Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Hazard-Unique Planning Considerations
This document provides guidance for developing hazard-specific appendices. Hazard-specific appendices offer a means of extending functional annexes to address special and unique response procedures, notifications, protective actions, emergency public information, and other needs generated by a particular hazard. They allow the jurisdiction, in its EOP, to address priorities identified through hazard analysis and to meet detailed regulatory requirements associated with some hazards. A hazard-specific appendix should be prepared for any functional annex that does not, by itself, give enough information to perform the function adequately in the face of a particular high-priority hazard. Some hazards may require that appendices be prepared for various functional annexes; others may affect planning for only one or two functions. Appendices may be long or very brief depending upon need.
United States. Federal Emergency Management Agency
-
Industrial Chemicals and Terrorism: Human Health Threat Analysis, Mitigation and Prevention
"Terrorists, warring factions, and saboteurs use chemicals commonly found in communities in industrialized nations to create improvised explosives, incendiaries, and chemical agents. Common chemicals may be used because standard military chemical agents may be difficult or dangerous to manufacture, access, or disperse. The Agency for Toxic Substances and Disease Registry (ATSDR) developed a 10-step procedure to analyze, mitigate, and prevent public health hazards resulting from terrorism involving industrial chemicals. The procedure includes identifying key information such as potential threats, local sources of chemicals of potential use to terrorists, exposure pathways, impacts on human health and infrastructure, health risk communication needs, and mitigation and prevention methods. The information identified during these steps is then incorporated into emergency response plans and training exercises. Results of applying the 10-step procedure to two communities are discussed."
United States. Agency for Toxic Substances and Disease Registry
Hughart, Joseph L.; Bashor, Mark M.
-
Office of Law Enforcement Standards (OLES) [website]
OLES helps law enforcement, corrections, and criminal justice agencies ensure that the equipment they purchase and the technologies they use are safe, dependable, and effective. The Office focuses on the development of performance standards. It contains information on project and focus areas and a variety of related publications.
National Institute of Standards and Technology (U.S.)
-
Public Affairs Guidance for Homeland Defense Chemical Biological Umbrella Program Test
This document provides guidance to public affairs officers in preparation for questions on the Homeland Defense Chemical Biological Umbrella (HDCBU) Program Test. As part of the Homeland Defense Chemical Biological Umbrella
(HDCBU) Program, the Multi-Mission Sensor (MMS) Team conducted a system
technical end-to-end test vicinity of Oklahoma City (OKC) from April 27 - May 11, 2004. This is the seventh in a series of tests designed to evaluate the feasibility of radars for early warning of a chemical or biological aerial release. The data collected will be used to determine the technical readiness of the radar early warning software and algorithms being developed by the Massachusetts Institute of Technology's Lincoln Laboratories and of the overall system.
United States. Joint Program Executive Office for Chemical and Biological Defense
-
CDC Emergency Response Resources [website]
This section of the CDC website provides numerous links to emergency response resources, and is divided into the following topics: Emergency Responders, Disaster Site Management, Terrorism Response, Personal Protective Equipment, Natural Disasters, Chemical Agent Information, and Emergency Preparedness for Business. In addition, there are a number of fact sheets for firefighters, emergency medical personnel, and other first responders.
Centers for Disease Control and Prevention (U.S.)
-
U.S. Fire Administration [website]
The USFA Web site provides numerous emergency response and incident command system resources intended for Fire and Emergency Medical Services (EMS) professionals and other emergency responders. Items include downloadable documents, videotapes and kits, books, and other resources.
United States. Federal Emergency Management Agency
-
United States Air Force Counterproliferation Center [website]
The USAF Counterproliferation Center provides a website that contains numerous links to information regarding chemical, nuclear, biological, and conventional weapons, technologies, and effects. Links to organizations, treaties, historical notes, and related information are also provided.
USAF Counterproliferation Center
-
Secretary Colin L. Powell's Remarks with His Excellency Joschka Fischer, Minister of Foreign Affairs of the Federal Republic of German, Washington, DC (November 20, 2001)
Secretary Colin Powell and German Foreign Minister Joschka Fischer discuss the Middle East peace process and reconstruction in Afghanistan.
United States. Department of State
-
U.S. Department of State [website]
The State Department is the primary diplomatic body of the United States charged with the mission to "create a more secure, democratic, and prosperous world for the benefit of the American people and the international community". Aside from the goodwill missions and diplomacy, this body is the frontline mediator in international efforts.
United States. Department of State
-
American Society of International Law [website]
The American Society of International Law is dedicated to "advancing the study and use of international law." It also serves as an educational institution in international law. Although membership is required for full services, its website offers news and important resources.
American Society of International Law
-
Information Assurance: Trends in Vulnerabilities, Threats, and Technologies [Working Paper]
"To better understand the problems of incorporating IT into the battlefield, CTNSP, in concert with The Center for Public Policy and Private Enterprise (CPPPE) of the University of Maryland School of Public Affairs, brought together leaders in the field of military and commercial policy and technology (A list of attendees can be found in Appendix A). The purpose of the meeting was to discuss information assurance issues as they relate to network centric warfare. The workshop objective was to gain insight into transformation risks in the following areas: trends in information system threats and vulnerabilities; vulnerabilities introduced by the complexity of the new digitized battlefield; impact of degraded information systems on battlefield operations; and trends in information assurance technologies and system design. This volume presents the proceedings of that workshop. By virtue of their diverse experiences and concerns, workshop participants offered unique insights into a multiplicity of issues. As was to be expected, they did not always agree. Their disagreements are instructive and highlight the magnitude of the challenges we face in harnessing the operational and technological aspects of network centric warfare."
National Defense University. Center for Technology and National Security Policy
-
Office of Technology Transfer [website]
The Office of Technology Transfer (OTT) is part of the National Institutes of Health (NIH) which is the principal biomedical and behavioral research agency of the US Government. OTT is responsible for the central development and implementation of technology transfer policies for four research components of the Public Health Service (PHS) the NIH, the FDA, the Centers for Disease Control and Prevention, and the Agency for Healthcare Research and Quality.
National Institutes of Health (U.S.)
-
Museum Property Emergency Planning
Disasters are probably the greatest single cause of attrition to the world's cultural and natural heritage. Disasters are a class of emergencies: not all emergencies become disasters, but all disasters are emergencies that have gotten out of control. The primary goal of emergency planning is to avoid the loss of resources (in this case, museum property) affected by the emergency. Advanced planning is the key to meeting that goal. The primary objectives of emergency planning are as follows: to anticipate and, if possible, to avoid emergencies; to retain control when an emergency occurs; and, to recover control as quickly as possible if it is lost. How effectively damage is limited in a disaster situation depends to a very great extent upon the thoroughness of the planning effort. An Emergency Management Plan for Museum Property identifies an organization's vulnerabilities to disaster; points out how some of them can be mitigated and others prepared for; details ways of responding to and controlling disasters that do occur; and provides a guide to the organization's ultimate recovery. The purpose of this document is to present guidance for unit staffs in protecting museum property from the effects of serious emergencies and disasters.
United States. Department of the Interior
-
World Trade Center (WTC) Research
"The collapse of the World Trade Center (WTC) towers brought considerable focus to the need for adequate simulation tools for determining exposure and risk from such catastrophic events. An important first step in a methods development program is to examine the exposure pathways through a reconstruction of the transport and dispersion of pollutants released from the WTC site using available modeling and monitoring approaches. Central to development and evaluation of exposure modeling methods is a laboratory scale model simulation of pollutant transport and dispersion in Lower Manhattan. A 1:600 scale model of Lower Manhattan has been constructed and inserted into the test section of the Fluid Modeling Facility's Meteorological Wind Tunnel."
United States. Environmental Protection Agency
-
Social Vulnerability Assessment in Mexico City and Los Angeles
This document offers a compilation of maps that superimpose vulnerable populations with the physical hazard. Maps and lists are provided which identify municipalities in metro regions with high percentages of vulnerable people. Also, a catalog of "best practices" of conducting detailed vulnerability assessments, supplementary local hazard mapping and preparedness training was developed. Training courses were developed and presented based upon these products.
Coastal Services Center (U.S.)
-
Port Security Grant Program, Round 3
This table lists the recipients of the third round of the Port Security Grant Program of the Department of Homeland Security's Transportation Security Administration. The list displays the grantee's location and project description.
United States. Transportation Security Administration
-
Global Century: Globalization and National Security
"The Global Century: Globalization and National Security is a two-volume work. Volume I provides an overall framework. It focuses on globalization's impact on world affairs and on the task of forging responsive U.S. policies and strategies. Volume II provides additional analyses of specific global and regional trends, and of policies for dealing with them. Scholarly in their tone and content, both volumes aim to illuminate and educate, not advocate. They do not put forth any single theory of globalization's future or a fixed policy blueprint to follow. Indeed, they present a wide range of opinions, interpretations, and recommendations from more than 50 experts drawn from multiple disciplines and specializations. They offer core themes, including a weighty sense of globalization's strategic essence and an insightful portrayal of the policy choices facing the United States and other countries. Their goal is to help inform the reader about globalization, its consequences, and its policy implications."
National Defense University. Institute for National Strategic Studies
-
Securing Our Homeland, Strengthening Our Liberties
"The national effort to protect our homeland focuses on preserving the 'unalienable rights that are essential to the strength and security of our nation: life, liberty, and the pursuit of happiness.' Thus, if developed properly, our homeland security efforts should reinforce the civil liberties and values that make America strong." Prepared by the Democratic members of the House Select Committee on Homeland Security, this report discusses the development of homeland security while maintaining civil liberties and values that make America strong.
United States. Congress. House. Select Committee on Homeland Security
Turner, Jim, 1946-
-
Lessons Learned Regarding the Use of Spatial Data and Geographic Information Systems (GIS) During Hurricane Floyd
Hurricane Floyd, which made landfall along the North Carolina coast on September 15, 1999, was a devastating and tragic event. The massive size and strength of the storm, combined with significant rainfall, caused federal, state, and local emergency management personnel along the entire east coast of the United States to prepare, respond, and, if necessary, recover from the effects of Hurricane Floyd. The response and recovery activities associated with the storm highlight how advances in technology have enhanced the ability to deal with disasters. The hurricane response efforts at the federal, state, and local levels for Hurricane Floyd were the first to rely heavily on spatial data and geographic information systems (GIS) technology. Compared to previous hurricanes, many of these response and recovery efforts were carried out more effectively and efficiently through the use of these tools. Many of the preparedness activities - such as forecasting potential flood inundation areas and disseminating forecasts - hinged on GIS and the use of Internet mapping applications. GIS was also used to monitor and track real-time road conditions and damage locations to ensure that responders could quickly be routed to areas in most need of assistance. During the long-term recovery phase, satellite imagery was combined with the Federal Emergency Management Agency's National Flood Insurance Program Digital Flood Insurance Rate Maps and analyzed with GIS to assist with the largest Hazard Mitigation Buyout Program in U.S. history. The "lessons learned" from these and many other successful uses of spatial data and GIS during Floyd are summarized in this report.
Coastal Services Center (U.S.)
-
FERET
The goal of the FERET program was to develop automatic face recognition capabilities that could be employed to assist security, intelligence, and law enforcement personnel in the performance of their duties. The goal of the sponsored research was to develop face recognition algorithms. The FERET database was collected to support the sponsored research and the FERET evaluations. The FERET evaluations were performed to measure progress in algorithm development and identify future research directions. The FERET program started in September of 1993, with Dr. P. Jonathon Phillips, Army Research Laboratory, Adelphi, Maryland, serving as technical agent. Initially, the FERET program consisted of three phases, each one year in length. The goals of the first phase were to establish the viability of automatic face recognition algorithms and to establish a performance baseline against which to measure future progress. The goals of phases 2 and 3 were to further develop face recognition technology. After the successful conclusion of phase 2, the DoD Counterdrug Technology Development Program Office initiated the FERET demonstration effort. The goals of this effort were to port FERET evaluated algorithms to real time experimental/demonstration systems.
United States. Combating Terrorism Technical Support Office. Technical Support Working Group
-
Evaluation of Air Defense Forces
The readiness of forces made available to CINCNORAD will be assessed in conjunction with the appropriate parent command/service inspection agency. This will be done on a regular and recurring basis to prompt the preparation process that leads to increased readiness. These evaluations provide CINCNORAD a validation of readiness postures as reported on a monthly basis in the Status of Resources and Training System report (SORTS) (Canadian equivalent report). Readiness will be assessed via four kinds of evaluations. The first evaluation assesses RAOCs (or equivalent) readiness to perform NORAD peacetime-to-wartime missions and is called the NORAD Operational Evaluation (NOE). The second evaluation assesses the ability to perform the peacetime mission. For NORAD alert fighter units and ADSs, this is called the Alert Force Evaluation (AFE). The third type of evaluation is a CMOC Readiness Evaluation (CRE) and will be conducted by the NORAD-USSPACECOM (N-SP) IG to evaluate the CMOC peacetime mission. The fourth type is a CMOC Operational Evaluation (COE) and will be conducted by the N-SP IG to evaluate the CMOC peacetime-to-wartime mission.
North American Aerospace Defense Command
-
Texas A & M University: Texas Engineering Extension Service: National Emergency Response & Rescue Training Center
This Office for State and Local Domestic Preparedness Support (ODP) Fact Sheet describes the Texas A & M University National Emergency Response and Rescue Training Center. The National Emergency Response & Rescue Training Center (NERRTC) was established by the Texas Engineering Extension Service (TEEX) at Texas A&M University in the aftermath of the 1995 bombing of the Alfred P. Murrah Building in Oklahoma City. Since then, significant resources have been invested in its existing infrastructure by the State of Texas and TEEX. The Conference Report for the 1999 Department of Justice (DOJ) Appropriations Act urged DOJ to use NERRTC at Texas A&M as a national training center to
"prepare Federal, State, and local officials, including law enforcement, firefighters, emergency medical personnel, and other key agencies such as public works and emergency management agencies, to prepare for and respond to chemical, biological, or other terrorist acts." NERRTC, with a physical complex valued at over $125 million, integrates the well-established emergency
response training programs and facilities of TEEX into a one-stop shop for domestic preparedness. Its mission is to prepare federal, state and local officials, including emergency first responders, to effectively respond to acts of terrorism caused by weapons of mass destruction (WMD).
United States. Office of Justice Programs. Office for Domestic Preparedness
-
Medical Examiners, Coroners, and Bioterrorism
This letter to the editor came from the University of New Mexico School of Medicine and the Center for Disease Control: "Federal, state, and local agencies are developing plans to detect and respond to bioterrorism. A multifaceted response team for bioterrorist events includes health-care providers and law enforcement, public health, and public safety officials. Since medical examiners and coroners generally work independently from other members of this team, special efforts may be necessary to ensure their inclusion in the planning process. Medical examiners and coroners have state statutory authority to investigate violent, suspicious, sudden, or unexplained deaths, including those due to homicide, trauma, and inapparent or poorly explained causes, such as drugs, toxins, and infectious agents. The role of these medical professionals in bioterrorism response can be twofold: response to a known terrorist attack and surveillance for unusual deaths or clusters of deaths that may represent an undetected attack. These investigators are skilled in preserving medicolegal evidence that may be important for subsequent criminal proceedings and in handling situations that involve mass deaths, as shown by their participation in the investigations of the Oklahoma City bombing, aviation accidents, and heat-related deaths. Medical examiners and coroners may also play an important role in the detection of bioterrorism since they may recognize unusual deaths before health-care providers become involved."
Centers for Disease Control and Prevention (U.S.)
Nolte, Kurt B.; Yoon, Stephen S.; Pertowski, Carol
-
Mobile Agent Security
Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. Today's agent incarnations can be characterized in a number of ways ranging from simple distributed objects to highly organized software with embedded intelligence. As the sophistication of mobile software has increased over time, so too have the associated threats to security. This report provides an overview of the range of threats facing the designers of agent platforms and the developers of agent-based applications. The report also identifies generic security objectives, and a range of measures for countering the identified threats and fulfilling these security objectives.
National Institute of Standards and Technology (U.S.)
Jansen, Wayne A.; Karygiannis, Tom
-
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the access and use of computational resources and services by mobile agents. Our method is based on extending the platform processing environment, using the capabilities present in most mobile agent systems, and applying two forms of privilege management certificates: attribute certificates and policy certificates. Privilege management certificates are digitally signed objects that allow various policy-setting principals to govern the activities of mobile agents through selective privilege assignment. The approach overcomes a number of problems in existing agent systems and provides a means for attaining improved interoperability of agent systems designed and implemented independently by different manufacturers. The paper also describes applying the scheme to Java-based agent systems.
National Institute of Standards and Technology (U.S.)
Jansen, Wayne A.
-
Defining IT Security Requirements for Federal Systems and Networks: Employing Common Criteria Protection Profiles in Key Technology Areas
The strategic goals of IT security are: Increase the level of assurance in Federal systems and networks in the near term by acquiring information technology (IT) products from the commercial marketplace with necessary security features and capabilities, and; Promote the development of more advanced IT security products by industry in the mid-to-long term to further strengthen Federal systems and networks and create a more secure information infrastructure within the United States.
National Institute of Standards and Technology (U.S.)
Ross, Ron
-
Intrusion Detection with Mobile Agents
Implementing an effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, some argue that mobile agent technology goes a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This paper discusses various ways in which mobile agents could be applied to the problem of detecting and responding to intrusions. This paper looks not only at the benefits derived from mobility, but also at those associated with software agents in general. After exploring these benefits, the paper outlines a number of ways to apply mobile agent technology in addressing the shortcomings of current IDS designs and implementations, and delineate the associated security issues involved. It also looks at several new approaches for automated responses to an intrusion, once detected.
National Institute of Standards and Technology (U.S.)
Jansen, Wayne A.
-
Information Warfare: New Roles for Information Systems in Military Operations
In the past decade we have witnessed phenomenal growth in the capabilities of information management systems. National security implications of these capabilities are only now beginning to be understood by national leadership. Information warfare (IW) is one of the new concepts receiving a great deal of attention inside the Washington DC beltway; in some circles IW is even touted as the cornerstone of future US military doctrine. There is no doubt IW is a concept the modern military officer should be familiar with, for advancements in computer technology have significant potential to dramatically change the face of military command and control. Information warfare theory has tremendous political, technical, operational and legal implications for the military. This article seeks to define IW for the layman and discuss its potential applications. It will also attempt to identify potential military uses of existing information systems technology and address some of the issues facing those who will be responsible for implementing this new doctrine.
Air University (U.S.). Press
Crawford, George A.
-
Schumer Homeland Security Report: One Year Later: Is the Federal Government Doing Enough to Make New York Safer? Grading the Federal Homeland Security Effort in New York and the Nation
This report grades the performance of Border/Port Security, Aviation Security, Northern Border Security, Nuclear Plant Security, Immigration, Water Supply Security, Cyber Security, and Combating Terrorism one year after the terrorist attacks of 9/11.
United States. Congress. Senate
Schumer, Charles E.
-
Strategic Plan (NUREG 1614)
This strategic plan goes over various safety issues in reference to Nuclear Reactors, Materials, and Waste, as well as International Nuclear Safety Support.
U.S. Nuclear Regulatory Commission