears, if not an endemic debtor. Before this, though, national egoisms ask each European country to impart its own foreign policy, a fact observed when each deals with security and peace matters. This individualistic isolationism is prejudicial to the many European interests, which are seen as fragmented if not in confrontation. The problematic above is seen to be growing in complexity for lack of a common defense structure that allows for pre-existent structures and logistics to facilitate the work of the United Nations in matters of peacekeeping and international security. To an analysis of these issues are these pages dedicated.

  18. 46 CFR 7.120 - Mexican/United States border to Point Fermin, CA.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Mexican/United States border to Point Fermin, CA. 7.120 Section 7.120 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC... from the southerly tower of the Coronado Hotel in approximate position latitude 32°40.8′ N. longitude...

  19. The Ukrainian Crisis and European Security: Implications for the United States and U.S. Army

    Science.gov (United States)

    2015-01-01

    14 Chris Giles and Stefan Wagstyl, “IMF Warns of Third Eurozone Recession Since Finan- cial Crisis,” Financial Times, October 8, 2014. 15 Ulrich...Jones, and Kathrin Hille, “Russian Air Incursions Rattle Baltic States,” Financial Times, September 25, 2014. 25 Andrew Higgins , “Tensions Surge in...Opening of the Munich Security Conference, January 31, 2014. Giles, Chris , and Stefan Wagstyl, “IMF Warns of Third Eurozone Recession Since Financial

  20. Examination of State-Level Nuclear Security Evaluation Methods

    International Nuclear Information System (INIS)

    Kim, Chan Kim; Yim, Man-Sung

    2015-01-01

    An effective global system for nuclear materials security needs to cover all materials, employing international standards and best practices, to reduce risks by reducing weapons-usable nuclear material stocks and the number of locations where they are found. Such a system must also encourage states to accept peer reviews by outside experts in order to demonstrate that effective security is in place. It is thus critically important to perform state-level evaluation of nuclear security based on an integrative framework of risk assessment. Such evaluation provides a basis of measuring the level and progress of international effort to secure and control all nuclear materials. sensitivity test by differentiating weight factors of each of the indicators and categories will be performed in the future as well

  1. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    National Research Council Canada - National Science Library

    Shawhan, Karl

    2001-01-01

    .... Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased U.S. military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms...

  2. Implementation and Optimization of GPU-Based Static State Security Analysis in Power Systems

    Directory of Open Access Journals (Sweden)

    Yong Chen

    2017-01-01

    Full Text Available Static state security analysis (SSSA is one of the most important computations to check whether a power system is in normal and secure operating state. It is a challenge to satisfy real-time requirements with CPU-based concurrent methods due to the intensive computations. A sensitivity analysis-based method with Graphics processing unit (GPU is proposed for power systems, which can reduce calculation time by 40% compared to the execution on a 4-core CPU. The proposed method involves load flow analysis and sensitivity analysis. In load flow analysis, a multifrontal method for sparse LU factorization is explored on GPU through dynamic frontal task scheduling between CPU and GPU. The varying matrix operations during sensitivity analysis on GPU are highly optimized in this study. The results of performance evaluations show that the proposed GPU-based SSSA with optimized matrix operations can achieve a significant reduction in computation time.

  3. 7 CFR 160.74 - Loan of standards without security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Loan of standards without security. 160.74 Section 160... REGULATIONS AND STANDARDS FOR NAVAL STORES Loan and Care of United States Standards § 160.74 Loan of standards without security. Duplicates of the United States Standards for rosin may be loaned without deposit of...

  4. 7 CFR 1160.104 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true United States. 1160.104 Section 1160.104 Agriculture... Definitions § 1160.104 United States. United States means the 48 contiguous states in the continental United States and the District of Columbia, except that United States means the 50 states of the United States...

  5. Venezuelas Pursuit of Caribbean Basin Interests: Implications for United States National Security.

    Science.gov (United States)

    1985-01-01

    sold to buyers in Western Europe and the United States. The most important Venezuelan exports in the 19th century were cocoa and coffee. In the 20th...confusion in the U.S. Congress over the difference between the Organiza- tion of Arab Petroleum Exporting Countries (OAPEC), of which Venezuela was not a...member, and the Organization of Petroleum Exporting Countries (OPEC), to which Venezuela belonged, the action remained in force even though Caracas had

  6. An Evaluation of the Cybersecurity Policies for the United States Health & Human Services Department: Criteria, Regulations, and Improvements

    Directory of Open Access Journals (Sweden)

    Derek Mohammed

    2014-04-01

    Full Text Available This paper examines the criteria necessary for the evaluation of the cybersecurity policies for the United States Health and Human Services Department of the Federal Government. The overall purpose of cybersecurity policies and procedures is supported through compliance with Federal mandated regulation and standards, which serve to protect the organizational services and goals of the United States Health and Human Services Department, and to promote the best possible security practices in the protection of information systems from unauthorized actors and cyber-threats. The criteria of the cybersecurity evaluation is identified and analyzed for quality, strengths, weaknesses, and future applicability. Topics within the criteria include organizational operation, regulations and industrial standards compliance, service delivery to national customers, and the prevention and mitigation of IT system and security failure. This analysis determines the strengths and weaknesses, and makes recommendations for revising the cybersecurity policies within the United States Health and Human Services Department.

  7. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  8. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  9. Advanced Reactor Development in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Giessing, D. F.; Griffith, J. D.; McGoff, D. J.; Rosen, Sol [U. S. Department of Energy, Texas (United States)

    1990-04-15

    In the United States, three technologies are employed for the new generation of advanced reactors. These technologies are Advanced Light Water Reactors (A LWRs) for the 1990s and beyond, the Modular High Temperature Gas Reactor (M HTGR) for commercial use after the turn of the century, and Liquid Metal Reactors (LWRs) to provide energy production and to convert reactor fission waste to a more manageable waste product. Each technology contributes to the energy solution. Light Water Reactors For The 1990s And Beyond--The U. S. Program The economic and national security of the United States requires a diversified energy supply base built primarily upon adequate, domestic resources that are relatively free from international pressures. Nuclear energy is a vital component of this supply and is essential to meet current and future national energy demands. It is a safe, economically continues to contribute to national energy stability, and strength. The Light Water Reactor (LWR) has been a major and successful contributor to the electrical generating needs of many nations throughout the world. It is being counted upon in the United States as a key to revitalizing nuclear energy option in the 1990s. In recent years, DOE joined with the industry to ensure the availability and future viability of the LWR option. This national program has the participation of the Nation's utility industry, the Electric Power Research Institute (EPRI), and several of the major reactor manufacturers and architect-engineers. Separate but coordinated parts of this program are managed by EPRI and DOE.

  10. Estimates of the Size and Characteristics of the Resident Nonimmigrant Population in the United States: January 2011

    Data.gov (United States)

    Department of Homeland Security — This report presents estimates of the size and characteristics of the resident nonimmigrant population in the United States. The estimates are daily averages for the...

  11. Nuclear Electricity in the United States : Providing Energy For The Nation's Security and Well-Being

    International Nuclear Information System (INIS)

    Finger, Harold B.

    1988-01-01

    Nuclear energy in the United States has made major contributions since the small Shippingport prototype power plant began operating in 1957. Recent legislative and regulatory actions, as well as research an development, are indicating that additional nuclear capacity can be available in the years ahead. These actions reflect the public's recognition of the importance of nuclear energy. In addition, recent regulatory actions are reaffirming the health and safety of our current nuclear plants, as well as of those being completed. The performance of our current plants is being improved through the conscious dedication of the entire industry to excellence. There is increasing discussion in the United States of the importance of advanced reactor concepts development. The next generation of nuclear plants is already being ordered outside of the United States for example, here in Korea, in Japan, in the United Kingdom and those plants all use light water reactors. We are pleased that U. S. companies are working with you on these new plants. That continues to mean that we never let up on our drive for excellence. Excellence in operations must continue to be the conscious target of all operators. Excellence in communications to the public of the need for electrical capacity, of the benefits of nuclear energy, and of the excellence being achieved in operations is also essential. And excellence in communication to decision makers at all levels of government is also required to assure that sound legalisation and regulation is established and implemented

  12. Arctic security in an age of climate change

    Energy Technology Data Exchange (ETDEWEB)

    Kraska, James (ed.)

    2013-03-01

    Publisher review: This book examines Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway and the United States, as well as Iceland, Sweden and Finland, are grappling with an emerging Arctic security paradigm. This volume brings together the world's most seasoned Arctic political-military experts from Europe and North America to analyze how Arctic nations are adapting their security postures to accommodate increased shipping, expanding naval presence, and energy and mineral development in the polar region. The book analyzes the ascent of Russia as the first 'Arctic superpower', the growing importance of polar security for NATO and the Nordic states, and the increasing role of Canada and the United States in the region.(Author)

  13. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  14. 20 CFR 404.450 - Required reports of work outside the United States or failure to have care of a child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Required reports of work outside the United States or failure to have care of a child. 404.450 Section 404.450 Employees' Benefits SOCIAL SECURITY... Nonpayments of Benefits § 404.450 Required reports of work outside the United States or failure to have care...

  15. 7 CFR 160.75 - Loan of standards under security deposit.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Loan of standards under security deposit. 160.75... REGULATIONS AND STANDARDS FOR NAVAL STORES Loan and Care of United States Standards § 160.75 Loan of standards under security deposit. Duplicates of the United States Standards for rosin may be loaned to interested...

  16. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  17. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    Science.gov (United States)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  18. Measuring energy security. Can the United States achieve oil independence?

    International Nuclear Information System (INIS)

    Greene, David L.

    2010-01-01

    Stochastic simulation of the direct economic costs of oil dependence in an uncertain future is proposed as a useful metric of oil dependence. The market failure from which these costs arise is imperfect competition in the world oil market, chiefly as a consequence of the use of market power by the Organization of the Petroleum Exporting Countries (OPEC) cartel. Oil dependence costs can be substantial. It is estimated that oil dependence costs to the US economy in 2008 will exceed $500 billion. Other costs, such as military expenditures or foreign policy constraints are deemed to be largely derivative of the actual or potential economic costs of oil dependence. The use of quantifiable economic costs as a security metric leads to a measurable definition of oil independence, or oil security, which can be used to test the ability of specific policies to achieve oil independence in an uncertain future. (author)

  19. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  20. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  1. 31 CFR 800.225 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 800.225 Section 800... TAKEOVERS BY FOREIGN PERSONS Definitions § 800.225 United States. The term United States or U.S. means the United States of America, the States of the United States, the District of Columbia, and any commonwealth...

  2. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  3. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  4. Fragile States, Infectious Disease and Health Security: The Case for Timor-Leste

    Directory of Open Access Journals (Sweden)

    John M. Quinn

    2014-01-01

    Full Text Available Timor-Leste is a very young and developing nation state. Endemic infectious disease and weakened health security coupled with its growing and inclusive public institutions keep Timor-Leste fragile and in transition on the spectrum of state stability. The objective here is to systematically review Timor-Leste's state and public health successes, showing how a fragile state can consistently improve its status on the continuum of stability and improve health security for the population. The case study follows a state case study approach, together with a disease burden review and a basic description of the health portrait in relation to Timor-Leste's fragile state status. Disease burden and health security are directly proportional to state stability and indirectly proportional to state failure. Timor-Leste is a clear example of how public health can feed into increased state stability. Our discussion attempts to describe how the weak and fragile island nation of Timor-Leste can continue on its current path of transition to state stability by increasing health security for its citizens. We surmise that this can be realized when public policy focuses on primary healthcare access, inclusive state institutions, basic hygiene and preventative vaccination programs. Based on our review, the core findings indicate that by increasing health security, a positive feedback loop of state stability follows. The use of Timor-Leste as a case study better describes the connection between public health and health security; and state stability, development and inclusive state institutions that promote health security.

  5. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1993-01-01

    The three notions, disarmament, national security and interdependence, which are well known, need a new reading in the today's mission for the United Nations, to facilitate the democratic, evolutionary renewal of the the interdependent world, in which disarmament could play an important role without putting at risk national security, which is of primary concern for the majority of Member States. The recognition of the unity of the wold and its interdependence is the main focal point in the process of transition of the international community to the new world system of peace, cooperation and security based on United Nations Charter. This system was outlined at the Forty-fourth session of the General Assembly, and adopted by Member States as a resolution entitled 'Enhancing international peace, security and international cooperation in all its aspects in accordance with the Charter of United Nations'

  6. The United States and Myanmar: From Antagonists to Security Partners?

    Directory of Open Access Journals (Sweden)

    Jürgen Haacke

    2015-01-01

    Full Text Available This article provides an overview both of the considerable makeover that relations between the United States and Myanmar have undergone since Naypyidaw ushered in a programme of wide-ranging reforms, and of the main policy areas in relation to which Washington remains keen to induce further change. The article also aims to explain why, notwithstanding the significant improvement in bilateral relations and the Obama administration’s interest in also pursuing military engagement, progress in this field has remained rather limited. Focusing on the politics of US policymaking on Burma, the article argues that while the Obama administration was able to take the initiative on recalibrating US Burma policy, congressional resistance in particular, amid wider concerns shared by non-governmental organisations, has so far constrained the administration vis-à-vis US–Myanmar military-to-military relations.

  7. 7 CFR 1150.106 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true United States. 1150.106 Section 1150.106 Agriculture... Order Definitions § 1150.106 United States. United States means the 48 contiguous States in the continental United States. ...

  8. The Impact of International Financial Reporting Standards on Accounting Curriculum in the United States

    Science.gov (United States)

    Yallapragada, RamMohan R.; Toma, Alfred G.; Roe, C. William

    2011-01-01

    According to the time line presently specified by the Securities and Exchange Commission (SEC), business firms in the United States (US) should switch from the existing US accounting reporting guidelines of the Generally Accepted Accounting Principles (GAAP) to International Financial Reporting Standards (IFRS) by the year 2014. The US business…

  9. Malaria Treatment (United States)

    Science.gov (United States)

    ... Providers, Emergency Consultations, and General Public. Contact Us Malaria Treatment (United States) Recommend on Facebook Tweet Share Compartir Treatment of Malaria: Guidelines For Clinicians (United States) Download PDF version ...

  10. Disarmament through regional dialogue: United States arms control and disarmament policies

    International Nuclear Information System (INIS)

    Holum, J.D.

    1994-01-01

    Less than fifty years ago, Japan and the United States faced one another in history's deadliest conflict. Since that world war, the competition has been limited to a mature-if spirited-contest for customers. The two countries have become firm friends for peace-and leaders in the international community's campaign against weapons of mass destruction. This friendship is too important to be shaken by momentary upsets. The countries that learned the most from the last great war are today among the most resolutely peaceful in the world. To my mind, it is no coincidence that Japan and Germany, two nations which transformed defeat in that war into remarkable economic success following it-which have sought prosperity and harmony with their neighbours instead of dominion over them-are the two nations the United States would like to see added as permanent members to the United Nations Security Council. There is hope that, some day, countries may be judged not by the arms but the commitments they keep-and the values they uphold. All responsible nations must affirm that nuclear non-proliferation is an enduring value, not a passing policy. United States Arms Control and Disarmament Agency underlines that its highest priority in the coming year is indefinite and unconditional extension of the Non-proliferation Treaty

  11. Reserve reporting in the United States coal industry

    International Nuclear Information System (INIS)

    Grubert, Emily

    2012-01-01

    United States energy policymaking can be better supported with accurate and consistent data on coal reserves, both in the public and private sectors. In particular, reserve data for coal and other energy resources should be directly comparable so that decision-makers can easily understand the relationship among available resources. Long-term policy and investment choices regarding energy security, the environment, and resource allocation depend on accurate information, but existing and easily available data on the magnitude of geologically, environmentally, economically, socially, and legally accessible coal reserves are of insufficient quality to guide such decisions. Even still, these data are often presented for use in policy and energy analysis. Currently, coal reserves are overstated relative to competitor energy resource reserves, in part because coal reporting standards have historically been more liberal and vague than standards for resources like natural gas. Overstating the marketable coal resource could lead to inefficient allocation of limited capital investment that can be difficult to reverse. US government bodies like the Energy Information Administration, United States Geological Survey, Securities and Exchange Commission, and Bureau of Land Management can help correct deficiencies by clarifying standards and collecting data that are relevant for decision-makers, such as energy-based reserve information. - Highlights: ► US Coal reserves are important to public and private policy and investment decisions. ► Poor quality data and coal reserve overreporting misrepresent reality. ► Choices made based on bad information can lead to long-term capital misallocation. ► Numerous government agencies are tasked with providing public data on coal reserves. ► Clearer, more restrictive reserves reporting standards can aid decision-makers.

  12. Engaging Non-State Security Providers: Whither the Rule of Law?

    Directory of Open Access Journals (Sweden)

    Timothy Donais

    2017-07-01

    Full Text Available The primacy of the rule of law has long been seen as one of the essential principles of security sector reform (SSR programming, and part of the larger gospel of SSR is that the accountability of security providers is best guaranteed by embedding security governance within a rule of law framework. Acknowledging the reality of non-state security provision, however, presents a challenge to thinking about SSR as merely the extension of the rule of law into the security realm, in large part because whatever legitimacy non-state security providers possess tends to be grounded in 'extralegal' foundations. This paper – more conceptual than empirical in its approach – considers the implications of hybrid forms of security governance for thinking about the relationship between SSR and rule of law promotion, and argues that the rule of law still provides a useful source of strategic direction for SSR programming.

  13. An Evaluation of the Cybersecurity Policies for the United States Health & Human Services Department: Criteria, Regulations, and Improvements

    OpenAIRE

    Derek Mohammed; Ronda Mariani

    2014-01-01

    This paper examines the criteria necessary for the evaluation of the cybersecurity policies for the United States Health and Human Services Department of the Federal Government. The overall purpose of cybersecurity policies and procedures is supported through compliance with Federal mandated regulation and standards, which serve to protect the organizational services and goals of the United States Health and Human Services Department, and to promote the best possible security practices in the...

  14. U.S. spent fuel transportation security in the post 9/11 world

    International Nuclear Information System (INIS)

    Anne, Catherine; Patterson, John; Williams, Blake

    2002-01-01

    On September 11, 2002 the terrible tragedies in New York, Pennsylvania and Washington, DC changed the world forever. Security issues not only impact our daily lives, but are also in a state flux concerning the shipment of spent nuclear fuel in the United States. The formation of the Homeland Security Advisory System and Interim Compensatory Measures from the NRC, along with other security measures, have affected the way we transport spent nuclear fuel. This paper describes the challenging and demanding way that security is planned, implemented and maintained in support of spent fuel shipments in the United States. (author)

  15. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  16. 7 CFR 65.255 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false United States. 65.255 Section 65.255 Agriculture..., PEANUTS, AND GINSENG General Provisions Definitions § 65.255 United States. United States means the 50... United States. ...

  17. Examination of the Current Approaches to State-Level Nuclear Security Evaluation

    International Nuclear Information System (INIS)

    Kim, Chan; Yim, Mansung; Kim, So Young

    2014-01-01

    An effective global nuclear materials security system will cover all materials, employ international standards and best practices, and reduce risks by reducing weapons-usable nuclear material stocks and the number of locations where they are found. Such a system must also encourage states to accept peer reviews by outside experts in order to demonstrate that effective security is in place. It is thus critically important to create an integrative framework of state-level evaluation of nuclear security as a basis for measuring the level and progress of international effort to secure and control all nuclear materials. There have been studies to represent state-level nuclear security with a quantitative metric. A prime example is the Nuclear Materials Security Index (NMSI) by the Nuclear Threat Initiative (NTI). Another comprehensive study is the State Level Risk Metric by Texas A and M University (TAMU). This paper examines the current methods with respect to their strengths and weaknesses and identifies the directions for future research to improve upon the existing approaches

  18. 7 CFR 1250.308 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1250.308 Section 1250.308 Agriculture... Research and Promotion Order Definitions § 1250.308 United States. United States means the 48 contiguous States of the United States of America and the District of Columbia. ...

  19. 7 CFR 1205.23 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1205.23 Section 1205.23 Agriculture... Procedures for Conduct of Sign-up Period Definitions § 1205.23 United States. The term United States means the 50 states of the United States of America. Procedures ...

  20. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)

    Science.gov (United States)

    2012-05-01

    protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and

  1. Analyzing the United States Department of Transportation's Implementation Strategy for High Speed Rail: Three Case Studies

    Science.gov (United States)

    Robinson, Ryan

    High-speed rail (HSR) has become a major contributor to the transportation sector with a strong push by the Obama Administration and the Department of Transportation to implement high-speed rail in the United States. High-speed rail is a costly transportation alternative that has the potential displace some car and airport travel while increase energy security and environmental sustainability. This thesis will examine the United States high-speed rail implementation strategy by comparing it to the implementation strategies of France, Japan, and Germany in a multiple case study under four main criteria of success: economic profitability, reliability, safety, and ridership. Analysis will conclude with lessons to be taken away from the case studies and applied to the United States strategy. It is important to understand that this project has not been established to create a comprehensive implementation plan for high-speed rail in the United States; rather, this project is intended to observe the depth and quality of the current United States implementation strategy and make additional recommendations by comparing it with France, Japan, and Germany.

  2. 31 CFR 597.318 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 597.318 Section 597... General Definitions § 597.318 United States. The term United States means the United States, its territories, states, commonwealths, districts, and possessions, and all areas under the jurisdiction or...

  3. 7 CFR 1219.26 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1219.26 Section 1219.26 Agriculture..., AND INFORMATION Hass Avocado Promotion, Research, and Information Order Definitions § 1219.26 United States. United States means collectively the several 50 States of the United States, the District of...

  4. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    Science.gov (United States)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only

  5. 7 CFR 1212.31 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1212.31 Section 1212.31 Agriculture..., Consumer Education, and Industry Information Order Definitions § 1212.31 United States. “United States... territories and possessions of the United States. ...

  6. 46 CFR 24.15-5 - Canadian pleasure craft temporarily using navigable waters of the United States.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Canadian pleasure craft temporarily using navigable... SECURITY UNINSPECTED VESSELS GENERAL PROVISIONS Equivalents § 24.15-5 Canadian pleasure craft temporarily using navigable waters of the United States. Uninspected Canadian pleasure craft (uninspected vessels...

  7. 22 CFR 120.13 - United States.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false United States. 120.13 Section 120.13 Foreign... United States. United States, when used in the geographical sense, includes the several states, the Commonwealth of Puerto Rico, the insular possessions of the United States, the District of Columbia, the...

  8. The Gulf Security Dialogue and Related Arms Sale Proposals

    National Research Council Canada - National Science Library

    Blanchard, Christopher M; Grimmett, Richard F

    2008-01-01

    ...) security cooperation under the auspices of a new Gulf Security Dialogue (GSD). The Dialogue now serves as the principal security coordination mechanism between the United States and the six countries of the Gulf Cooperation Council (GCC...

  9. 31 CFR 592.311 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 592.311 Section 592... § 592.311 United States. The term United States, when used in the geographic sense, means the several States, the District of Columbia, and any commonwealth, territory, or possession of the United States. ...

  10. How the United States exports managed care to developing countries.

    Science.gov (United States)

    Waitzkin, H; Iriart, C

    2001-01-01

    As their expansion slows in the United States, managed care organizations will continue to enter new markets abroad. Investors view the opening of managed care in Latin America as a lucrative business opportunity. As public-sector services and social security funds are cut back, privatized, and reorganized under managed care, with the support of international lending agencies such as the World Bank, the effects of these reforms on access to preventive and curative services will hold great importance throughout the developing world. Many groups in Latin America are working on alternative projects that defend health as a public good, and similar movements have begun in Africa and Asia. Increasingly, this organizing is being recognized not only as part of a class struggle but also as part of a struggle against economic imperialism--which has now taken on the new appearance of rescuing less developed countries from rising health care costs and inefficient bureaucracies through the imposition of neoliberal managed-care solutions exported from the United States.

  11. 33 CFR 2.36 - Navigable waters of the United States, navigable waters, and territorial waters.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Navigable waters of the United States, navigable waters, and territorial waters. 2.36 Section 2.36 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL JURISDICTION Jurisdictional Terms § 2.36 Navigable waters...

  12. 26 CFR 301.7505-1 - Sale of personal property acquired by the United States.

    Science.gov (United States)

    2010-04-01

    ... by the United States in payment of or as security for debts arising under the internal revenue laws... substantially higher price may be obtained, the sale may be held outside his district. (ii) Rejection of bids... any and all bids and withdraw the property from the sale. When it appears to the internal revenue...

  13. 7 CFR 1205.313 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1205.313 Section 1205.313 Agriculture... Research and Promotion Order Definitions § 1205.313 United States. United States means the 50 States of the United States of America. [31 FR 16758, Dec. 31, 1966. Redesignated at 56 FR 64472, Dec. 10, 1991] ...

  14. Weaponizing the Final Frontier: The United States and the New Space Race

    Science.gov (United States)

    2017-06-09

    prepare to defend these systems from attack.41 The next logical step is the development and execution of this philosophy to secure national interests...fourth argument impacting the weaponization of space references is the question of morality . In the article, Moral and Ethical Decisions Regarding Space...Warfare, Col (now General) John Hyten and Dr. Robert Uy describe the moral and ethical considerations to evaluate as the United States shapes

  15. Experience of the United States in Hosting and Supporting IAEA Peer Review Missions

    International Nuclear Information System (INIS)

    Mamish, N.

    2016-01-01

    The International Atomic Energy Agency (IAEA) provides a number of peer review services to its Member States. The United States has strongly supported these peer reviews since their inception. In 2010, the United States hosted an Integrated Regulatory Review Service (IRRS) mission, with a follow-up mission completed in 2014. The missions provided valuable recommendations and suggestions, identified a number of best practices, and acknowledged the prompt and effective actions taken by the NRC following the Fukushima Daiichi accident. Through hosting an International Physical Protection Advisory Service (IPPAS) mission in 2013, the United States benefited both from the insights provided by the team, as well as the U.S. Government’s gap analyses and preparatory efforts in advance of the mission. The United States strongly supports the IAEA’s Operational Safety Review Team (OSART) program, inviting a peer review mission to a U.S. nuclear power plant every 3 years. Although OSART is an operational, not regulatory, peer review, the NRC provides funding for the mission and gives inspection credit to operators that host them. The United States also contributes significant technical expertise to IAEA peer review missions hosted by other Member States. With the IRRS and IPPAS reaching their 10th and 20th anniversaries respectively, these programs have improved as they have matured. However, it remains critical for Member States to continue to support these programs, and provide feedback to the IAEA Secretariat on their effectiveness and areas where IAEA might enhance them. Doing so will ensure peer reviews remain an effective tool for strengthening nuclear safety and security worldwide. (author)

  16. Security improvement by using a modified coherent state for quantum cryptography

    International Nuclear Information System (INIS)

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-01-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible

  17. The neoliberal political economy and erosion of retirement security.

    Science.gov (United States)

    Polivka, Larry; Luo, Baozhen

    2015-04-01

    The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  18. 31 CFR 542.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 542.310 Section 542.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF....310 United States. The term United States means the United States, its territories and possessions...

  19. 31 CFR 548.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 548.310 Section 548.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF....310 United States. The term United States means the United States, its territories and possessions...

  20. 31 CFR 546.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 546.310 Section 546.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF....310 United States. The term United States means the United States, its territories and possessions...

  1. 31 CFR 586.318 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 586.318 Section 586...) KOSOVO SANCTIONS REGULATIONS General Definitions § 586.318 United States. The term United States means the United States, its territories and possessions, and all areas under the jurisdiction or authority...

  2. 31 CFR 537.318 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 537.318 Section 537.318 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF....318 United States. The term United States means the United States, its territories and possessions...

  3. 31 CFR 585.316 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 585.316 Section 585.316 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... General Definitions § 585.316 United States. The term United States means the United States, its...

  4. 31 CFR 575.319 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 575.319 Section 575.319 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF....319 United States. The term United States means the United States, its territories and possessions...

  5. 31 CFR 539.312 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 539.312 Section 539.312 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... General Definitions § 539.312 United States. The term United States means the United States, its...

  6. 31 CFR 551.309 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 551.309 Section 551.309 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF....309 United States. The term United States means the United States, its territories and possessions...

  7. 31 CFR 587.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 587.310 Section 587...) MILOSEVIC SANCTIONS REGULATIONS General Definitions § 587.310 United States. The term United States means the United States, its territories and possessions, and all areas under the jurisdiction or authority...

  8. 31 CFR 547.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 547.310 Section 547.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... General Definitions § 547.310 United States. The term United States means the United States, its...

  9. 31 CFR 598.317 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 598.317 Section 598.317 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 598.317 United States. The term United States means the United States, its territories and...

  10. 31 CFR 596.312 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 596.312 Section 596.312 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... General Definitions § 596.312 United States. The term United States means the United States, including its...

  11. 31 CFR 538.314 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 538.314 Section 538.314 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... § 538.314 United States. The term United States means the United States, its territories and possessions...

  12. 31 CFR 543.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 543.310 Section 543.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 543.310 United States. The term United States means the United States, its territories and...

  13. 31 CFR 594.313 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 594.313 Section 594.313 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 594.313 United States. The term United States means the United States, its territories and...

  14. 31 CFR 588.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 588.310 Section 588.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 588.310 United States. The term United States means the United States, its territories and...

  15. 31 CFR 536.315 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 536.315 Section 536.315 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 536.315 United States. The term United States means the United States, its territories and...

  16. 31 CFR 544.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 544.310 Section 544.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... REGULATIONS General Definitions § 544.310 United States. The term United States means the United States, its...

  17. 31 CFR 545.313 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 545.313 Section 545.313 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Definitions § 545.313 United States. The term United States means the United States, its territories and...

  18. 31 CFR 595.314 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 595.314 Section 595.314 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... § 595.314 United States. The term United States means the United States, its territories and possessions...

  19. 31 CFR 560.307 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 560.307 Section 560.307 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... § 560.307 United States. The term United States means the United States, including its territories and...

  20. 31 CFR 593.311 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 593.311 Section 593.311 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... REGULATIONS General Definitions § 593.311 United States. The term United States means the United States, its...

  1. 31 CFR 541.310 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 541.310 Section 541.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... § 541.310 United States. The term United States means the United States, its territories and possessions...

  2. 31 CFR 540.313 - United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States. 540.313 Section 540.313 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... REGULATIONS General Definitions § 540.313 United States. The term United States means the United States, its...

  3. 20 CFR 416.1603 - How to prove you are a resident of the United States.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How to prove you are a resident of the United States. 416.1603 Section 416.1603 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL... as— (1) Property, income, or other tax forms or receipts; (2) Utility bills, leases or rent payment...

  4. Quantum Secure Direct Communication with Five-Qubit Entangled State

    International Nuclear Information System (INIS)

    Lin Song; Liu Xiao-Fen; Gao Fei

    2011-01-01

    Recently, a genuine five-qubit entangled state has been achieved by Brown et al.[J. Phys. A 38 (2005) 1119]. Later it was indicated that this state can be used for quantum teleportation and quantum state sharing. Here we build a quantum secure direct communication protocol with this state, and prove that it is secure in ideal conditions. In the protocol, the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver. The receiver then performs projective determinate measurement to decode the secret message directly. Furthermore, this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity. (general)

  5. Weak states and security

    OpenAIRE

    Rakipi, Albert

    2006-01-01

    Cataloged from PDF version of article. Although the weak 1 failing states have often been deseribed as the single most important problem for the international order s ince the en d of Cold W ar (F .Fukuyaına 2004:92) several dimensions of this phenomenon still remain unexplored. While this phenomenon has been present in the international politics even earlier, only the post Cold W ar period accentuated its relationship with security issues. Following the Cold W ar' s "peacef...

  6. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-05-15

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  7. Current and Projected National Security Threats to the United States. Hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Eleventh Congress, Second Session

    Science.gov (United States)

    2010-02-02

    trainers see the tribal areas of Paki- stan as less secure and this had led al-Qa’ida to franchise into re- gional components in places such as North...and is still subject to sudden reversal or gradual erosion. The daunting array of challenges fac- ing African nations makes it highly likely in the... closure of Guantanamo and the transfer of detainees abroad. Now, the second paragraph of the letter states the following, ‘‘The professional

  8. 12 CFR 9.14 - Deposit of securities with state authorities.

    Science.gov (United States)

    2010-01-01

    ... than assets (e.g., a requirement to deposit a fixed amount or an amount equal to a percentage of... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Deposit of securities with state authorities. 9... ACTIVITIES OF NATIONAL BANKS Regulations § 9.14 Deposit of securities with state authorities. (a) In general...

  9. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  10. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  11. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  12. 7 CFR 1206.23 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1206.23 Section 1206.23 Agriculture... INFORMATION Mango Promotion, Research, and Information Order Definitions § 1206.23 United States. United... Rico, and the territories and possessions of the United States. ...

  13. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  14. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    Science.gov (United States)

    2018-03-01

    employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and human security. This study also...security to the principal who employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and...Uzbek forces, the United States and its allied partners momentarily destroyed most of the al Qaeda operatives in Afghanistan while simultaneously

  15. 7 CFR 1215.20 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1215.20 Section 1215.20 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS... United States. United States means all of the States. Popcorn Board ...

  16. The Main Features of and Response to The Current Asian Security Situation

    Institute of Scientific and Technical Information of China (English)

    Hu; Shisheng

    2015-01-01

    I.The Main Features of the Current Asian Security Situation The strategic game between China and the United States becomes the most powerful driving force to change the Asian traditional security situation.The United States has tried its best to delay China’s rising pace or"to standardize"China’s rising path by using its huge military advantage and forward military deployment and strengthening its security network of alliance and friends,so as to maintain its dominant position in

  17. Japan as a Paradigm for U.S. Homeland Security

    National Research Council Canada - National Science Library

    Ruth, Allen C

    2006-01-01

    ...) is in full swing and the United States is engaged around the world. These factors provide valid reasons for the United States to research other countries' homeland security paradigms to provide a contrast in methods of combating terrorism...

  18. State of the Art: Embedding Security in Vehicles

    Directory of Open Access Journals (Sweden)

    Weimerskirch André

    2007-01-01

    Full Text Available For new automotive applications and services, information technology (IT has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.

  19. State of the Art: Embedding Security in Vehicles

    Directory of Open Access Journals (Sweden)

    André Weimerskirch

    2007-06-01

    Full Text Available For new automotive applications and services, information technology (IT has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.

  20. 48 CFR 204.470-2 - National security exclusion.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...

  1. 37 CFR 5.1 - Applications and correspondence involving national security.

    Science.gov (United States)

    2010-07-01

    ... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...

  2. 7 CFR 1280.127 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1280.127 Section 1280.127 Agriculture... INFORMATION ORDER Lamb Promotion, Research, and Information Order Definitions § 1280.127 United States. United States means collectively the 50 States and the District of Columbia. ...

  3. 20 CFR 404.1019 - Work as a member of a uniformed service of the United States.

    Science.gov (United States)

    2010-04-01

    ... Force Reserve Officers Training Corps, when ordered to annual training duty for 14 days or more... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Work as a member of a uniformed service of the United States. 404.1019 Section 404.1019 Employees' Benefits SOCIAL SECURITY ADMINISTRATION...

  4. Economic security of modern Russia: the current state and prospects

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2018-01-01

    Full Text Available In the conditions of instability of the world economy and the introduction of sanctions against Russia by a number of countries, the problem of ensuring national economic security has become particularly relevant. This topic also has a high scientific, practical and social significance, as it allows to identify possible gaps in the economic security of modern Russia and timely develop mechanisms to eliminate them to protect the national interests of the state. The purpose of this article is to determine the state and prospects of improving the economic security of modern Russia. This can be achieved by solving the following tasks: review of existing methods to evaluate the economic security of country, conduct a SWOT analysis of economic security of modern Russia, the development of suggestions for its improvement. This research analyzes various aspects of the economic security of modern Russia. As a result, the author developed an integrated method to ensuring the economic security of the country, as well as a matrix of economic security within this method. The way of increase of economic security of modern Russia is offered. Thus, to overcome the threats for the economic security of modern Russia, it is necessary to implement the recommendations developed by the authors, including the establishment of their own production and the construction of an innovatively oriented model of the economy. This will ensure the economic security of modern Russia and its stable development in the future.

  5. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices

  6. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  7. 7 CFR 1260.108 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1260.108 Section 1260.108 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS... Promotion and Research Order Definitions § 1260.108 United States. United States means the 50 States and the...

  8. 7 CFR 1221.32 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1221.32 Section 1221.32 Agriculture... INFORMATION ORDER Sorghum Promotion, Research, and Information Order Definitions § 1221.32 United States. United States or U.S. means collectively the 50 States, the District of Columbia, the Commonwealth of...

  9. 7 CFR 1216.30 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1216.30 Section 1216.30 Agriculture... INFORMATION ORDER Peanut Promotion, Research, and Information Order Definitions § 1216.30 United States. United States means collectively the 50 states, the District of Columbia, the Commonwealth of Puerto Rico...

  10. 7 CFR 1218.22 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1218.22 Section 1218.22 Agriculture... INFORMATION ORDER Blueberry Promotion, Research, and Information Order Definitions § 1218.22 United States. United States means collectively the 50 states, the District of Columbia, the Commonwealth of Puerto Rico...

  11. 7 CFR 1210.315 - United States.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false United States. 1210.315 Section 1210.315 Agriculture... PLAN Watermelon Research and Promotion Plan Definitions § 1210.315 United States. United States means each of the several States and the District of Columbia. [60 FR 10797, Feb. 28, 1995] National...

  12. A New Type of Great Power Relationship Between the United States and China: The Military Dimension

    Science.gov (United States)

    2014-09-01

    multipolar world system and a pro- spective security and economic partner of the United States. This stands midway between the panda -hug- ging and dragon...spending, on the other hand, are more difficult to calculate and may prove significantly less easy to bear . 79. Eberhard Sandschneider, “Is China’s

  13. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Science.gov (United States)

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or foreign...

  14. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  15. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  16. Effects of government incentives on wind innovation in the United States

    Science.gov (United States)

    Horner, Nathaniel; Azevedo, Inês; Hounshell, David

    2013-12-01

    In the United States, as elsewhere, state and federal governments have considered or implemented a range of policies to create more sustainable energy generation systems in response to concerns over climate change, security of fuel supply, and environmental impacts. These policies include both regulatory instruments such as renewable portfolio standards (RPSs) and market incentives such as tax credits. While these policies are primarily geared towards increasing renewable generation capacity, they can indirectly affect innovation in associated technologies through a ‘demand-pull’ dynamic. Other policies, such as public research and development (R&D) funding, directly incentivize innovation through ‘technology-push’ means. In this letter, we examine these effects on innovation in the United States wind energy industry. We estimate a set of econometric models relating a set of US federal and state policies to patenting activity in wind technologies over the period 1974-2009. We find that RPS policies have had significant positive effects on wind innovation, whereas tax-based incentives have not been particularly effective. We also find evidence that the effects of RPS incentives differ between states. Finally, we find that public R&D funding can be a significant driver of wind innovation, though its effect in the US has been modest.

  17. Perspectives on Security, Disarmament, and Nonproliferation: Views from the United States and South Africa

    Science.gov (United States)

    2014-03-01

    history   and  current... apartheid  eras,  relations  between  the  United   States  and  the  ruling  ANC  have  not  always  been  smooth...post-­‐ apartheid  era.  The  panelist  argued  that  South  Africa  is  the  only  member  of  NAM,  other

  18. Between a Rock and a Hard Place: Treaty-Based Settlement of Terrorism-Related Disputes in the Era of Active United Nations Security Council Involvement

    NARCIS (Netherlands)

    N.T. Ali (Nathanael)

    2013-01-01

    markdownabstract__Abstract__ The United Nations Security Council has become a crucial actor in international counterterrorism by not only spurring the taking of preventive and suppressive measures against terrorist individuals and groups, but also by taking actions against states that are said to

  19. Forensic nursing in secure environments.

    Science.gov (United States)

    Shelton, Deborah

    2009-01-01

    There are few well-designed studies of corrections or prison nursing roles. This study seeks to describe the corrections or prison role of forensic nurses in the United States who provide care in secure environments. National data detailing the scope of practice in secure environments are limited. This pencil and paper survey describes the roles of 180 forensic nurses from 14 states who work in secure environments. Descriptive statistics are utilized. A repeated measures ANOVA with post hoc analyses was implemented. These nurses were older than average in age, but had 10 years or less experience in forensic nursing practice. Two significant roles emerged to "promote and implement principles that underpin effective quality and practice" and to "assess, develop, implement, and improve programs of care for individuals." Significant roles varied based upon the security classification of the unit or institution in which the nurses were employed. Access to information about these nurses and their nursing practice was difficult in these closed systems. Minimal data are available nationally, indicating a need for collection of additional data over time to examine changes in role. It is through such developments that forensic nursing provided in secure environments will define its specialization and attract the attention it deserves.

  20. 78 FR 29318 - Notice of Public Meeting of the Assembly of the Administrative Conference of the United States

    Science.gov (United States)

    2013-05-20

    ... United States makes recommendations to administrative agencies, the President, Congress, and the Judicial... improve the adjudication process for Social Security disability claims at the administrative law judge... benefit-cost analyses that accompany proposed and final rules. Science in the Administrative Process. This...

  1. Controlled and secure direct communication using GHZ state and teleportation

    International Nuclear Information System (INIS)

    Gao, T.

    2004-01-01

    A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side. (orig.)

  2. Terms, Trends, and Insights: PV Project Finance in the United States, 2017

    Energy Technology Data Exchange (ETDEWEB)

    Feldman, David J [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Schwabe, Paul D [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-10-23

    This brief is a compilation of data points and market insights that reflect the state of the project finance market for solar photovoltaic (PV) assets in the United States as of the third quarter of 2017. This information can generally be used as a simplified benchmark of the costs associated with securing financing for solar PV as well as the cost of the financing itself (i.e., the cost of capital). This work represents the second DOE sponsored effort to benchmark financing costs across the residential, commercial, and utility-scale PV markets, as part of its larger effort to benchmark the components of PV system costs.

  3. Political thuggery and security in Benue State: Counselling ...

    African Journals Online (AJOL)

    The paper has outlined the major causes and effects of political thuggery on the security and safety of Benue State. Since Government has seemingly become incapacitated in her bid to address the political situation in the state, this paper has recommended several counselling interventions which include political education ...

  4. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...

  5. "Sub-axis" : the Changing Japanese Role in the U.S. Asia-Pacific Security Layout

    Institute of Scientific and Technical Information of China (English)

    Xin; Qiang

    2014-01-01

    In recent years, in order to effectively respond to the rapid rise of China, the Obama Administration has energetically implemented the "Asia-Pacific rebalancing" strategy, and actively encouraged Japan to play a bigger role in the Asia-Pacific geo-security affairs. Under promotion of the Obama Administration and the active operation by several Japanese administrations, over the years the Asia-Pacific security pattern with the United States as the "single axis" shows a more obvious change, i.e. gradually evolving to a pattern with "the United States playing core role and Japan secondary role". Firstly, through continuously strengthening the Japan-U.S. alliance, and using the opportunity to promote development of its military strength, Japan constantly strengthens its "Strategic Autonomy" in the alliance. Secondly, through strengthening bilateral or trilateral security interactions with the United States and other Asia-Pacific allies, making "the U.S. and Japan +1" an important mechanism and platform for the United States and its Asia- Pacific allies to carry out security cooperation. Finally, Japan also takes the initiative to launch strategic security cooperation in various forms with the U.S. "strategic partners", such as India, Indonesia, Vietnam and others in the Asia-Pacific region. These measures not only upgrade Japan’s function and status in the alliance, but also steadily elevate the level of strategic cooperation with a series of important countries in Asia-Pacific and has further played an increasingly important connecting, supplementing and coordinating role in the Asia Pacific traditional "hub-spoke security structure", so its influence in regional security system also grows increasingly, thus, suddenly having become the "sub-axis", next to the United States, in the Asia-Pacific geosecurity pattern.

  6. Toll Facilities in the United States - Toll Facilities in the United States

    Data.gov (United States)

    Department of Transportation — Biennial report containing selected information on toll facilities in the United States that has been provided to FHWA by the States and/or various toll authorities...

  7. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  8. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  9. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  10. Tuberculosis genotyping information management system: enhancing tuberculosis surveillance in the United States.

    Science.gov (United States)

    Ghosh, Smita; Moonan, Patrick K; Cowan, Lauren; Grant, Juliana; Kammerer, Steve; Navin, Thomas R

    2012-06-01

    Molecular characterization of Mycobacterium tuberculosis complex isolates (genotyping) can be used by public health programs to more readily identify tuberculosis (TB) transmission. The Centers for Disease Control and Prevention's National Tuberculosis Genotyping Service has offered M. tuberculosis genotyping for every culture-confirmed case in the United States since 2004. The TB Genotyping Information Management System (TB GIMS), launched in March 2010, is a secure online database containing genotype results linked with case characteristics from the national TB registry for state and local TB programs to access, manage and analyze these data. As of September 2011, TB GIMS contains genotype results for 89% of all culture-positive TB cases for 2010. Over 400 users can generate local and national reports and maps using TB GIMS. Automated alerts on geospatially concentrated cases with matching genotypes that may represent outbreaks are also generated by TB GIMS. TB genotyping results are available to enhance national TB surveillance and apply genotyping results to conduct TB control activities in the United States. Published by Elsevier B.V.

  11. Deploying Difference: Security Threat Narratives and State Displacement from Protected Areas

    Directory of Open Access Journals (Sweden)

    Elizabeth Lunstrum

    2018-01-01

    Full Text Available State actors are increasingly treating protected areas as sites of security threats and policing resident communities as though they are the cause of this insecurity. This is translating into community eviction from protected areas that is authorised by security concerns and logics and hence not merely conservation concerns. We ground this claim by drawing upon empirical work from two borderland conservation areas: Mozambique's Limpopo National Park (LNP and Guatemala's Maya Biosphere Reserve (MBR. In both cases, we show how these security-provoked evictions are authorised by the mobilisation of interlocking axes of difference that articulate notions of territorial trespass with that of a racialised enemy. Rather than a new problem or phenomena, we show how these axes are rooted in prior histories of state actors rendering racialised subjects dangerous, Cold War histories in both cases and a longer colonial history with the LNP. We also show how standing behind these evictions is the nation-state and its practices of protected area territorialisation. From here, we illustrate how the rationale behind displacement from protected areas matters, as evictions become more difficult to contest once they are authorised by security considerations. The cases, however, differ in one key respect. While displacement from the LNP is an instance of conservation-induced displacement (CID, although one re-worked by security considerations, eviction from the MBR is motivated more centrally by security concerns yet takes advantage of protected area legislation. The study hence offers insight into a growing literature on conservation-security encounters and into different articulations of conservation, security, and displacement.

  12. Day-Ahead Coordination of Vehicle-to-Grid Operation and Wind Power in Security Constraints Unit Commitment (SCUC)

    OpenAIRE

    Mohammad Javad Abdollahi; Majid Moazzami

    2015-01-01

    In this paper security constraints unit commitment (SCUC) in the presence of wind power resources and electrical vehicles to grid is presented. SCUC operation prepare an optimal time table for generation unit commitment in order to maximize security, minimize operation cost and satisfy the constraints of networks and units in a period of time, as one of the most important research interest in power systems. Today, the relationship between power network and energy storage systems is interested...

  13. Steady state security assessment in deregulated power systems

    Science.gov (United States)

    Manjure, Durgesh Padmakar

    Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the

  14. Oil Vulnerabilities and United States Strategy

    Science.gov (United States)

    2007-02-08

    Mazda, Mercedes - Benz , Ford, Mercury, and Nissan offer flexible fuel vehicles in the United States. Ethanol is currently produced in the United States...USAWC STRATEGY RESEARCH PROJECT OIL VULNERABILITIES AND UNITED STATES STRATEGY by Colonel Shawn P. Walsh...Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an institutional accrediting

  15. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  16. Privacy and security of patient data in the pathology laboratory.

    Science.gov (United States)

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  17. Privacy and security of patient data in the pathology laboratory

    Directory of Open Access Journals (Sweden)

    Ioan C Cucoranu

    2013-01-01

    Full Text Available Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI. In the United States, the Health Insurance Portability and Accountability Act (HIPAA govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  18. Deterministic secure communications using two-mode squeezed states

    International Nuclear Information System (INIS)

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-01-01

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state

  19. 31 CFR 596.313 - United States person.

    Science.gov (United States)

    2010-07-01

    ... FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.313 United States person. The term United States person means any United States...

  20. Nuclear development in the United States

    International Nuclear Information System (INIS)

    Brewer, S.

    1983-01-01

    The history of the nuclear development in the United States has been one of international cooperation relations so far. The United States is to offer the technical information on atomic energy utilization to foreign countries in exchange for the guarantee that they never attempt to have or develop nuclear weapons. Actually, the United States has supplied the technologies on nuclear fuel cycle and other related fields to enable other countries to achieve economical and social progress. The Department of Energy clarified the public promise of the United States regarding the idea of international energy community. The ratio of nuclear power generation to total electric power supply in the United States exceeded 12%, and will exceed 20% by 1990. Since 1978, new nuclear power station has not been ordered, and some of the contracted power stations were canceled. The atomic energy industry in the United States prospered at the beginning of 1970s, but lost the spirit now, mainly due to the institutional problems rather than the technical ones. As the policy of the government to eliminate the obstacles, the improvement of the procedure for the permission and approval, the establishment of waste disposal capability, the verification of fast breeder reactor technology and the promotion of commercial fuel reprocessing were proposed. The re-establishment of the United States as the reliable supplier of atomic energy service is the final aim. (Kako, I.)

  1. 78 FR 70274 - United States Travel and Tourism Advisory Board: Meeting of the United States Travel and Tourism...

    Science.gov (United States)

    2013-11-25

    ... DEPARTMENT OF COMMERCE International Trade Administration United States Travel and Tourism Advisory Board: Meeting of the United States Travel and Tourism Advisory Board AGENCY: International Trade... the schedule and agenda for an open meeting of the United States Travel and Tourism Advisory Board...

  2. 78 FR 3398 - United States Travel and Tourism Advisory Board: Meeting of the United States Travel and Tourism...

    Science.gov (United States)

    2013-01-16

    ... DEPARTMENT OF COMMERCE International Trade Administration United States Travel and Tourism Advisory Board: Meeting of the United States Travel and Tourism Advisory Board AGENCY: International Trade... the schedule and agenda for an open meeting of the United States Travel and Tourism Advisory Board...

  3. Effects of government incentives on wind innovation in the United States

    International Nuclear Information System (INIS)

    Horner, Nathaniel; Azevedo, Inês; Hounshell, David

    2013-01-01

    In the United States, as elsewhere, state and federal governments have considered or implemented a range of policies to create more sustainable energy generation systems in response to concerns over climate change, security of fuel supply, and environmental impacts. These policies include both regulatory instruments such as renewable portfolio standards (RPSs) and market incentives such as tax credits. While these policies are primarily geared towards increasing renewable generation capacity, they can indirectly affect innovation in associated technologies through a ‘demand-pull’ dynamic. Other policies, such as public research and development (R and D) funding, directly incentivize innovation through ‘technology-push’ means. In this letter, we examine these effects on innovation in the United States wind energy industry. We estimate a set of econometric models relating a set of US federal and state policies to patenting activity in wind technologies over the period 1974–2009. We find that RPS policies have had significant positive effects on wind innovation, whereas tax-based incentives have not been particularly effective. We also find evidence that the effects of RPS incentives differ between states. Finally, we find that public R and D funding can be a significant driver of wind innovation, though its effect in the US has been modest. (letter)

  4. United States housing, 2012

    Science.gov (United States)

    Delton Alderman

    2013-01-01

    Provides current and historical information on housing market in the United States. Information includes trends for housing permits and starts, housing completions for single and multifamily units, and sales and construction. This report will be updated annually.

  5. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  6. 31 CFR 500.520 - Payments from accounts of United States citizens in employ of United States in foreign countries...

    Science.gov (United States)

    2010-07-01

    ... States citizens in employ of United States in foreign countries and certain other persons. 500.520..., Authorizations and Statements of Licensing Policy § 500.520 Payments from accounts of United States citizens in employ of United States in foreign countries and certain other persons. (a) Banking institutions within...

  7. 31 CFR 515.520 - Payments from accounts of United States citizens in employ of United States in foreign countries...

    Science.gov (United States)

    2010-07-01

    ... States citizens in employ of United States in foreign countries and certain other persons. 515.520..., Authorizations, and Statements of Licensing Policy § 515.520 Payments from accounts of United States citizens in employ of United States in foreign countries and certain other persons. (a) Banking institutions within...

  8. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Science.gov (United States)

    2010-10-01

    ... background inquiries pertaining to verification of name, physical description, marital status, present and... undergo security processing by the Department's Office of Security before being eligible to work on the.... citizens must have: (1) Official legal status in the United States; (2) Continuously resided in the United...

  9. TRAINING OF THE STATE PRESIDENT'S UNIT

    African Journals Online (AJOL)

    The primary function of the State President's Unit is to protect the head of state - not his person as is generally believed, but his authority over the state. Ironically, the ceremonial performances of the State President's Unit lead people to believe that they are only capable of doing drill exer- cises. However, upon investigating.

  10. 18 CFR 131.43 - Report of securities issued.

    Science.gov (United States)

    2010-04-01

    .... Securities and Exchange Commission registration fee 6. State mortgage registration tax 7. State commission fee 8. Fee for recording indenture 9. United States document tax 10. Printing and engraving expenses 11. Trustee's charges 12. Counsel fees 13. Accountant's fees 14. Cost of listing 15. Miscellaneous...

  11. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  12. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  13. United States-Gulf Cooperation Council Security Cooperation in a Multipolar World

    Science.gov (United States)

    2014-10-01

    in U.S.-forged security alliances . Finally, the events of the Arab Spring beginning in 2010, which swept away several governments and have led to...wealthiest countries on a per capita basis. Storming ahead with post-modern skylines, and rapidly growing nonoil sectors such as tourism , culture, real...estate, and finance, many GCC members are now economic political brands in their own right, ranging from Dubai’s metropolism to Qatar’s knowledge

  14. Spatial variability of soil carbon across Mexico and the United States

    Science.gov (United States)

    Vargas, R.; Guevara, M.; Cruz Gaistardo, C.; Paz, F.; de Jong, B.; Etchevers, J.

    2015-12-01

    Soil organic carbon (SOC) is directly linked to soil quality, food security, and land use/global environmental change. We use publicly available information on SOC and couple it with digital elevation models and derived terrain attributes using a machine learning approach. We found a strong spatial dependency of SOC across the United States, but less spatial dependency of SOC across Mexico. Using High Performance Computing (HPC) we derived a 1 km resolution map of SOC across Mexico and the United States. We tested different machine learning methods (e.g., kernel based, tree based and/or Geo-statistics approaches) for computational efficiency and statistical accuracy. Using random forest combined with geo-statistics we were able to explain >70% of SOC variance for Mexico and >40% in the case of the United States via cross validation. These results compare with other published estimates of SOC at 1km resolution that only explain <30% of SOC variance across the world. Topographic attributes derived from digital elevation models are freely available globally at fine spatial resolution (<100 m), and this information allowed us to make predictions of SOC at fine scales. We further tested this approach using SOC information from the International Soil Carbon Network to predict SOC in other regions of the world. We conclude that this approach (using public information and open source platforms for data analysis) could be implemented to predict detailed explicit information of SOC across different spatial scales.

  15. 33 CFR 125.53 - Requirements for credentials; certain vessels operating on navigable waters of the United States...

    Science.gov (United States)

    2010-07-01

    ... master, person in charge, or member of the crew thereof, shall be required to be in possession of one of... United States other than the Great Lakes and Western Rivers. (b) The term “master, person in charge, or... Guard Port Security Card (Form CG 2514) is to be used as the identification required by paragraph (a) of...

  16. Cybersecurity Lanes in the Road for the Department of Homeland Security

    Science.gov (United States)

    2016-06-01

    imposing censorship here in the United States.”66 According to President Obama the main goal of the attack was for North Korea to impose restrictions on...was Congress passing Public Law 107–56 in October 2001, titled “The Uniting and Strengthening America by Providing Appropriate Tools Required to...Department of Homeland Security, modified October 2014, http://www.dhs.gov/creation-department-homeland-security. 80 Uniting and Strengthening America by

  17. United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.

    Science.gov (United States)

    1995-09-01

    police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances

  18. United Nations and Multilateralism: Appraising USA's Unilateralism ...

    African Journals Online (AJOL)

    DrNneka

    global peace and security, as well as the survival of the United Nations. This is because ... Key Words: United Nations, multilateralism, United States, unilateralism, national interest, UN Charter ..... Lebanon, Iraq, Turkey, Egypt, Jordan, etc.

  19. Redefining Human Security for Vulnerable Migrants in East Asia

    Directory of Open Access Journals (Sweden)

    Jiyoung Song

    2015-01-01

    Full Text Available This article proposes human security as an analytical framework to understand the current trends of irregular migration (both forced and unauthorised in East Asia and revisits the seven pillars of human security defined in the 1994 Human Development Report by the United Nations Development Programme (UNDP. It explains how the concepts of human security are parallel to those prescribed in international human rights conventions but different in terms of the attitude towards states. Human security does not directly challenge state authority and adds a sense of urgency and moral authority that requires extra-legal measures by the states. The author argues that human security is the securitisation of human rights and is a better framework and policy discourse than human rights to engage with state and non-state actors, especially in East Asia where political leaders are more receptive to the former idea. The study draws examples from stateless Rohingyas, undocumented sex workers in Thailand and Singapore, trafficked brides from Vietnam and Cambodia, and smuggled North Korean refugees in China to demonstrate the nexus between human security and irregular migration.

  20. 20 CFR 725.606 - Security for the payment of benefits.

    Science.gov (United States)

    2010-04-01

    ... operator or other employer fails to provide proof of such security to the Director within 30 days of its...-compliance to the appropriate United States district court in accordance with § 725.351(c). (f) Security... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security for the payment of benefits. 725.606...

  1. Nuclear material control in the United States

    International Nuclear Information System (INIS)

    Jaeger, C.; Waddoups, I.

    1995-01-01

    The Department of Energy has defined a safeguards system to be an integrated system of physical protection, material accounting and material control subsystems designed to deter, prevent, detect, and respond to unauthorized possession, use, or sabotage of SNM. In practice, safeguards involve the development and application of techniques and procedures dealing with the establishment and continued maintenance of a system of activities. The system must also include administrative controls and surveillance to assure that the procedures and techniques of the system are effective and are being carried out. The control of nuclear material is critical to the safeguarding of nuclear materials within the United States. The U.S. Department of Energy includes as part of material control four functional performance areas. They include access controls, material surveillance, material containment and detection/assessment. This paper will address not only these areas but also the relationship between material control and other safeguards and security functions

  2. United States Domestic Research Reactor Infrastructure - TRIGA Reactor Fuel Support

    International Nuclear Information System (INIS)

    Morrell, Douglas

    2008-01-01

    The purpose of the United State Domestic Research Reactor Infrastructure Program is to provide fresh nuclear reactor fuel to United States universities at no, or low, cost to the university. The title of the fuel remains with the United States government and when universities are finished with the fuel, the fuel is returned to the United States government. The program is funded by the United States Department of Energy - Nuclear Energy division, managed by Department of Energy - Idaho Field Office, and contracted to the Idaho National Laboratory's Management and Operations Contractor - Battelle Energy Alliance. Program has been at Idaho since 1977 and INL subcontracts with 26 United States domestic reactor facilities (13 TRIGA facilities, 9 plate fuel facilities, 2 AGN facilities, 1 Pulstar fuel facility, 1 Critical facility). University has not shipped fuel since 1968 and as such, we have no present procedures for shipping spent fuel. In addition: floor loading rate is unknown, many interferences must be removed to allow direct access to the reactor tank, floor space in the reactor cell is very limited, pavement ends inside our fence; some of the surface is not finished. The whole approach is narrow, curving and downhill. A truck large enough to transport the cask cannot pull into the lot and then back out (nearly impossible / refused by drivers); a large capacity (100 ton), long boom crane would have to be used due to loading dock obstructions. Access to the entrance door is on a sidewalk. The campus uses it as a road for construction equipment, deliveries and security response. Large trees are on both sides of sidewalk. Spent fuel shipments have never been done, no procedures approved or in place, no approved casks, no accident or safety analysis for spent fuel loading. Any cask assembly used in this facility will have to be removed from one crane, moved on the floor and then attached to another crane to get from the staging area to the reactor room. Reactor

  3. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    Murray, D.W.

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. The results of these tests as well as a description of the test equipment, test sites, and procedures are presented in this report

  4. Environmental Security: What Environmental Issues Impact Regional Stability and Affect United States Foreign Policy with Mexico?

    Science.gov (United States)

    1997-03-01

    extraregional sponsor of Alianza para el Desarrollo Sostenible (Sustainable Development Alliance - ALIDES), along with United States and Canada. ALIDES is...more stable the government the better the country will be able to solve its environmental problems. 42 Glossary ALIDES Alianza para el Desarrollo ... Sostenible (Sustainable Development Alliance) C Centigrade CFCs Chlorofluorocarbons BECC Border Environment Cooperation Commission BNC Binational

  5. The United States and security in Africa: the impact of the military ...

    African Journals Online (AJOL)

    The focus of this article is to examine the dynamics influencing the militarization of US-Africa relations and their impact on security and transformation in Africa. The article attempts to illuminate the ideological, economic and social forces that influence the conception and practice of the militarization of US policy towards ...

  6. 31 CFR 515.334 - United States national.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false United States national. 515.334 Section 515.334 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... of the United States, and which has its principal place of business in the United States. [61 FR...

  7. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri, E-mail: guri.bang@cicero.uio.n [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  8. Energy security and climate change concerns. Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress - the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo. (author)

  9. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    International Nuclear Information System (INIS)

    Bang, Guri

    2010-01-01

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  10. The United States Geological Survey: 1879-1989

    Science.gov (United States)

    Rabbitt, Mary C.

    1989-01-01

    The United States Geological Survey was established on March 3, 1879, just a few hours before the mandatory close of the final session of the 45th Congress, when President Rutherford B. Hayes signed the bill appropriating money for sundry civil expenses of the Federal Government for the fiscal year beginning July 1, 1879. The sundry civil expenses bill included a brief section establishing a new agency, the United States Geological Survey, placing it in the Department of the Interior, and charging it with a unique combination of responsibilities: 'classification of the public lands, and examination of the geological structure, mineral resources, and products of the national domain.' The legislation stemmed from a report of the National Academy of Sciences, which in June 1878 had been asked by Congress to provide a plan for surveying the Territories of the United States that would secure the best possible results at the least possible cost. Its roots, however, went far back into the Nation's history. The first duty enjoined upon the Geological Survey by the Congress, the classification of the public lands, originated in the Land Ordinance of 1785. The original public lands were the lands west of the Allegheny Mountains claimed by some of the colonies, which became a source of contention in writing the Articles of Confederation until 1781 when the States agreed to cede their western lands to Congress. The extent of the public lands was enormously increased by the Louisiana Purchase in 1803 and later territorial acquisitions. At the beginning of Confederation, the decision was made not to hold the public lands as a capital asset, but to dispose of them for revenue and to encourage settlement. The Land Ordinance of 1785 provided the method of surveying and a plan for disposal of the lands, but also reserved 'one-third part of all gold, silver, lead, and copper mines to be sold or otherwise disposed of, as Congress shall thereafter direct,' thus implicitly requiring

  11. How strong is the Social Security safety net? Using the Elder Index to assess gaps in economic security.

    Science.gov (United States)

    Mutchler, Jan E; Li, Yang; Xu, Ping

    2018-04-16

    Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.

  12. Examining the Relationship of Business Operations and the Information Security Culture in the United States

    Science.gov (United States)

    Wynn, Cynthia L.

    2017-01-01

    An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…

  13. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  14. 76 FR 52133 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Science.gov (United States)

    2011-08-19

    ... Outside the United States.'' DFARS 225.302-3, Definitions, provides the definition of ``private security... this total, 361, or 20 percent, were awarded to small businesses. Firms performing private security... private security functions in response to a perceived immediate threat; (2) Ensure that all employees of...

  15. A survey of energy policy priorities in the United States: Energy supply security, economics, and the environment

    International Nuclear Information System (INIS)

    Manley, Dawn K.; Hines, Valerie A.; Jordan, Matthew W.; Stoltz, Ronald E.

    2013-01-01

    Security, environment, and economic concerns are commonly identified as three major objectives of energy policy. State and federal governments have set aggressive targets for carbon emissions reductions and for alternative fuel use and increased vehicle efficiency to reduce petroleum consumption. Moreover, jobs creation and GDP growth are often cited as key drivers for energy policies. Previous studies on energy policy decision-making have examined the process for developing and evaluating options using multi-criteria decision analysis tools. In addition, energy opinion polls have either elicited preferences between two goals or whether the public supports a specific policy action. In this article, we report results from a survey of 884 members of professional membership organizations on how the U.S. should prioritize energy policy across the goals of energy supply security, environment and climate, and economics and job creation. The majority favor policymaking that is balanced across all three. Security and economic concerns increase with age for male respondents, whereas environment is the highest priority for females regardless of age. Unlike previous surveys that target the general public and focus on a particular objective or technology, these results provide an example of eliciting a portfolio allocation across multiple energy policy goals from targeted constituents. - Highlights: • We surveyed 884 members of professional membership organizations on how the U.S. should prioritize energy policy. • The paper addresses direct elicitation of energy policy goal portfolio allocation for a large set of energy stakeholders. • The majority of respondents favor policymaking balanced across multiple goals. • We observed differences in priorities based on age and gender. • Respondents expressed a tension in allocating across goals that are interrelated

  16. Social Security Contributions and Return Migration Among Older Male Mexican Immigrants.

    Science.gov (United States)

    Aguila, Emma; Vega, Alma

    2017-06-01

    For decades, scholars have studied the effects of immigration on the U.S. social security system. To date, this research has been primarily limited to migrants within the United States and does not consider those who return to their countries of origin. We estimate the proportion of male Mexican return migrants who contributed to the U.S. social security system and analyze their socioeconomic characteristics and migration histories. We also estimate the proportion that receive or expect to receive U.S. social security benefits. Using probit regression on the 2012 Mexican Health and Aging Study (MHAS), we describe the predictors of having contributed to the U.S. social security system among Mexican males in Mexico aged 50 years and older who at some point lived in the United States. We find that 32% of male return migrants reported having contributed to the U.S. social security system, but only 5% of those who contributed, received or expected to receive benefits. Those who reported having contributed spent more years in the United States and were more likely to be U.S. citizens or legal permanent residents than those who did not contribute. Immigrants often pay Old-Age, Survivors, and Disability Insurance taxes using legitimate or illegitimate social security numbers and return to their home countries without collecting U.S. social security benefits. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. ASEAN’S Strategic Approach Towards Security Relations with the U.S. and China: Hedging through a Common Foreign and Security Policy

    Science.gov (United States)

    2014-06-13

    Foreign and Security Policy EAS East Asia Summit EU European Union NATO North Atlantic Treaty Organization SCS South China Sea U.S. United States...operational vacuum. While ASEAN has rejected “hard” security institutions like the North Atlantic Treaty Organization to resolve inter-state... Bali Concord II) calls for the establishment of an ASEAN Community by the 74Sheldon W. Simon, “The ASEAN Regional Forum: Beyond the Talk Shop?,” NBR

  18. Discharges to prison from medium secure psychiatric units in England and Wales.

    Science.gov (United States)

    Doyle, Michael; Coid, Jeremy; Archer-Power, Laura; Dewa, Lindsay; Hunter-Didrichsen, Alice; Stevenson, Rachel; Wainwright, Verity; Kallis, Costas; Ullrich, Simone; Shaw, Jenny

    2014-09-01

    Early findings from a national study of discharges from 32 National Health Service medium secure units revealed that nearly twice as many patients than expected were discharged back to prison. To compare the characteristics of those discharged back to prison with those discharged to the community, and consider the implications for ongoing care and risk. Prospective cohort follow-up design. All forensic patients discharged from 32 medium secure units across England and Wales over a 12-month period were identified. Those discharged to prison were compared with those who were discharged to the community. Nearly half of the individuals discharged to prison were diagnosed with a serious mental illness and over a third with schizophrenia. They were a higher risk, more likely to have a personality disorder, more symptomatic and less motivated than those discharged to the community. Findings suggest that alternative models of prison mental healthcare should be considered to reduce risks to the patient and the public. Royal College of Psychiatrists.

  19. Teen Pregnancy in the United States

    Science.gov (United States)

    ... United States: the contribution of abstinence and improved contraceptive use. Am J Public Health. 2007;97(1):150-6. Lindberg LD, Santelli JS, Desai, S. Understanding the Decline in Adolescent Fertility in the United States, 2007–2012. J ...

  20. China, the United States, and competition for resources that enable emerging technologies

    Science.gov (United States)

    Gulley, Andrew L.; Nassar, Nedal T.; Xun, Sean

    2018-01-01

    Historically, resource conflicts have often centered on fuel minerals (particularly oil). Future resource conflicts may, however, focus more on competition for nonfuel minerals that enable emerging technologies. Whether it is rhenium in jet engines, indium in flat panel displays, or gallium in smart phones, obscure elements empower smarter, smaller, and faster technologies, and nations seek stable supplies of these and other nonfuel minerals for their industries. No nation has all of the resources it needs domestically. International trade may lead to international competition for these resources if supplies are deemed at risk or insufficient to satisfy growing demand, especially for minerals used in technologies important to economic development and national security. Here, we compare the net import reliance of China and the United States to inform mineral resource competition and foreign supply risk. Our analysis indicates that China relies on imports for over half of its consumption for 19 of 42 nonfuel minerals, compared with 24 for the United States—11 of which are common to both. It is for these 11 nonfuel minerals that competition between the United States and China may become the most contentious, especially for those with highly concentrated production that prove irreplaceable in pivotal emerging technologies.

  1. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  2. Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  3. State-Building and Democracy: Prosperity Representation and Security in Kosovo

    OpenAIRE

    Silander, Daniel; Janzekovitz, John

    2012-01-01

    The traditional assumption of the state sovereignty norm has been that an international society of states will structure the international order to safeguard the interests of the state. The end of the Cold War era transformed international relations and led to a discussion on how states interacted with their populations. From the early 1990s, research on international relations, war and peace, and security studies identified the growing problem of failing states. Such states ar...

  4. Immigration Enforcement Within the United States

    Science.gov (United States)

    2006-04-06

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Policy Issues...Remained in the United States, (Washington: Center for Immigration Studies, May 2002). Immigration Enforcement Within the United States Introduction ...interior enforcement lack a border component. For example, fugitive taskforces, investigations of alien slavery and sweatshops , and employer sanctions do

  5. Symptoms of Psychological Distress and Post-Traumatic Stress Disorder in United States Air Force Drone Operators

    Science.gov (United States)

    2014-08-01

    Disorder in United States Air Force “ Drone ” Operators 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...referred to as “ drones .” Participants were assessed for self-reported sources of occupational stress, levels of clinical distress using the Outcome...providers are discussed. 15. SUBJECT TERMS Stress, drone operator, PTSD, USAF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  6. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  7. Liberia: National Security Interests in Transformational Development

    National Research Council Canada - National Science Library

    Coleman, Carolyn I

    2008-01-01

    Liberia is of national security interest to the United States of America. Liberia's 14-year civil war ended in 2003, leaving the country with a collapsed government and failing economic, physical, and social infrastructures...

  8. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    Science.gov (United States)

    2015-06-01

    are amplified by shifting demographics. Youth populations are rapidly growing in Africa and the Middle East, regions that face resource shortages...fear in opponents and generate support for their causes. They use improvised explosive devices (IED), suicide vests, and tailored cyber tools to...our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such

  9. 'The Maggot Within': The state security apparatus in Ngũgĩ's Wizard ...

    African Journals Online (AJOL)

    'The Maggot Within': The state security apparatus in Ngũgĩ's Wizard of the Crow. ... the state security apparatus in Wizard of the Crow promote shady business deals and as well systematize corruption. ... AJOL African Journals Online. HOW TO ...

  10. ATC calculation with steady-state security constraints using Benders decomposition

    International Nuclear Information System (INIS)

    Shaaban, M.; Yan, Z.; Ni, Y.; Wu, F.; Li, W.; Liu, H.

    2003-01-01

    Available transfer capability (ATC) is an important indicator of the usable amount of transmission capacity accessible by assorted parties for commercial trading, ATC calculation is nontrivial when steady-state security constraints are included. In hie paper, Benders decomposition method is proposed to partition the AC problem with steady-state security constraints into a base case master problem and a series of subproblems relevant to various contingencies to include their impacts on ATC. The mathematical model is formulated and the two solution schemes are presented. Computer testing on the 4-bus system and IEEE 30-bus system shows the effectiveness of the proposed method and the solution schemes. (Author)

  11. United States advanced technologies

    International Nuclear Information System (INIS)

    Longenecker, J.R.

    1985-01-01

    In the United States, the advanced technologies have been applied to uranium enrichment as a means by which it can be assured that nuclear fuel cost will remain competitive in the future. The United States is strongly committed to the development of advanced enrichment technology, and has brought both advanced gas centrifuge (AGC) and atomic vapor laser isotope separation (AVLIS) programs to a point of significant technical refinement. The ability to deploy advanced technologies is the basis for the confidence in competitive future price. Unfortunately, the development of advanced technologies is capital intensive. The year 1985 is the key year for advanced technology development in the United States, since the decision on the primary enrichment technology for the future, AGC or AVLIS, will be made shortly. The background on the technology selection process, the highlights of AGC and AVLIS programs and the way to proceed after the process selection are described. The key objective is to maximize the sales volume and minimize the operating cost. This will help the utilities in other countries supply low cost energy on a reliable, long term basis. (Kako, I.)

  12. The trend toward free trade areas: economic consequences and policy implications for the United States

    OpenAIRE

    All, William H., IV

    1992-01-01

    Approved for public release; distribution is unlimited Because America's economy relies to a significant degree on export markets and external sources of raw materials, the health of the international trading system is critical to the national security of the United States. This thesis demonstrates that the organization on which America has relied for the management of the international trading system since the 1950s, the General Agreement on Tariffs and Trade (GATT), is failing to effect...

  13. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    Science.gov (United States)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-06-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  14. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  15. The United States and the Arab Gulf Monarchies

    International Nuclear Information System (INIS)

    Kechichian, J.A.

    1999-01-01

    The United States has enduring strategic interests in the Persian Gulf region. To understand these interests and the Usa policy towards the Arab Gulf Monarchies, the french institute of international relations (IFRI) proposes this document. The following chapters are detailed: the United States and the Arab Gulf Monarchies, overview, Chief Unites States Objective: Access to oil, re-evaluating United States Foreign Policy in the Gulf, the second term (Usa strategy). (A.L.B.)

  16. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State

    Science.gov (United States)

    Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.

    2017-01-01

    Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498

  17. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    Science.gov (United States)

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  18. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  19. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    Science.gov (United States)

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  20. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    recreation, national defense, and tourism . To understand the maritime homeland security efforts put into place after 9/11 better, a study of the practices...fire service venturing beyond its fire suppression or emergency medical services role and asserted the value of having firefighters better integrated...national defense, and tourism , so too must be the approach to maritime homeland security. This research examined only the role of state and local law

  1. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    Science.gov (United States)

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  2. Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations

    Science.gov (United States)

    Davis, Robert E.

    2017-01-01

    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…

  3. Risks and threats of tax state security and methods of their neutralization

    Directory of Open Access Journals (Sweden)

    Y.V. Lebedzevych

    2016-12-01

    Full Text Available The article substantiates the relevance of the study to ensure security of the state tax. Scientists studied different approaches to defining the essence of the concept of "security tax" on the key features that would satisfy the interests of all subjects of tax relations and the necessity of legal consolidation of this concept. Analyzed the economic, social and legal nature of the existence of the security tax, identified key indicators of fiscal security of Ukraine. To determine the effectiveness of the tax administration in the interests of the tax security highlights the main threats, tax security risks caused by external and internal factors, and propose measures for their elimination and prevent the possibility of their occurrence. The stages of tax risk management with effective building security tax, designed structurally-logic of the tax risk management security.

  4. Power from Perspective: Potential future United States energy portfolios

    International Nuclear Information System (INIS)

    Tonn, Bruce; Healy, K.C.; Gibson, Amy; Ashish, Ashutosh; Cody, Preston; Beres, Drew; Lulla, Sam; Mazur, Jim; Ritter, A.J.

    2009-01-01

    This paper presents United States energy portfolios for the year 2030, developed from seven different Perspectives. The Perspectives are characterized by different weights placed on fourteen defining values (e.g., cost, social acceptance). The portfolios were constructed to achieve three primary goals, energy independence, energy security, and greenhouse gas reductions. The portfolios are also evaluated over a comprehensive set of secondary criteria (e.g., economic growth, technical feasibility). It is found that very different portfolios based on very different defining values can achieve the three primary goals. Commonalities among the portfolios include reliance upon cellulosic ethanol, nuclear power, and energy efficiency to meet year 2030 energy demands. It is concluded that the US energy portfolio must be diverse and to achieve national energy goals will require an explicit statement of goals, a strong role for government, and coordinated action across society

  5. 78 FR 46686 - Privacy Act of 1974; Treasury/United States Mint .013-United States Mint National Electronic...

    Science.gov (United States)

    2013-08-01

    ... available publicly. FOR FURTHER INFORMATION CONTACT: For general questions and privacy issues, please... DEPARTMENT OF THE TREASURY Privacy Act of 1974; Treasury/United States Mint .013--United States... Privacy Act of 1974, as amended, 5 U.S.C. 552a, the Department of the Treasury (``Treasury'') and the...

  6. Exploring stories of occupational engagement in a regional secure unit.

    Science.gov (United States)

    Morris, Karen; Cox, Diane L; Ward, Kath

    2016-09-02

    This paper focuses on the occupational experiences of five men living within a forensic mental health unit over a year. This study used a descriptive qualitative case study methodology to explore the meaning and value placed on daily life (activities, occupations and routines), and how this changed over time. The men's stories showed a complex picture of their experiences of daily life. This study demonstrated the impact of the environment on the men and the ongoing challenge of the need to balance treatment/therapy with security demands and opportunities. Three interrelated themes were identified: (1) Power and Occupation; (2) Therapy or Punishment; (3) Occupational Opportunities within Restrictions. These findings serve as a reminder to clinical teams to reassess the value of occupations attributed by their patients and the impact of the secure environment, whilst also acknowledging the potential for occupations to have a negative impact on well-being.

  7. Obstacles in energy security: An analysis of congressional and presidential framing in the United States

    International Nuclear Information System (INIS)

    Below, Amy

    2013-01-01

    Despite decades of policymaking, the U.S. has only recently made significant strides in becoming a more energy secure nation. With a focus on the executive and legislative branches, this paper investigates two possible political obstacles to achieve this policy goal. The first question it asks is whether or not the two branches have been defining energy security in the same way. As the concept itself has no universal definition, it is possible that the branches have been focusing on different aspects of the term. Results from a content analysis of presidential speeches and congressional hearings suggest that no such division has occurred. The subsequent question asks whether or not the two branches, in tandem, are providing the foundation for sound policy. Results suggest that Congress and presidents have defined and discussed energy security in a generally balanced, comprehensive and internally non-conflictual way. What policy emerges from these discussions should be the subject of future research. -- Highlights: •A content-analysis of congressional hearings and presidential speeches was conducted. •Executive and legislative branches have been generally unified in how they frame the issue of energy security. •Both have avoided overreliance on sensationalized frames. •Both do not focus enough attention on energy efficiency and intensity

  8. 39 CFR 221.1 - The United States Postal Service.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false The United States Postal Service. 221.1 Section 221.1 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION GENERAL ORGANIZATION § 221.1 The United States Postal Service. The United States Postal Service was established as an...

  9. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  10. UNITED STATES DURING THE COLD WAR 1945-1990

    Directory of Open Access Journals (Sweden)

    Novita Mujiyati

    2016-02-01

    Full Text Available United States and the Soviet Union is a country on the part of allies who emerged as the winner during World War II. However, after reaching the Allied victory in the situation soon changed, man has become an opponent. United States and the Soviet Union are competing to expand the influence and power. To compete the United States strive continuously strengthen itself both in the economic and military by establishing a defense pact and aid agencies in the field of economy. During the Cold War the two are not fighting directly in one of the countries of the former Soviet Union and the United States. However, if understood, teradinya the Korean War and the Vietnam War is a result of tensions between the two countries and is a direct warfare conducted by the United States and the Soviet Union. Cold War ended in conflict with the collapse of the Soviet Union and the United States emerged as the winner of the country.

  11. Authenticated Secure Container System (ASCS)

    International Nuclear Information System (INIS)

    1991-01-01

    Sandia National Laboratories developed an Authenticated Secure Container System (ASCS) for the International Atomic Energy Agency (IAEA). Agency standard weights and safeguards samples can be stored in the ASCS to provide continuity of knowledge. The ASCS consists of an optically clear cover, a base containing the Authenticated Item Monitoring System (AIMS) transmitter, and the AIMS receiver unit for data collection. The ASCS will provide the Inspector with information concerning the status of the system, during a surveillance period, such as state of health, tampering attempts, and movement of the container system. The secure container is located inside a Glove Box with the receiver located remotely from the Glove Box. AIMS technology uses rf transmission from the secure container to the receiver to provide a record of state of health and tampering. The data is stored in the receiver for analysis by the Inspector during a future inspection visit. 2 refs

  12. Internal and External Barriers Impacting Non-Food Cellulosic Biofuel Projects in the United States

    Directory of Open Access Journals (Sweden)

    Jeremy Withers

    2015-05-01

    Full Text Available Escalating demand, along with EPAct 2005, has led the United States government to assume a twofold leadership approach of energy security and environmental practices. This has initiated several important issues pertaining to cellulosic biofuel production. However, little is known about what is needed for the U.S. to lead long-term renewable energy security, how the US will develop and implement leading environmental energy practices, what supply capabilities and refining technologies are available to produce renewable fuels, and how funding can be used to adopt available technologies. This article examines geographical aspects, operational status, and barriers tending to prevent the successful commercialization of non-food cellulosic ethanol projects in the U.S. from secondary sources. Outcomes of this research can be used to further understand inhibitors that impact the production and commercialization of ethanol from non-food cellulosic sources.

  13. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  14. Requirements for the transport of surplus fissile materials in the United States

    International Nuclear Information System (INIS)

    Wilson, R.K.

    1995-01-01

    This paper discusses the requirements and issues associated with the transportation of surplus fissile materials in the United States. The paper describes the materials that will be transported, the permissible modes of transport for these materials, and the safety and security requirements for each mode of transport. The paper also identifies transportation issues associated with these requirements, including the differences in requirements corresponding to who owns the material and whether the transport is on-site or off-site. Finally, the paper provides a discussion that suggests that by adopting the spent fuel standard and stored weapon standard proposed by the National Academy of Sciences, the requirements for transportation become straightforward

  15. 78 FR 27857 - United States Standards for Wheat

    Science.gov (United States)

    2013-05-13

    ... RIN 0580-AB12 United States Standards for Wheat AGENCY: Grain Inspection, Packers and Stockyards... (GIPSA) is revising the United States Standards for Wheat under the United States Grain Standards Act (USGSA) to change the definition of Contrasting classes (CCL) in the class Hard White wheat. This change...

  16. Tuberculosis along the United States-Mexico border, 1993-2001.

    Science.gov (United States)

    Schneider, Eileen; Laserson, Kayla F; Wells, Charles D; Moore, Marisa

    2004-07-01

    Tuberculosis (TB) is a leading public health problem and a recognized priority for the federal Governments of both Mexico and the United States of America. The objectives of this research, primarily for the four states in the United States that are along the border with Mexico, were to: (1) describe the epidemiological situation of TB, (2) identify TB risk factors, and (3) discuss tuberculosis program strategies. We analyzed tuberculosis case reports collected from 1993 through 2001 by the tuberculosis surveillance system of the United States. We used those data to compare TB cases mainly among three groups: (1) Mexican-born persons in the four United States border states (Arizona, California, New Mexico, and Texas), (2) persons in those four border states who had been born in the United States, and (3) Mexican-born persons in the 46 other states of the United States, which do not border Mexico. For the period from 1993 through 2001, of the 16 223 TB cases reported for Mexican-born persons in the United States, 12 450 of them (76.7%) were reported by Arizona, California, New Mexico, and Texas. In those four border states overall in 2001, tuberculosis case rates for Mexican-born persons were 5.0 times as high as the rates for persons born in the United States; those four states have 23 counties that directly border on Mexico, and the ratio in those counties was 5.8. HIV seropositivity, drug and alcohol use, unemployment, and incarceration were significantly less likely to be reported in Mexican-born TB patients from the four border states and the nonborder states than in patients born in the United States from the four border states (P pulmonary tuberculosis patients who were 18-64 years of age and residing in the four border states, the Mexican-born patients were 3.6 times as likely as the United States-born patients were to have resistance to at least isoniazid and rifampin (i. e., to have multidrug-resistant TB) and twice as likely to have isoniazid resistance

  17. Principal Areas of Activity to Improve the Monitoring of Nuclear Material Security and Accounting in the Russian Federation Ministry of Atomic Energy, within the Framework of the Program of Cooperation with the United States of America

    International Nuclear Information System (INIS)

    Erastov, Victor V.; Cunningham, Mitchel E.

    2004-01-01

    scientific activities. Financial support has been provided by the United States to create a regulatory basis; to supply information; increase transportation security of nuclear material; create educational centers and improve the professional skill of experts and methodology and metrology of nuclear material measurements; and develop agency MPC and A inspections.

  18. 75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States

    Science.gov (United States)

    2010-07-08

    ... agents and toxins with the potential to pose a severe threat to public health and safety, animal and... mass casualties or devastating effects to the economy, critical infrastructure, or public confidence... establishment of appropriate practices for physical security and cyber security for facilities that possess Tier...

  19. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    Science.gov (United States)

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  20. Global Entrepreneurship and the United States

    Science.gov (United States)

    2010-09-01

    Global Entrepreneurship and the United States by Zoltan J. Acs Laszlo Szerb Ruxton, MD 21204 for under contract number SBAHQ-09...SUBTITLE Global Entrepreneurship and the United States 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...3 2.1. Assessing Entrepreneurship ..................................................................................4 2.2. Stages of Development

  1. 75 FR 25925 - United States Mint

    Science.gov (United States)

    2010-05-10

    ... Committee May 25, 2010 Public Meeting. SUMMARY: Pursuant to United States Code, Title 31, section 5135(b)(8... scheduled for May 25, 2010. Date: May 25, 2010. Time: 9 a.m. to 12 p.m. Location: 8th Floor Board Room, United States Mint, 801 9th Street, NW., Washington, DC 20220. Subject: Review and discuss obverse and...

  2. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  3. Cause for Concern: A Mixed-Methods Study of Campus Safety and Security Practices in United States-Mexico Border Institutions of Higher Education

    Science.gov (United States)

    Holmes, Ryan Clevis

    2014-01-01

    Campus safety has been a source of concern since the 1990s. However, in 2007, the tragedy at the Virginia Polytechnic and State University sent a sense of alarm through many institutions of higher education. Immediately following this tragedy, institutions across the country began to evaluate and question their safety and security practices. While…

  4. 31 CFR 515.330 - Person within the United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Person within the United States. 515... Definitions § 515.330 Person within the United States. (a) The term person within the United States, includes: (1) Any person, wheresoever located, who is a resident of the United States; (2) Any person actually...

  5. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  6. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  7. 45 CFR 212.7 - Repayment to the United States.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Repayment to the United States. 212.7 Section 212... UNITED STATES CITIZENS RETURNED FROM FOREIGN COUNTRIES § 212.7 Repayment to the United States. (a) An..., any or all of the cost of such assistance to the United States, except insofar as it is determined...

  8. 20 CFR 416.215 - You leave the United States.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false You leave the United States. 416.215 Section... Eligible § 416.215 You leave the United States. You lose your eligibility for SSI benefits for any month during all of which you are outside of the United States. If you are outside of the United States for 30...

  9. 37 CFR 1.412 - The United States Receiving Office.

    Science.gov (United States)

    2010-07-01

    ... Information § 1.412 The United States Receiving Office. (a) The United States Patent and Trademark Office is a Receiving Office only for applicants who are residents or nationals of the United States of America. (b) The... “United States Receiving Office” or by the abbreviation “RO/US.” (c) The major functions of the Receiving...

  10. Unauthorized Immigration to the United States: Annual Estimates and Components of Change, by State, 1990 to 2010

    Science.gov (United States)

    Warren, Robert; Warren, John Robert

    2013-01-01

    We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error. PMID:23956482

  11. Unauthorized Immigration to the United States: Annual Estimates and Components of Change, by State, 1990 to 2010.

    Science.gov (United States)

    Warren, Robert; Warren, John Robert

    2013-06-01

    We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error.

  12. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  13. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    International Nuclear Information System (INIS)

    Shen Yong; Yang Jian; Guo Hong

    2009-01-01

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analysed. Assuming that the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare-and-measurement scheme (P and M) and entanglement-based scheme (E-B) are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and, further, a lower bound to the secure key rate is derived.

  14. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    Energy Technology Data Exchange (ETDEWEB)

    Shen Yong; Yang Jian; Guo Hong, E-mail: hongguo@pku.edu.c [CREAM Group, State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum Electronics, School of Electronics Engineering and Computer Science, Peking University, Beijing 100871 (China)

    2009-12-14

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analysed. Assuming that the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare-and-measurement scheme (P and M) and entanglement-based scheme (E-B) are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and, further, a lower bound to the secure key rate is derived.

  15. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Science.gov (United States)

    2010-07-01

    ... requiring a security risk assessment. (a) Citizens and nationals of the United States. A citizen or national... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY...

  16. Track 7: policy and public interest U.S.-Russian nuclear security cooperation: navigating the present realities. Panel Discussion

    International Nuclear Information System (INIS)

    Hayden, N.K.; Hayden-Prindle, Nancy; McCarthy, Maureen; Rich, John; Graham, Thomas Jr.; Mizin, Victor; Cagan, Debra; Alessi, Vic

    2001-01-01

    Full text of publication follows: In the 10 yr since the beginning of cooperation between the United States and the Russian Federation on nuclear security and nonproliferation issues, the political, economic, and security environment governing the nuclear security cooperation has evolved and, in some cases, undergone dramatic changes. On one hand, the protection of nuclear weapons and materials continues as an urgent national security concern for both the United States and Russia. At the same time, defense infrastructures have been closed or converted to civilian purposes, and there has been increased activity in international cooperation for civilian nuclear technology. This special panel will explore the future of the U.S.-Russia nuclear cooperation with particular attention to the following three themes. Theme 1: Managing the Risks: U.S.-Russian Federation Cooperative Programs for Nuclear Weapons and Materials Security; Theme 2: Creating the Benefits: The Changing Nature of Russia's Domestic Nuclear Industry; Theme 3: Addressing the Impediments: United States and Russia as Nuclear Exporters: Reconciling Nonproliferation Goals, Technology Advancements, and Economic Incentives

  17. AY 2007-2008 Achieving U.S. Energy Security: Energy Industry Sector Report Seminar 8

    National Research Council Canada - National Science Library

    2008-01-01

    ...; the ability to generate and exploit inexpensive energy underpins that strength. Therefore, the United States has a vital interest in ensuring the viability and stability of the global energy system and securing its energy security...

  18. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  19. Food Insecurity and Its Association With Central Obesity and Other Markers of Metabolic Syndrome Among Persons Aged 12 to 18 Years in the United States.

    Science.gov (United States)

    Holben, David H; Taylor, Christopher A

    2015-09-01

    Food insecurity is a preventable health threat and may precipitate central obesity and metabolic syndrome in children and adolescents in the United States. To examine (1) health by household food security status; and (2) differences and prevalence of central obesity among persons aged 12 to 18 years in the United States. The National Health and Nutrition Examination Survey was administered to a cross-sectional sample of persons aged 12 to 18 years in 1999 to 2006. Controlling for age, race/ethnicity, and sex differences in mean obesity and chronic disease factors across levels of food insecurity (analysis of covariance [Bonferroni post hoc] and ORs [logistic regression analyses]) were examined, as were differences in the rates of risk factors (χ(2) statistics). A total of 7435 participants were analyzed. Those from marginally food secure (n=751) and low-food secure (n=1206) (population size estimate, 26,714,182) households were significantly more likely than their high-food secure counterparts (n=4831) to be overweight (P=.036) (OR, 1.44), and those from marginally food secure households were 1.3-times more likely to be obese (P=.036). Nearly 25% of respondents from marginally food secure, low-food secure, and very low-food secure (n=647) households reported central obesity (P=.002), which was 1.4 to 1.5 times more likely than those from high-food secure households. Participants from high-food secure households had significantly higher mean high-density lipoprotein values (P=.019). Risk factors indicative of metabolic syndrome were present in 3.1%. Household food insecurity was associated with an increased likelihood of being overweight and having central obesity. Limitations included the use of cross-sectional data and some self-reported data and the inability to control for all moderating variables in obesity and overall health status.

  20. National Security Imperatives and the Neorealist State: Iran and Realpolitik

    National Research Council Canada - National Science Library

    Grogan, Michael

    2000-01-01

    .... Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for spreading its brand of Islamic revolution abroad...

  1. Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongjun [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Weifang Vocational College, Weifang 261041 (China); Wang, Xingyuan, E-mail: wangxy@dlut.edu.cn [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Zhu, Quanlong [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China)

    2011-07-18

    This Letter designs an asynchronous hyper chaotic secure communication system, which possesses high stability against noise, using dynamic delay and state variables switching to ensure the high security. The relationship between the bit error ratio (BER) and the signal-to-noise ratio (SNR) is analyzed by simulation tests, the results show that the BER can be ensured to reach zero by proportionally adjusting the amplitudes of the state variables and the noise figure. The modules of the transmitter and receiver are implemented, and numerical simulations demonstrate the effectiveness of the system. -- Highlights: → Asynchronous anti-noise hyper chaotic secure communication system. → Dynamic delay and state switching to ensure the high security. → BER can reach zero by adjusting the amplitudes of state variables and noise figure.

  2. The United States and the Kurds: Case Studies in United States Engagement

    National Research Council Canada - National Science Library

    Lambert, Peter

    1997-01-01

    ..., between 1969- 1975, and 1990-1996. Both eras saw the United States able to influence events relating to the Kurds in support of a larger regional policy, only to find no easy solution to the Kurdish quest for autonomy...

  3. United States rejoin ITER

    International Nuclear Information System (INIS)

    Roberts, M.

    2003-01-01

    Upon pressure from the United States Congress, the US Department of Energy had to withdraw from further American participation in the ITER Engineering Design Activities after the end of its commitment to the EDA in July 1998. In the years since that time, changes have taken place in both the ITER activity and the US fusion community's position on burning plasma physics. Reflecting the interest in the United States in pursuing burning plasma physics, the DOE's Office of Science commissioned three studies as part of its examination of the option of entering the Negotiations on the Agreement on the Establishment of the International Fusion Energy Organization for the Joint Implementation of the ITER Project. These were a National Academy Review Panel Report supporting the burning plasma mission; a Fusion Energy Sciences Advisory Committee (FESAC) report confirming the role of ITER in achieving fusion power production, and The Lehman Review of the ITER project costing and project management processes (for the latter one, see ITER CTA Newsletter, no. 15, December 2002). All three studies have endorsed the US return to the ITER activities. This historical decision was announced by DOE Secretary Abraham during his remarks to employees of the Department's Princeton Plasma Physics Laboratory. The United States will be working with the other Participants in the ITER Negotiations on the Agreement and is preparing to participate in the ITA

  4. Progress of the United States foreign research reactor spent nuclear fuel acceptance program

    International Nuclear Information System (INIS)

    Huizenga, D.G.; Clapper, M.; Thrower, A.W.

    2002-01-01

    The United States Department of Energy (DOE), in consultation with the Department of State (DOS), adopted the Nuclear Weapons Nonproliferation Policy Concerning Foreign Research Reactor Spent Nuclear Fuel in May 1996. To date, the Foreign Research Reactor (FRR) Spent Nuclear Fuel (SNF) Acceptance Program has completed 23 shipments. Almost 5000 spent fuel assemblies from eligible research reactors throughout the world have been accepted into the United States under this program. Over the past year, another cross-country shipment of fuel was accomplished, as well as two additional shipments in the fourth quarter of calendar year 2001. These shipments attracted considerable safeguards oversight since they occurred post September 11. Recent guidance from the Nuclear Regulatory Commission (NRC) pertaining to security and safeguards issues deals directly with the transport of nuclear material. Since the Acceptance Program has consistently applied above regulatory safety enhancements in transport of spent nuclear fuel, this guidance did not adversely effect the Program. As the Program draws closer to its termination date, an increased number of requests for program extension are received. Currently, there are no plans to extend the policy beyond its current expiration date; therefore, eligible reactor operators interested in participating in this program are strongly encouraged to evaluate their inventory and plan for future shipments as soon as possible. (author)

  5. United States Stateplane Zones - NAD83

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — U.S. State Plane Zones (NAD 1983) represents the State Plane Coordinate System (SPCS) Zones for the 1983 North American Datum within United States.

  6. United States Stateplane Zones - NAD27

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — U.S. State Plane Zones (NAD 1927) represents the State Plane Coordinate System (SPCS) Zones for the 1927 North American Datum within United States.

  7. Present state of electric power business in United States and Europe

    International Nuclear Information System (INIS)

    Onishi, Kenichi

    2011-01-01

    This article reported present state of nuclear power and electric power business in United States and Europe after Fukushima Daiichi Accident. As for the trend of demand and supply of electric power and policy, the accident forced Germany possibly to proceed with phase-out of nuclear power, but France and United States to sustain nuclear power with no great change of energy policy at this moment. As for the trend of electric power market, there was not state in United States with liberalized retail market of electric power after rolling blackouts occurred in California State in the early 2000s. In Germany proceeding with renewable energy introduction, renewable electricity fed into the grid was paid for by the network operators at fixed tariffs and the costs passed on to electricity consumers were increasing. Renewable Portfolio Standards (RPS) in United States forced the state to introduction of renewable energy to some ratio, and Feed-in Tariff (FIT) introduced in EU in 1990s lead to introduction of a large amount of renewable electricity targeted in 2020. Huge amount of wind power introduction brought about several problems to solve such that excess electric power above domestic demand had bad effects on grids in neighboring region. Enforcement of power transmission lines was also needed with increase of maximum electric power as well as introduction of a large amount of renewable electricity. (T. Tanaka)

  8. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  9. Death in the United States, 2011

    Science.gov (United States)

    ... Order from the National Technical Information Service NCHS Death in the United States, 2011 Recommend on Facebook ... 2011 SOURCE: National Vital Statistics System, Mortality. Do death rates vary by state? States experience different mortality ...

  10. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  11. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  12. 31 CFR 103.39 - Person outside the United States.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Person outside the United States. 103... Person outside the United States. For the purposes of this subpart, a remittance or transfer of funds, or... the United States, shall be deemed to be a remittance or transfer to a person outside the United...

  13. Day-Ahead Coordination of Vehicle-to-Grid Operation and Wind Power in Security Constraints Unit Commitment (SCUC

    Directory of Open Access Journals (Sweden)

    Mohammad Javad Abdollahi

    2015-08-01

    Full Text Available In this paper security constraints unit commitment (SCUC in the presence of wind power resources and electrical vehicles to grid is presented. SCUC operation prepare an optimal time table for generation unit commitment in order to maximize security, minimize operation cost and satisfy the constraints of networks and units in a period of time, as one of the most important research interest in power systems. Today, the relationship between power network and energy storage systems is interested for many researchers and network operators. Using Electrical Vehicles (PEVs and wind power for energy production is one of the newest proposed methods for replacing fossil fuels.One of the effective strategies for analyzing of the effects of Vehicle 2 Grid (V2G and wind power in optimal operation of generation is running of SCUC for power systems that are equipped with V2G and wind power resources. In this paper, game theory method is employed for deterministic solution of day-ahead unit commitment with considering security constraints in the simultaneous presence of V2G and wind power units. This problem for two scenarios of grid-controlled mode and consumer-controlled mode in three different days with light, medium and heavy load profiles is analyzed. Simulation results show the effectiveness of the presence of V2G and wind power for decreasing of generation cost and improving operation indices of power systems.

  14. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  15. Household pesticide usage in the United States.

    Science.gov (United States)

    Savage, E P; Keefe, T J; Wheeler, H W; Mounce, L; Helwic, L; Applehans, F; Goes, E; Goes, T; Mihlan, G; Rench, J; Taylor, D K

    1981-01-01

    A total of 10,000 U.S. households in 25 standard metropolitan statistical areas and 25 counties were included in the United States. More than 8,200 households granted an interview. Nine of every ten households in the United States used some types of pesticide in their house, garden, or yard. Households in the southeastern United States used the most pesticides. Although more than 500 different pesticide formulations were used by the sampled households, 15 pesticides accounted for 65.5% of all pesticides reported in this study. Thirteen of these 15 pesticides were insecticides, one was a herbicide, and one was a rodenticide.

  16. 12 CFR 404.21 - Submission of social security and passport numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Submission of social security and passport numbers. 404.21 Section 404.21 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.21 Submission of social security and...

  17. Managing crime through migration law in Australia and the United States: a comparative analysis.

    Science.gov (United States)

    Hoang, Khanh; Reich, Sudrishti

    2017-01-01

    This article examines the intertwining of migration law and criminal law - termed 'crimmigration' by scholars - in Australia and the United States of America, and its implications for non-citizens who engage in criminal conduct. Our comparison of the two systems demonstrates that the laws and policies in both jurisdictions are similar to a significant degree. Both have strong exclusionary policies characterised by sweeping visa cancellation/removal powers, a heavy focus on enforcement, and limited review rights. In Australia, legislative amendments in 2014 have given the executive greater powers to cancel visas and remove non-citizens on character grounds as a means of ensuring national security and public safety. This has coincided with a new law enforcement body created within the Australian Department of Immigration. These changes reflect a repurposing of migration law as a tool for managing criminal threats based on the concept of 'risk management'. Drawing on the experience of the United States - where such a 'risk management' approach is entrenched - we query the utility of this shift and highlight the potential pitfalls of pursuing such a policy for Australia.

  18. Campus Security Authorities, a New Look

    Science.gov (United States)

    McCauley, Terry

    2012-01-01

    Recent high-profile events created the need for institutions in the United States to heighten concerns about how those responsible for compliance with the Clery Act handle Campus Security Authority (CSA) issues. Not expressly but realistically those responsible for integrating this complicated set of laws within institutions have likely just been…

  19. Evaluation of the operational efficiency of pacifying police units in the state of Rio de Janeiro

    Directory of Open Access Journals (Sweden)

    Igor Rosa Dias de Jesus

    2014-05-01

    Full Text Available The Pacification Police Unit (UPP is a new model for public security and policing, aimed at ensuring local security and, above all, reduce, or even, extinguish violent crime linked to drug trafficking, and approach people and police. The purpose of this article is measuring the operational efficiency of all UPPs installed in the state of Rio de Janeiro by the beginning of 2011 by Data Envelopment Analysis (DEA. For this, it was used the CCR model – input-oriented – developed by Charnes, Cooper and Rhodes, which allows an objective assessment of the overall efficiency, identifying the sources of inefficiencies and the needed targets to achieve the efficiency in each UPP. The results converge to a reduction of the amount of policemen in all communities out of the efficiency frontier.

  20. Emerging Trends in Development of International Information Security Regime

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2016-01-01

    Full Text Available The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany. The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

  1. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E.

    2014-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  2. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    International Nuclear Information System (INIS)

    Dorman, E.

    2014-01-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  3. 75 FR 13345 - Pricing for Certain United States Mint Products

    Science.gov (United States)

    2010-03-19

    ... DEPARTMENT OF THE TREASURY United States Mint Pricing for Certain United States Mint Products AGENCY: United States Mint, Department of the Treasury. ACTION: Notice. SUMMARY: The United States Mint is announcing the price of First Spouse Bronze Medals and 2010 First Spouse Bronze Medal Series: Four...

  4. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  5. 22 CFR 22.3 - Remittances in the United States.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Remittances in the United States. 22.3 Section...-DEPARTMENT OF STATE AND FOREIGN SERVICE § 22.3 Remittances in the United States. (a) Type of remittance. Remittances shall be in the form of: (1) Check or bank draft drawn on a bank in the United States; (2) money...

  6. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  7. Supplemental Security Income (SSI) Recipients in each State by Sex and Age, December 2010

    Data.gov (United States)

    Social Security Administration — The Supplemental Security Income (SSI) Recipients in each State by Sex and Age (December 2010) is produced using the data found in Table 10 from the SSI Report of...

  8. A demonstration of a low cost approach to security at shipping facilities and ports

    Science.gov (United States)

    Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.

    2010-04-01

    Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."

  9. Communication of 10 June 2009 received from the Permanent Mission of the United Kingdom with regard to the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power

    International Nuclear Information System (INIS)

    2009-01-01

    The Secretariat has received a communication dated 10 June 2009 from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland, attaching a note from the United Kingdom and the final remarks of the Chairman of the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power, held in London on 17 and 18 March 2009. As requested in that communication, the note and final remarks are herewith circulated for the information of Member States

  10. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Ying; Shi, Ronghua [School of Information Science and Engineering, Central South University, Changsha 410083 (China); Zeng, Guihua [Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030 (China)], E-mail: sdguoying@gmail.com, E-mail: rhshi@mail.edu.com, E-mail: ghzeng@sjtu.edu.cn

    2010-04-15

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  11. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    International Nuclear Information System (INIS)

    Guo, Ying; Shi, Ronghua; Zeng, Guihua

    2010-01-01

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  12. 76 FR 41829 - J.P. Morgan Securities LLC, et al.; Notice of Application and Temporary Order

    Science.gov (United States)

    2011-07-15

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29719; 812-13919] J.P. Morgan Securities LLC... entered against J.P. Morgan Securities LLC (``JPMS'') on July 8, 2011 by the United States District Court... Distribution Services, Inc. (``JPMDS''), J.P. Morgan Institutional Investments, Inc. (``JPMII''), J.P. Morgan...

  13. A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States

    International Nuclear Information System (INIS)

    Gao Gan; Wang Liping

    2010-01-01

    By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the 'two-step' transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. (general)

  14. Human trafficking in Southeast Asia and U.S. national security

    OpenAIRE

    Snoke, Joshua H.

    2015-01-01

    Approved for public release; distribution is unlimited The United States government finds human trafficking to be an important subject and is placing increasing focus on the issue. The Southeast Asian portion of the Western Pacific encompasses a substantial portion of global trafficking, much of which has a final destination in the United States. This thesis asks the following question: How does trafficking in persons (TIP) affect U.S. national security interests and regional stability in ...

  15. U.S. statutes of general interest to safeguards and security officers

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1988-01-01

    A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section deals with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words

  16. The United Kingdom: Issues for the United States

    National Research Council Canada - National Science Library

    Archick, Kristin

    2007-01-01

    ...; and more recently, from the UK's strong support in countering terrorism and confronting Iraq. The United States and Britain also share a mutually beneficial trade and economic relationship, and are each other's biggest foreign direct investors...

  17. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  18. Security proof of continuous-variable quantum key distribution using three coherent states

    Science.gov (United States)

    Brádler, Kamil; Weedbrook, Christian

    2018-02-01

    We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

  19. Radiation therapy facilities in the United States

    International Nuclear Information System (INIS)

    Ballas, Leslie K.; Elkin, Elena B.; Schrag, Deborah; Minsky, Bruce D.; Bach, Peter B.

    2006-01-01

    Purpose: About half of all cancer patients in the United States receive radiation therapy as a part of their cancer treatment. Little is known, however, about the facilities that currently deliver external beam radiation. Our goal was to construct a comprehensive database of all radiation therapy facilities in the United States that can be used for future health services research in radiation oncology. Methods and Materials: From each state's health department we obtained a list of all facilities that have a linear accelerator or provide radiation therapy. We merged these state lists with information from the American Hospital Association (AHA), as well as 2 organizations that audit the accuracy of radiation machines: the Radiologic Physics Center (RPC) and Radiation Dosimetry Services (RDS). The comprehensive database included all unique facilities listed in 1 or more of the 4 sources. Results: We identified 2,246 radiation therapy facilities operating in the United States as of 2004-2005. Of these, 448 (20%) facilities were identified through state health department records alone and were not listed in any other data source. Conclusions: Determining the location of the 2,246 radiation facilities in the United States is a first step in providing important information to radiation oncologists and policymakers concerned with access to radiation therapy services, the distribution of health care resources, and the quality of cancer care

  20. Ethics and European security

    Energy Technology Data Exchange (ETDEWEB)

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Instead the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.

  1. 75 FR 13345 - Pricing for Certain 2010 United States Mint Products

    Science.gov (United States)

    2010-03-19

    ... DEPARTMENT OF THE TREASURY United States Mint Pricing for Certain 2010 United States Mint Products AGENCY: United States Mint, Department of the Treasury. ACTION: Notice. SUMMARY: The United States Mint is announcing the price of the 2010 United States Mint Presidential $1 Coin and First Spouse Medal...

  2. Arthropod genomics research in the United States Department of Agriculture-Agricultural Research Service: Applications of RNA interference and CRISPR gene editing technologies in pest control

    Science.gov (United States)

    The Agricultural Research Service (ARS) is the intramural research agency of the United States Department of Agriculture (USDA) which addresses basic scientific questions and develops applied solutions to a range of agricultural problems, and in doing so protects national food security and supports ...

  3. Intergenerational educational mobility in Denmark and the United States

    DEFF Research Database (Denmark)

    Andrade, Stefan Bastholm; Thomsen, Jens-Peter

    2018-01-01

    An overall finding in comparative mobility studies is that intergenerational mobility is greater in Scandinavia than in liberal welfare-state countries like the United States and United Kingdom. However, in a recent study, Landersø and Heckman (L & H) (2017) argue that intergenerational educational...... mobility in Denmark and the United States is remarkably similar. L & H’s findings run contrary to widespread beliefs and have been echoed in academia and mass media on both sides of the Atlantic Ocean. In this article, we reanalyze educational mobility in Denmark and the United States using the same data...... sources as L & H. We apply several different methodological approaches from economics and sociology, and we consistently find that educational mobility is higher in Denmark than in the United States....

  4. Evaluating the completeness of the national ALS registry, United States.

    Science.gov (United States)

    Kaye, Wendy E; Wagner, Laurie; Wu, Ruoming; Mehta, Paul

    2018-02-01

    Our objective was to evaluate the completeness of the United States National ALS Registry (Registry). We compared persons with ALS who were passively identified by the Registry with those actively identified in the State and Metropolitan Area ALS Surveillance project. Cases in the two projects were matched using a combination of identifiers, including, partial social security number, name, date of birth, and sex. The distributions of cases from the two projects that matched/did not match were compared and Chi-square tests conducted to determine statistical significance. There were 5883 ALS cases identified by the surveillance project. Of these, 1116 died before the Registry started, leaving 4767 cases. We matched 2720 cases from the surveillance project to those in the Registry. The cases identified by the surveillance project that did not match cases in the Registry were more likely to be non-white, Hispanic, less than 65 years of age, and from western states. The methods used by the Registry to identify ALS cases, i.e. national administrative data and self-registration, worked well but missed cases. These findings suggest that developing strategies to identify and promote the Registry to those who were more likely to be missing, e.g. non-white and Hispanic, could be beneficial to improving the completeness of the Registry.

  5. Toll Facilities in the United States

    Data.gov (United States)

    Department of Transportation — Biennial report containing selected information on toll facilities in the United States that has been provided to FHWA by the States and/or various toll authorities...

  6. State nuclear initiatives in the United States

    International Nuclear Information System (INIS)

    Strauss, P.L.; Stoiber, C.R.

    1977-01-01

    The paper deals with State nuclear initiatives regarding the role of nuclear power in the energy future of the United States. The question of whether and under what circumstances nuclear facilities should be used to generate electricity was put to the popular vote in several States in 1976. Some general principles of Federal-State relations are discussed with specific reference to nuclear regulations. The initiative mechanism itself is described as well as its legal form and background. The parallel developments in the State and Federal legislative consideration of nuclear issues is reviewed and the suggested reasons for the defeat of the proposals in the seven States concerned are discussed. Finally, the author draws some conclusions on the effects of the 1976 initiatives on future decision-making in the US on energy policy in general and nuclear power in particular. (NEA) [fr

  7. Incentivizing professionals and patients: a consideration in the context of the United Kingdom and the United States.

    Science.gov (United States)

    Oliver, Adam; Brown, Lawrence D

    2011-02-01

    We are at the beginning of an era in which the pressure to secure the biggest possible "bang" for the health care "buck" is perhaps higher than it ever has been, on both sides of the Atlantic, and within the health policy discourse, incentives, for both professionals and patients, are occupying an increasingly prominent position. In this article, we consider issues related to motivating the professional and the patient to perform targeted actions, drawing on some of the evidence that has thus far been reported on experiences in the United Kingdom and the United States, and we present an admittedly somewhat speculative taxonomy of hypothesized effectiveness for some of the different methods by which each of these two broad types of incentives can be offered. We go on to summarize some of the problems of, and objections to, the use of incentives in health and health care, such as those relating to motivational crowding and gaming, but we conclude by positing that, following appropriate consideration, caution, and methodological and empirical investigation, health-related incentives, at least in some contexts, may contribute positively to the social good.

  8. The effect of secure attachment state and infant facial expressions on childless adults’ parental motivation

    Directory of Open Access Journals (Sweden)

    Fangyuan Ding

    2016-08-01

    Full Text Available This study examined the association between infant facial expressions and parental motivation as well as the interaction between attachment state and expressions. Two-hundred eighteen childless adults (Mage=19.22, 118 males, 100 females were recruited. Participants completed the Chinese version of the State Adult Attachment Measure and the E-prime test, which comprised three components a liking, the specific hedonic experience in reaction to laughing, neutral, and crying infant faces; b representational responding, actively seeking infant faces with specific expressions; and c evoked responding, actively retaining images of three different infant facial expressions. While the first component refers to the liking of infants, the second and third components entail the wanting of an infant. Random intercepts multilevel models with emotion nested within participants revealed a significant interaction between secure attachment state and emotion on both liking and representational response. A hierarchical regression analysis was conducted to examine the unique contributions of secure attachment state. Findings demonstrated that, after controlling for sex, anxious, and avoidant, secure attachment state positively predicted parental motivations (liking and wanting in the neutral and crying conditions, but not the laughing condition. These findings demonstrate the significant role of secure attachment state in parental motivation, specifically when infants display uncertain and negative emotions.

  9. The Effect of Secure Attachment State and Infant Facial Expressions on Childless Adults' Parental Motivation.

    Science.gov (United States)

    Ding, Fangyuan; Zhang, Dajun; Cheng, Gang

    2016-01-01

    This study examined the association between infant facial expressions and parental motivation as well as the interaction between attachment state and expressions. Two-hundred eighteen childless adults (M age = 19.22, 118 males, 100 females) were recruited. Participants completed the Chinese version of the State Adult Attachment Measure and the E-prime test, which comprised three components (a) liking, the specific hedonic experience in reaction to laughing, neutral, and crying infant faces; (b) representational responding, actively seeking infant faces with specific expressions; and (c) evoked responding, actively retaining images of three different infant facial expressions. While the first component refers to the "liking" of infants, the second and third components entail the "wanting" of an infant. Random intercepts multilevel models with emotion nested within participants revealed a significant interaction between secure attachment state and emotion on both liking and representational response. A hierarchical regression analysis was conducted to examine the unique contributions of secure attachment state. Findings demonstrated that, after controlling for sex, anxious, and avoidant, secure attachment state positively predicted parental motivations (liking and wanting) in the neutral and crying conditions, but not the laughing condition. These findings demonstrate the significant role of secure attachment state in parental motivation, specifically when infants display uncertain and negative emotions.

  10. The Security Aspect of Turkey-United States Relations: In Search For a New Model

    Directory of Open Access Journals (Sweden)

    Irina A. Svistunova

    2016-01-01

    Full Text Available Security cooperation has always been an important aspect of the relations between Turkey and the USA. In Cold War era Turkish-American interaction within NATO played a crucial role in this cooperation. After that period the two countries began to search for a new model of their relations. Both Turkey and the USA started to use cooperation within NATO for the purpose of strengthening their global positions. At the same time the USA aspiration to use military bases in Turkey beyond NATO obligations frequently becomes a source of disagreement and crises in the relations of the two countries as it happened during the American intervention to Iraq in 2003. At present new challenges for regional security, especially in the Middle East, demands new forms of interaction between Turkey and the USA. The beginning of "the Arab spring" was met in Ankara and Washington with overlapping interest in changing conservative regimes and promoting "Turkish model". At the same time such questions as participation of Turkey in the fight against ISIL and the USA military cooperation with the Syrian Kurds, whom Ankara considers to be connected with the PKK terrorist organization, has brought serious contradictions between the two countries. The cause of these contradiction is the difference in the perception of threats in Turkey and in the Western countries. While the search for new forms of security cooperation meets with difficulties, NATO remains important for the relations between Turkey and the USA, despite traditionally high level of anti-NATO moods in the Turkish society.

  11. Desovereignization of national state, economy and security in terms of globalization

    Directory of Open Access Journals (Sweden)

    Rakić Mile M.

    2014-01-01

    Full Text Available In current modern age of worldwide processes of globalization and globalism a process of desovereigntization of national state and economy has become a general process. Therefore national state has been faced with numerous challenges and it has been in a permanent state of crisis. Within the process of globalization most often rich enclaves of national states make attempts to integrate themselves into neoliberal capitalist system, while poor and backward enclaves become abandoned and so national states become disintegrated. First of all it is necessary to search for causes of ethno-religious conflicts and a national separatism in the field of economy. Within the globalization environment it happened that old entities, national state, national economy and national security gained totally new meanings. By using a method of comparative analysis of document contents and consitutional and political practice alike it is possible to reach conclusion that a great number of modern national states, including the Republic of Serbia among them, have found themselves in the state of permanent crisis, and the state crisis implies, before anything else, the crisis of state sovereignty. The state gets destroyed both from inside and outside in different ways. By using a quality method it is confirmed that within a state there comes an overstepping of constitutional regulations which encompass, before else, the issues of national economy and national security, and it is achieved in particular by seizure of economic sovereignty.

  12. 27 CFR 479.89 - Transfers to the United States.

    Science.gov (United States)

    2010-04-01

    ... Transfers to the United States. A firearm may be transferred to the United States or any department... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Transfers to the United States. 479.89 Section 479.89 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO...

  13. Multinational corporations and health care in the United States and Latin America: strategies, actions, and effects.

    Science.gov (United States)

    Jasso-Aguilar, Rebeca; Waitzkin, Howard; Landwehr, Angela

    2004-01-01

    In this article we analyze the corporate dominance of health care in the United States and the dynamics that have motivated the international expansion of multinational health care corporations, especially to Latin America. We identify the strategies, actions, and effects of multinational corporations in health care delivery and public health policies. Our methods have included systematic bibliographical research and in-depth interviews in the United States, Mexico, and Brazil. Influenced by public policy makers in the United States, such organizations as the World Bank, International Monetary Fund, and World Trade Organization have advocated policies that encourage reduction and privatization of health care and public health services previously provided in the public sector. Multinational managed care organizations have entered managed care markets in several Latin American countries at the same time as they were withdrawing from managed care activities in Medicaid and Medicare within the United States. Corporate strategies have culminated in a marked expansion of corporations' access to social security and related public sector funds for the support of privatized health services. International financial institutions and multinational corporations have influenced reforms that, while favorable to corporate interests, have worsened access to needed services and have strained the remaining public sector institutions. A theoretical approach to these problems emphasizes the falling rate of profit as an economic motivation of corporate actions, silent reform, and the subordination of polity to economy. Praxis to address these problems involves opposition to policies that enhance corporate interests while reducing public sector services, as well as alternative models that emphasize a strengthened public sector

  14. Estimating the impact of newly arrived foreign-born persons on tuberculosis in the United States.

    Directory of Open Access Journals (Sweden)

    Yecai Liu

    Full Text Available Among approximately 163.5 million foreign-born persons admitted to the United States annually, only 500,000 immigrants and refugees are required to undergo overseas tuberculosis (TB screening. It is unclear what extent of the unscreened nonimmigrant visitors contributes to the burden of foreign-born TB in the United States.We defined foreign-born persons within 1 year after arrival in the United States as "newly arrived", and utilized data from U.S. Department of Homeland Security, U.S. Centers for Disease Control and Prevention, and World Health Organization to estimate the incidence of TB among newly arrived foreign-born persons in the United States. During 2001 through 2008, 11,500 TB incident cases, including 291 multidrug-resistant TB incident cases, were estimated to occur among 20,989,738 person-years for the 1,479,542,654 newly arrived foreign-born persons in the United States. Of the 11,500 estimated TB incident cases, 41.6% (4,783 occurred among immigrants and refugees, 36.6% (4,211 among students/exchange visitors and temporary workers, 13.8% (1,589 among tourists and business travelers, and 7.3% (834 among Canadian and Mexican nonimmigrant visitors without an I-94 form (e.g., arrival-departure record. The top 3 newly arrived foreign-born populations with the largest estimated TB incident cases per 100,000 admissions were immigrants and refugees from high-incidence countries (e.g., 2008 WHO-estimated TB incidence rate of ≥100 cases/100,000 population/year; 235.8 cases/100,000 admissions, 95% confidence interval [CI], 228.3 to 243.3, students/exchange visitors and temporary workers from high-incidence countries (60.9 cases/100,000 admissions, 95% CI, 58.5 to 63.3, and immigrants and refugees from medium-incidence countries (e.g., 2008 WHO-estimated TB incidence rate of 15-99 cases/100,000 population/year; 55.2 cases/100,000 admissions, 95% CI, 51.6 to 58.8.Newly arrived nonimmigrant visitors contribute substantially to the burden of

  15. Estimating the impact of newly arrived foreign-born persons on tuberculosis in the United States.

    Science.gov (United States)

    Liu, Yecai; Painter, John A; Posey, Drew L; Cain, Kevin P; Weinberg, Michelle S; Maloney, Susan A; Ortega, Luis S; Cetron, Martin S

    2012-01-01

    Among approximately 163.5 million foreign-born persons admitted to the United States annually, only 500,000 immigrants and refugees are required to undergo overseas tuberculosis (TB) screening. It is unclear what extent of the unscreened nonimmigrant visitors contributes to the burden of foreign-born TB in the United States. We defined foreign-born persons within 1 year after arrival in the United States as "newly arrived", and utilized data from U.S. Department of Homeland Security, U.S. Centers for Disease Control and Prevention, and World Health Organization to estimate the incidence of TB among newly arrived foreign-born persons in the United States. During 2001 through 2008, 11,500 TB incident cases, including 291 multidrug-resistant TB incident cases, were estimated to occur among 20,989,738 person-years for the 1,479,542,654 newly arrived foreign-born persons in the United States. Of the 11,500 estimated TB incident cases, 41.6% (4,783) occurred among immigrants and refugees, 36.6% (4,211) among students/exchange visitors and temporary workers, 13.8% (1,589) among tourists and business travelers, and 7.3% (834) among Canadian and Mexican nonimmigrant visitors without an I-94 form (e.g., arrival-departure record). The top 3 newly arrived foreign-born populations with the largest estimated TB incident cases per 100,000 admissions were immigrants and refugees from high-incidence countries (e.g., 2008 WHO-estimated TB incidence rate of ≥100 cases/100,000 population/year; 235.8 cases/100,000 admissions, 95% confidence interval [CI], 228.3 to 243.3), students/exchange visitors and temporary workers from high-incidence countries (60.9 cases/100,000 admissions, 95% CI, 58.5 to 63.3), and immigrants and refugees from medium-incidence countries (e.g., 2008 WHO-estimated TB incidence rate of 15-99 cases/100,000 population/year; 55.2 cases/100,000 admissions, 95% CI, 51.6 to 58.8). Newly arrived nonimmigrant visitors contribute substantially to the burden of foreign

  16. Photovoltaic power stations in Germany and the United States: A comparative study by data envelopment analysis

    International Nuclear Information System (INIS)

    Sueyoshi, Toshiyuki; Goto, Mika

    2014-01-01

    This study compares Photovoltaic (PV) power stations between Germany and the United States to examine which country more efficiently provides renewable energy in their usages. For the comparative analysis, this study utilizes Data Envelopment Analysis (DEA) as a methodology to evaluate the performance of PV power stations from the perspective of both solar and land usages. A total of one hundred sixty PV power stations (eighty in Germany and eighty in the United States) are used for this comparison. The demand for sustainable energy and energy security has been rapidly increasing over the past decade because of concerns about environment and limited resources. PV solutions are one of many renewable technologies that are being developed to satisfy a recent demand of electricity. Germany is the world's top installer and consumer of PV power and the United States is one of the top five nations. Germany leads the way in installed PV capacity even though the nation has less solar resources and land area. Due to limited solar resources, low insolation and sunshine, and land area, the United States should have a clear advantage over Germany. However, the empirical result of this study exhibits that PV power stations in Germany operate more efficiently than those of the United States even if the latter has many solar and land advantages. The surprising result indicates that the United States has room for improvement when it comes to utilizing solar and land resources and needs to reform the solar policy. For such a purpose, Feed-In Tariff (FIT) may be an effective energy policy at the state level in the United States because the FIT provides investors such as utility companies and other types of energy firms with financial incentives to develop large PV power stations and generation facilities for other renewable energy. It may be true that the FIT is a powerful policy tool to promote PV and other renewable installation and support a reduction of an amount of greenhouse

  17. Climate: an issue of security or of strategic control?

    International Nuclear Information System (INIS)

    Mascre, D.

    2010-01-01

    For the United States, climate has become a national security issue. In September 2009 the CIA created a Centre for Climate Change to monitor space and the biosphere, and to verify the levels of pollution of every country worldwide. This initiative is more than just a new mission; it marks a change of policy which acknowledges the new security-related troika of climate, economy and strategic control. (author)

  18. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  19. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication

    International Nuclear Information System (INIS)

    Wen-Jie, Liu; Han-Wu, Chen; Zhi-Qiang, Li; Zhi-Hao, Liu; Wen-Bo, Hu; Ting-Huai, Ma

    2009-01-01

    A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. (general)

  20. 32 CFR 516.54 - Witnesses for the United States.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Witnesses for the United States. 516.54 Section..., Travel, and Expenses of Witnesses § 516.54 Witnesses for the United States. (a) Status of witness. A military member authorized to appear as a witness for the United States, including those authorized to...

  1. 32 CFR 150.21 - Appeals by the United States.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Appeals by the United States. 150.21 Section 150... the United States. (a) Restricted filing. Only a representative of the government designated by the Judge Advocate General of the respective service may file an appeal by the United States under Article...

  2. United States housing, first quarter 2013

    Science.gov (United States)

    Delton Alderman

    2014-01-01

    Provides current and historical information on housing market in the United States. Information includes trends for housing permits and starts, housing under construction, and housing completions for single and multifamily units, and sales and construction. This report will be updated regularly.

  3. National Security Strategy: A Flawed Guide to the Future, Political Science

    National Research Council Canada - National Science Library

    Leahy, Michael

    2003-01-01

    The Goldwater-Nichols Defense Department Reorganization Act of 1986 requires the executive branch to periodically provide written documentation of the United States National Security Strategy (NSS). The George W...

  4. Assessment of Political Vulnerabilities on Security of Energy Supply in the Baltic States

    Directory of Open Access Journals (Sweden)

    Česnakas Giedrius

    2016-06-01

    Full Text Available The article argues that despite the evident link between political environment and security of energy supply, political elements are not sufficiently represented in contemporary scientific literature, namely in indexes that are designed for the assessment of security of energy supply. In an attempt to fill this gap, the article presents an innovative methodology for quantitative assessment of the political vulnerabilities on security of energy supply and applies it to the analysis of the Baltic States.

  5. Corrective Action Decision Document/Closure Report for Corrective Action Unit 567: Miscellaneous Soil Sites - Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-12-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada. The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 567 based on the implementation of the corrective actions. The corrective actions implemented at CAU 567 were developed based on an evaluation of analytical data from the CAI, the assumed presence of COCs at specific locations, and the detailed and comparative analysis of the CAAs. The CAAs were selected on technical merit focusing on performance, reliability, feasibility, safety, and cost. The implemented corrective actions meet all requirements for the technical components evaluated. The CAAs meet all applicable federal and state regulations for closure of the site. Based on the implementation of these corrective actions, the DOE, National Nuclear Security Administration Nevada Field Office provides the following recommendations: • No further corrective actions are necessary for CAU 567. • The Nevada Division of Environmental Protection issue a Notice of Completion to the DOE, National Nuclear Security Administration Nevada Field Office for closure of CAU 567. • CAU 567 be moved from Appendix III to Appendix IV of the FFACO.

  6. Legitimizing Vetoes : A Discourse Analysis of How Vetoes are Motivated in the United Nations Security Council

    OpenAIRE

    Wernersson, Hanna

    2016-01-01

    How is a veto justified? Within the discipline of International Relations, discourse analysis is gaining a higher status. However, there is a surprising lacuna in the literature as a discursive approach to the veto in the United Nations Security Council, is yet to be taken. This is unfortunate, given the Security Council’s prominence. The way in which the council members make meaning through their word choice has profound effects for politics in the international system. There is, nonetheless...

  7. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  8. Arsenic in Ground Water of the United States

    Science.gov (United States)

    ... Team More Information Arsenic in groundwater of the United States Arsenic in groundwater is largely the result of ... Gronberg (2011) for updated arsenic map. Featured publications United States Effects of human-induced alteration of groundwater flow ...

  9. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  10. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Serafino, Nina M

    2007-01-01

    .... From the information available in published sources, this apparently is the first time that the United States has depended on contractors to provide such extensive security in a hostile environment...

  11. The United States, Japan, and Australia: Security Linkages to Southeast Asia

    Science.gov (United States)

    2011-04-01

    Prime Minister and Defense Minister Datuk Seri Najib Tun Razak in mid-March 2007 stated that user states that want to see better safety arrangements...defense minister Najib stated that the U.S. would be welcome to provide aircraft for “Eyes in the Sky” as long as the personnel on board were exclusively

  12. Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States

    International Nuclear Information System (INIS)

    Gao Fei; Qin Su-Juan; Guo Fen-Zhuo; Wen Qiao-Yan

    2011-01-01

    The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented. (general)

  13. Enrichment situation outside the United States

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    Different enrichment technologies are briefly characterized which include gaseous diffusion, which is presently the production mainstay of the United States and France; the gaseous centrifuge which is the production plant for Urenco and the technology for future United States enrichment expansion; the aero-dynamic processes which include the jet nozzle (also known as the Becker process) and the fixed-wall centrifuge (also known as the Helikon process); chemical processes; laser isotope separation processes (also referred to in the literature as LIS); and plasma technology

  14. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    Science.gov (United States)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  15. United States’ Grand Strategy through the Lens of Lebanon in 1983 and Iraq in 2003

    Science.gov (United States)

    2012-06-08

    National Security Council. See: Gabriel Marcella , Affairs of State: The Interagency and National Security (Washington, DC: National Strategic Studies... Marcella , Gabriel. Affairs of State: The Interagency and National Security (Washington, DC: National Strategic Studies Institute, December 2008

  16. The Security and Defense of America's Ports: An Assessment of Coast Guard and Navy Roles, Capabilities and Synchronization

    National Research Council Canada - National Science Library

    Richardt, Timothy P

    2006-01-01

    .... The United States must thus act to increase security for seaborne commerce and create depth of enforcement through the assets of the Department of Homeland Security and the Department of Defense...

  17. Deterministic secure direct communication using GHZ states and swapping quantum entanglement

    International Nuclear Information System (INIS)

    Gao, T; Yan, F L; Wang, Z X

    2005-01-01

    We present a deterministic secure direct communication scheme via entanglement swapping, where a set of ordered maximally entangled three-particle states (GHZ states), initially shared by three spatially separated parties, Alice, Bob and Charlie, functions as a quantum information channel. After ensuring the safety of the quantum channel, Alice and Bob apply a series of local operations on their respective particles according to the tripartite stipulation and the secret message they both want to send to Charlie. By three of Alice, Bob and Charlie's Bell measurement results, Charlie is able to infer the secret messages directly. The secret messages are faithfully transmitted from Alice and Bob to Charlie via initially shared pairs of GHZ states without revealing any information to a potential eavesdropper. Since there is no transmission of the qubits carrying the secret message between any two of them in the public channel, it is completely secure for direct secret communication if a perfect quantum channel is used

  18. Leading Causes of Death in Females United States

    Science.gov (United States)

    ... and Health Issues at Work Health Equity Leading Causes of Death in Females, United States Recommend on Facebook Tweet ... to current and previous listings for the leading causes of death in females in the United States. Please note ...

  19. Changing Roles of the United States and Japan in the Security of Southeast Asia

    Science.gov (United States)

    1994-03-01

    Mahatir Mohamad invoked the Internal Security Act (ISA) in 1981, which enabled him to detain his opponents without trial. He applied the ISA liberally and...since World War II, the reaction of Southeast Asian leaders was positive. Prime Minister Mahatir of Malaysia had "no problems whatsoever" with the

  20. ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives

    Directory of Open Access Journals (Sweden)

    Liu Chen

    2017-01-01

    Full Text Available Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized accesses. However, secure deletion is very costly for solid state drives (SSDs, which unlike hard disks do not support in-place update. When applied to SSDs, both erasure-based and cryptography-based secure deletion methods inevitably incur large amount of valid data migrations and/or block erasures, which not only introduce extra latency and energy consumption, but also harm SSD lifetime.

  1. [Unit cost variation in a social security company in Querétaro, México].

    Science.gov (United States)

    Villarreal-Ríos, Enrique; Campos-Esparza, Maribel; Garza-Elizondo, María E; Martínez-González, Lidia; Núñez-Rocha, Georgina M; Romero-Islas, Nestor R

    2006-01-01

    Comparing unit cost variation between departments and reasons for consultation in outpatient health services provided by a social security company from Querétaro, Mexico. A study of costs (in US dollars) was carried out in outpatient health service units during 2004. Fixed unit costs were estimated per department and adjusted for one year's productivity. Material, physical and consumer resources were included. Weighting was assigned to resources invested in each department. Unit cost was estimated by using the micro cost technique; medicaments, materials used during treatment and reagents were considered to be consumer items. Unit cost resulted from adding fixed unit cost to the variable unit cost corresponding to the reason for consulting. Units costs were then compared between the medical units. Unit cost per month for diabetic treatment varied from 34.8 US dollars, 32,2 US dollars to US 34 US dollars, pap smear screening test costs were 7,2 US dollars, 8,7 US dollars and 7,3 US dollars and dental treatment 27 US dollars, 33 US dollars, 6 and 28,7 US dollars. Unit cost variation was more important in the emergency room and the dental service.

  2. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Building a new storyline for Florida's domestic security to provide future resiliency for the state

    OpenAIRE

    Pape, Dominick D.

    2008-01-01

    CHDS State/Local Quickly after the 9/11 event, the state of Florida drafted one of the Nation's first comprehensive counterterrorism strategies to aid in the protection of the state's visitors and citizens. This strategy was drafted early in the new paradigm of Homeland Security. The strategy had several modifications over the years but has not had a comprehensive review since its inception. Many things have changed in the arena of Homeland Security since that first step after the 9/11 ...

  4. Three-party quantum secret sharing of secure direct communication based on χ-type entangled states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen

    2010-01-01

    Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)

  5. Food irradiation in the United States

    International Nuclear Information System (INIS)

    Pauli, G.H.

    1991-01-01

    Since 1963, some irradiated foods have been permitted for sale in the United States. Yet, at this time, commercial application has been limited to irradiation of a relatively small fraction of the spices and seasonings used as ingredients in other foods. The current situation regarding irradiated foods in the United States and how it developed is discussed. The author writes from experience gained as a Government regulator concerned primarily with ensuring safety of food and therefore this is stressed together with the crucial role played by consumers and industry. (author)

  6. 76 FR 69798 - Survey of U.S. Ownership of Foreign Securities as of December 31, 2011

    Science.gov (United States)

    2011-11-09

    ... United States Government, a State or local government, and any agency, corporation, financial institution..., and short-term debt securities (including selected money market instruments). How to Report: Completed...

  7. 76 FR 72007 - ZionSolutions, LLC; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Security...

    Science.gov (United States)

    2011-11-21

    ... NUCLEAR REGULATORY COMMISSION [Docket Nos. 50-295 and 50-304; NRC-2011-0244] ZionSolutions, LLC; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Security Requirements 1.0 Background Zion Nuclear Power Station (ZNPS or Zion), Unit 1, is a Westinghouse 3250 MWt Pressurized Water Reactor...

  8. A different paradigm for security planning

    International Nuclear Information System (INIS)

    Hagengruber, R.

    2002-01-01

    Full text: Security costs at nuclear facilities have been relatively high for many years. Since the 1970s, these expenditures in the United States have grown much faster than inflation. After the tragedy of September 11, the rate of increase appears to be exponential. Within the National Nuclear Security Administration, the cost of security now is about 10 % of the entire budget. Research and Development (R and D) has played a role in modern security, but the rate of advancement of security technology has not been sufficient to moderate the increasing costs and performance demands. Part of this problem is associated with both an inadequate investment level and the lack of a visionary roadmap for security technology. The other element of the problem is the lack of a strategic framework or architecture that would allow security technology to be effectively placed in an overall context of functionality. A new concept for an architecture for security will be presented. Within this architecture, a different approach to design, use of technology, and evaluation of effectiveness will be offered. Promising areas of technology and design will be illustrated by specific examples and suggestions for advanced R and D will be made. (author)

  9. An audit of a specialist old age psychiatry liaison service to a medium and a high secure forensic psychiatry unit.

    Science.gov (United States)

    Shah, Ajit

    2006-04-01

    The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.

  10. Synchronization of the chaotic secure communication system with output state delay

    International Nuclear Information System (INIS)

    Changchien, S.-K.; Huang, C.-K.; Nien, H.-H.; Shieh, H.-W.

    2009-01-01

    In this paper, we utilize a proper Lyapunov function and Lyapunov theorem, combined with LMIs method, in order to design a controller L, which ensures the synchronization between the transmission and the reception ends of the chaotic secure communication system with time-delay of output state. Meanwhile, for the purpose of increasing communication security, we encrypt and decrypt the original to-be-transmitted message with the techniques of n-shift cipher and public key. The result of simulation shows that the proposed method is able to synchronize the transmission and the reception ends of the system, and moreover, to recover the original message at the reception end. Therefore, the method proposed in this paper is effective and feasible to apply in the chaotic secure communication system.

  11. 15 CFR 2008.18 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  12. The State Geologic Map Compilation (SGMC) geodatabase of the conterminous United States

    Science.gov (United States)

    Horton, John D.; San Juan, Carma A.; Stoeser, Douglas B.

    2017-06-30

    The State Geologic Map Compilation (SGMC) geodatabase of the conterminous United States (https://doi. org/10.5066/F7WH2N65) represents a seamless, spatial database of 48 State geologic maps that range from 1:50,000 to 1:1,000,000 scale. A national digital geologic map database is essential in interpreting other datasets that support numerous types of national-scale studies and assessments, such as those that provide geochemistry, remote sensing, or geophysical data. The SGMC is a compilation of the individual U.S. Geological Survey releases of the Preliminary Integrated Geologic Map Databases for the United States. The SGMC geodatabase also contains updated data for seven States and seven entirely new State geologic maps that have been added since the preliminary databases were published. Numerous errors have been corrected and enhancements added to the preliminary datasets using thorough quality assurance/quality control procedures. The SGMC is not a truly integrated geologic map database because geologic units have not been reconciled across State boundaries. However, the geologic data contained in each State geologic map have been standardized to allow spatial analyses of lithology, age, and stratigraphy at a national scale.

  13. Adapt or Drown - Can the United States Chart a Safe Course Through the Troubled Waters of Energy Security

    Science.gov (United States)

    2010-04-01

    the cost of meat and dairy products. One solution, algae, has been discussed for decreasing the dependency of biodiesel production on crops—a...and maize/corn (United States). Ethanol is produced by fermenting sugars. Corn grain is processed to remove the sugar in wet and dry mills (by...crushing, soaking, and/or chemical treatment), the sugar is fermented , and the resulting mix is distilled and purified to obtain anhydrous ethanol. Major

  14. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  15. Cyber security issues, challenges and solutions for the emerging smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Westlund, D. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2007-07-01

    This paper explored the technology and business issues and challenges associated the smart grid's tolerance of physical and cyber security attacks and proposed a framework that provides practical solutions for the electric operator. The 7 characteristics of a smart grid were described. Notably, a smart grid is self healing; supports client equipment and usage behaviour; tolerates physical and cyber security attacks; delivers high-quality power to customers; supports various power generation technologies; supports competitive power markets; and, delivers capital asset optimization while minimizing operational costs. According to the North American Electric Reliability Council (NERC), power capacity will increase by 6 per cent in the United States and 9 per cent in Canada, while the demand for electricity is expected to rise by 19 and 13 per cent respectively. In addition, total transmission miles are projected to increase by less than 7 per cent in the U.S. and by only 3.5 per cent in Canada. A Smart Grid, with distributed monitoring and control, is therefore needed to meet the increased demand. However, the power and energy sectors are targets for cyber attackers. Cyber security in real-time grid operations is a complex matter. Cyber risks include unauthorized access to control systems; interception of control data; attack on system components; interception of monitoring data; intentional and unintentional human intervention; and, impairment to application software. The proposed solution framework is based on a roadmap developed by the United States Homeland Security organization, the United States Department of Energy, and the Canadian Energy Infrastructure Protection Division. NERC reliability standards and framework are also integrated into this framework. The technical aspects of the framework include: ease of use; defence-in-depth characteristics; extensive monitoring within electronic security perimeters; protection of legacy systems; auditing, logging

  16. Exporting Rambutan to United States: One Reality?

    International Nuclear Information System (INIS)

    Ahmad Zainuri Mohd Dzomir; Zainon Othman; Mohd Sidek Othman

    2011-01-01

    Rambutan is a one of commodity that are passed by United States of America authority to be market in that states. The main condition for the approval is the exporter must use irradiation technology as quarantine treatment to monitor the insects in there. United States of America's Agriculture Department (USDA-APHIS) has make early survey to the facilities involved in exporting process chain to overview Malaysia preparedness for this purpose. This paper work will discussed the possibility of this exporting implemented based on conditions rule by the USDA. (author)

  17. United States cost of military force projection in the Persian Gulf, 1976-2007

    Energy Technology Data Exchange (ETDEWEB)

    Stern, Roger J. [Oil, Energy and the Middle East Program, Department of Near Eastern Studies and Princeton Environmental Institute, Guyot Hall, Princeton University, Princeton, NJ 08544 (United States)

    2010-06-15

    This paper presents the first estimate of United States military cost for Persian Gulf force (C{sub PGfp}) derived entirely by a quantitative method. An activity-based cost (ABC) model uses geographic distribution of aircraft carriers as a proxy allocator of Department of Defense (DoD) baseline cost to regional operations. Allocation follows simply from DoD data that since 1990 no less than one aircraft carrier has been continuously on-station in the Persian Gulf; that eight are required to keep one on-station there; that the Navy has had eleven-fifteen carriers since 1990; and that Army and Air Force units are virtually never deployed to combat operations without Navy units. For 1976-2007 C{sub PGfp} is estimated to be $6.8 x 10{sup 12} and for 2007 $0.5 x 10{sup 12} (2008$). This substantial military investment is not a remedy for the market failure at the heart of regional security problem, which is oil market power. When C{sub PGfp} is added to economic losses attributed to market power in another recent study, the severity of this market failure becomes more apparent. (author)

  18. United States cost of military force projection in the Persian Gulf, 1976-2007

    International Nuclear Information System (INIS)

    Stern, Roger J.

    2010-01-01

    This paper presents the first estimate of United States military cost for Persian Gulf force (C PGfp ) derived entirely by a quantitative method. An activity-based cost (ABC) model uses geographic distribution of aircraft carriers as a proxy allocator of Department of Defense (DoD) baseline cost to regional operations. Allocation follows simply from DoD data that since 1990 no less than one aircraft carrier has been continuously on-station in the Persian Gulf; that eight are required to keep one on-station there; that the Navy has had eleven-fifteen carriers since 1990; and that Army and Air Force units are virtually never deployed to combat operations without Navy units. For 1976-2007 C PGfp is estimated to be $6.8 x 10 12 and for 2007 $0.5 x 10 12 (2008$). This substantial military investment is not a remedy for the market failure at the heart of regional security problem, which is oil market power. When C PGfp is added to economic losses attributed to market power in another recent study, the severity of this market failure becomes more apparent. (author)

  19. POLAND AND TRANSATLANTIC SECURITY - AN ENDURING ATLANTICIST?

    Directory of Open Access Journals (Sweden)

    Kerry Longhurst

    2005-07-01

    Full Text Available Throughout the 1990’s Poland pursued a security policy steered by Atlanticism and a close bond with the United States. Atlanticism shaped Warsaw’s choices on all key security issues during the past decade, but became particularly apparent after 9/11 when Poland lent its full support to the US-led war on terror. Whilst membership in the EU will affect the priorities and conduct of Polish security policy, it is argued here that the deep-seated nature of Atlanticism in Polish strategic culture , together with the broader implications of enlargement upon the EU’s foreign policy ambitions will ensure that Poland will remain a keen Atlanticist in the New Europe.

  20. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.