Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Channel Reservations vs. PACA Queuing: A Comparison of Priority Call Handling Techniques
Recently, the Technology and Standards Division of the National Communications System (NCS) completed a study that compares channel reservation and priority access channel allocation (PACA) queuing. The study simulated these priority
call handling techniques under stress to observe how the techniques would handle
periods of extreme congestion. The results of this study are clear: the PACA queuing technique consistently handles network stress most efficiently, providing the best completion rates to national security/emergency preparedness
(NS/EP) callers. This Technical Note explores how channel reservation and PACA queuing treat priority calls, analyzes the simulation's results and presents
implications of this study to NS/EP users.
National Communications System (U.S.). Office of the Manager
Young, Ray
1999-01
-
NS/EP Implications of GPS Timing
The Global Positioning System (GPS) is a satellite-based positioning and navigation system that is funded and operated by the United States Department of Defense. Although originally developed for use by the U.S. military, GPS now supports thousands of civilian users worldwide and is employed in a wide range of applications. This technical note focuses on the use of GPS for telecommunications network timing and synchronization. The following sections describe the GPS system, how GPS calculates and transmits its timing signals, and how GPS timing is used in networks. Lastly, potential National Security/Emergency Preparedness (NS/EP) implications are discussed.
National Communications System (U.S.). Office of the Manager
Brutt, LeeAnne
1999-08
-
Standards for Protection of Telecommunications Links
Public and Government attention has been focused not only on better methods of understanding stresses on public telecommunications networks, but also on protecting against these stresses. The development of new standards provides one method of understanding the issues of telecommunications stress. Likewise, these standards provide guidelines and data for building specifications to protect public telecommunications networks from stress threats.
National Communications System (U.S.). Office of the Manager
Bain, Greg
1999-08
-
Liability Risk Sharing Regime for U.S. Commercial Space Transportation: Study and Analysis
This report presents the results of a study and analysis of seven issues related to liability risk-sharing for commercial space transportation. It includes public views and recommendations in addition to those of interested federal agencies, as directed by Congress. The issues are delineated as follows: (1) analyze the adequacy, propriety, and effectiveness of, and the need for, the current liability risk-sharing regime in the United States for commercial space transportation;(2) examine the current liability and liability risk-sharing regimes in other countries with space transportation capabilities;(3) examine the appropriateness of deeming all space transportation activities to be "ultrahazardous activities" for which a strict liability standard may be applied and which liability regime should attach to space transportation activities, whether ultrahazardous activities or not; (4) examine the effect of relevant international treaties on the Federal Government's liability for commercial space launches and how the current domestic liability risk-sharing regime meets or exceeds the requirements of those treaties; (5) examine the appropriateness, as commercial reusable launch vehicles enter service and demonstrate improved safety and reliability, of evolving the commercial space transportation liability regime towards the approach of the airline liability regime; (6) examine the need for changes to the Federal Government's indemnification policy to accommodate the risks associated with commercial spaceport operations; and (7) recommend appropriate modifications to the commercial space transportation liability regime and the actions required to accomplish those modifications.
United States. Department of Transportation; United States. Federal Aviation Administration
-
Intelligence Community Policy and Planning Committees
Pursuant to the provisions of the National Security Act of 1947 and
Executive Order 12333, the Intelligence Community Principals
Committee and the Intelligence Community Deputies Committee are
established. This directive details what activities these communities preform.
United States. Central Intelligence Agency
1997-07-28
-
ERS Launches Invasive Species Initiative
"An 'invasive species' is one that is alien to the ecosystem an causes harm to the economy, the environment, or human health. Unintentionally transported from one country to another, invasive species can be particularly damaging to agriculture, as recent instances of karnal bunt in wheat and Exotic Newcastle Disease in poultry have demonstrated. The rising potential for invasive pest incidents, brought about by increased global commerce, prompted ERS to launch a research program on the economics of invasive species policies and programs that affect food, agriculture, or natural resources, and are managed by the USDA. The research program, which will be supported by extramural research agreements with universities and other external cooperators, covers three critical topic areas: the economics of trade and invasive species; bioeconomic risk assessments of alternative pests and diseases; and policies to manage damage caused by invasive species."
United States. Department of Agriculture. Economic Research Service
Vasavada, Uptal; Bohman, Mary
2003-04
-
Information Handling Committee
The Committee will advise the Director of Central Intelligence (DCI) on the establishment of common objectives for Intelligence Community information handling and coordinate the achievement of these objectives through improvement and integration of Intelligence Community information handling systems. Information handling includes the functions of receipt of information
from collection sources, dissemination, transformation, indexing, categorization, storage, retrieval and presentation, automatic data
processing, telecommunications, and teleprocessing related thereto.
United States. Central Intelligence Agency
1982-05-04
-
Community Management Staff
This directive establishes a Community Management Staff to assist the DCI in fulfilling his Intelligence Community coordination and management responsibilities.
United States. Central Intelligence Agency
1995-06-12
-
Community Nonproliferation Committee
The Community Nonproliferation Committee will complement the Nonproliferation Center's goals by providing a forum for policy, enforcement and intelligence officials to consider plans, opportunities, developments, and related activities in the fields of weapons proliferation and technology transfer.
United States. Central Intelligence Agency
1993-04-12
-
Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
This document specifies the procedures involved in validating implementations of the Triple DES algorithm in FIPS PUB 46-3 Data Encryption Standard (DES) (and ANSI X9.52 - 1998). The TMOVS is designed to perform automated testing on Implementations Under Test (IUTs). This publication provides brief overviews of the Triple DES algorithm and introduces the basic design and configuration of the TMOVS. Included in this overview are the specifications for the two categories of tests that make up the TMOVS, i.e., the Known Answer tests and the Monte Carlo tests. The requirements and administrative procedures to be followed by those seeking formal NIST validation of an implementation of the Triple DES algorithm are presented. The requirements described include the specific protocols for communication between the IUT and the TMOVS, the types of tests which the IUT must pass for formal NIST validation, and general instructions for accessing and interfacing with the TMOVS. An appendix with tables of values and results for the Triple DES Known Answer tests is also provided.
National Institute of Standards and Technology (U.S.)
Keller, Sharon S.
2000-04
-
Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
The need for random and pseudorandom numbers arises in many cryptographic applications. For example, common cryptosystems employ keys that must be generated in a random fashion. Many cryptographic protocols also require random or pseudorandom inputs at various points, e.g., for auxiliary quantities used in generating digital signatures, or for generating challenges in authentication protocols. This document discusses the randomness testing of random number and pseudorandom number generators that may be used for many purposes including cryptographic, modeling and simulation applications. The focus of this document is on those applications where randomness is required for cryptographic purposes. A set of statistical tests for randomness is described in this document. The National Institute of Standards and Technology (NIST) believes that these procedures are useful in detecting deviations of a binary sequence from randomness. However, a tester should note that apparent deviations from randomness may be due to either a poorly designed generator or to anomalies that appear in the binary sequence that is tested (i.e., a certain number of failures is expected in random sequences produced by a particular generator). It is up to the tester to determine the correct interpretation of the test results. Refer to Section 4 for a discussion of testing strategy and the interpretation of test results.
National Institute of Standards and Technology (U.S.)
Barker, Elaine B.; Soto, Juan; Rukhin, Andrew
2001-05-15
-
Guide for Developing Security Plans for Information Technology Systems
Today's rapidly changing technical environment requires federal agencies to adopt a minimum set of management controls to protect their information technology (IT) resources. These management controls are directed at individual information technology users in order to reflect the distributed nature of today's technology. Technical and operational controls support management controls. To be effective, these controls all must interrelate. This document provides a guideline for federal agencies to follow when developing the security plans that document the management, technical, and operational controls for federal automated information systems. The purpose of this security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. The system security plan also delineates responsibilities and expected behavior of all individuals who access the system.
National Institute of Standards and Technology (U.S.)
Swanson, Marianne
1998-12
-
Security Self-Assessment Guide for Information Technology Systems
There are many methods and tools for agency officials to help determine the current status of their security programs relative to existing policy. Ideally many of these methods and tools would be implemented on an ongoing basis to systematically identify programmatic weaknesses and where necessary, establish targets for continuing improvement. This document provides a method to evaluate the security of unclassified systems or groups of systems; it guides the reader in performing an IT security self-assessment. Additionally, the document provides guidance on utilizing the results of the system self-assessment to ascertain the status of the agency-wide security program. The results are obtained in a form that can readily be used to determine which of the five levels specified in the Federal IT Security Assessment Framework the agency has achieved for each topic area covered in the questionnaire. The goal of this document is to provide a standardized approach to assessing a system. This document strives to blend the control objectives found in the many requirement and guidance documents. To assist the reader, a reference source is listed after each control objective question listed in the questionnaire.
National Institute of Standards and Technology (U.S.)
Swanson, Marianne
2001-11
-
PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
The Private Branch Exchange (PBX) is an essential element that supports the critical infrastructure of both government agencies and U.S. industry. A PBX is a sophisticated computer-based switch that can be thought of as essentially a small, in-house phone company for the organization that operates it. Protection of the PBX is thus a high priority. Failure to secure a PBX can result in exposing the organization to toll fraud, theft of proprietary or confidential information, and loss of revenue or legal entanglements. This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital based PBXs and addresses: System Architecture, Hardware, Maintenance, Administrative Database/Software, and User Features. This report is not intended to provide a step-by-step process, but rather a guideline for what specific areas should be studied for the existence of possible vulnerabilities.
National Institute of Standards and Technology (U.S.)
2000-08
-
Food and Drug Administration's Strategic Action Plan: Protecting and Advancing America's Health: Responding to New Challenges and Opportunities
The FDA is responsible for protecting the public health by assuring the safety, efficacy, and security of human and veterinary drugs, biological products, medical devices, our nation's food supply, cosmetics, and products that emit radiation. The FDA is also responsible for advancing the public health by helping to speed innovations that make medicines and foods more effective, safer, and more affordable; and helping the public get the accurate, science-based information they need to use medicines and foods to improve their health. This Strategic Action Plan outlines the following goals: Use science-based efficient risk management in all Agency regulatory activities, so that the Agency's limited resources can provide the most health promotion and protection at the least cost for the public; Enable consumers to make smarter decisions by getting them better information to weigh the benefits and risks of FDA-regulated products; Seek continuous improvements in patient and consumer safety by reducing risks associated with FDA-regulated products; Strengthen FDA's capability to identify, prepare for, and respond to terrorist threats and incidents; Ensure a world-class professional workforce, effective and efficient operations, and adequate resources to accomplish the agency's mission.
United States. Food and Drug Administration
2003-08
-
Telecommunications: Uneven Implementation of Wireless Enhanced 911 Raises Prospect of Piecemeal Availability for Years to Come
Concerns have been raised about the pace of Enhanced 911 (E911) implementation and whether this service, which determines a caller's geographic location at the moment a 911 call is made, will be available for mobile phones nationwide. GAO reviewed the progress being made in implementing wireless E911 service, the factors affecting this progress, and the role of the federal government in facilitating the nationwide deployment of wireless E911 service. Successful implementation depends on coordinated efforts by wireless carriers, local telephone companies, and more than 6,000 public safety answering points (PSAPs)--the facilities that receive 911 calls and dispatch assistance. As of October 2003, nearly 65 percent of PSAPs had Phase I wireless E911 service, which provides the approximate location of the caller, while only 18 percent had Phase II, which provides a more precise location and is the ultimate goal of wireless E911 service. 24 state 911 contacts reported that their state will have Phase II implemented by 2005 or sooner. Key factors hindering wireless E911 implementation involve funding and coordination. Wireless carriers, states, and localities must devise the means to fund more than $8 billion in estimated deployment costs over the next 5 years. DOT is developing an action plan and clearinghouse for wireless E911 planning, implementation, and operations. The Federal Communications Commission (FCC) has set deadlines on the wireless carriers' E911 responsibilities and has taken actions to identify best practices and improve coordination among the parties. DOT and FCC, however, have limited authority in overseeing deployment because PSAPs traditionally fall under state and local jurisdiction.
United States. General Accounting Office
2003-11-07
-
Early Warning Systems for Hazardous Biological Agents in Potable Water
In this paper, we present characteristics of early warning systems (EWSs) and other pre-exposure management approaches that may increase the chances of preventing human exposure, if biological weapons are used in drinking water systems. We also address the interpretation of, response to, and communication of information derived from EWSs. This report reflects the deliberations of a breakout group from this conference that addressed system characteristics and interpretation, response, and communication issues.
National Institute of Environmental Health Sciences
Foran, Jeffery A.; Brosnan, Thomas M.
2000-10
-
FDA Issues Final Two Proposed Food Safety Regulations
FDA today announced publication of the final two food safety proposed regulations required by the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 ("The Act"), which gave FDA new authority to protect the nation's food supply. The proposals are two of four proposed regulations that the Act calls upon FDA to develop regarding food safety. These two proposals deal with establishing and maintaining records among food firms, and the administrative detention of foods that may pose a risk to public health. The other two proposals, concerning the registration of food facilities and prior notice of imported foods, were published in January 2003.
United States. Food and Drug Administration
2003-05-06
-
Information Technology Security Training Requirements: A Role- and Performance-Based Model
The overall goal of this document is to facilitate the development or strengthening of a comprehensive, measurable, cost-effective IT security program which supports the missions of the organization and is administered as an integral element of sound IT management and planning. Protecting the value of an organization's information assets demands no less. This approach allows senior officials to understand where, in what way, and to what extent IT-related job responsibilities include IT security responsibilities, permitting the most cost-effective allocation of limited IT security training resources. The issuance of this document is not intended to significantly modify Federal agencies' ongoing IT security awareness programs and activities, or to invalidate their IT security training courses or courseware. Rather, their courses will require comprehensive review and revalidation in accordance with this new performance-based model and requirements. It is expected that agencies and organizations will find training gaps and will need to establish priorities and strategies for filling them. This process cannot be accomplished by a single organization's IT security program office working alone. Instead, it requires a broad, cross-organizational strategy at the executive level to bring together various functions and organization entities that may not have previously worked together. The perspectives and expertise of training center personnel, course designers, program analysts, IT security specialists, training evaluators, and specialists in many related IT functional areas all are needed to achieve success. To assist in achieving this goal, this document identifies groups of individuals who will be able to use this guidance and suggests ways in which they may want to use it.
National Institute of Standards and Technology (U.S.)
De Zafra, Dorothea E.; Pitcher, Sadie I.; Tressler, John D.
1998-04
-
Catastrophe Insurance Risks: Status of Efforts to Securitize Natural Catastrophe and Terrorism Risk, Report to Congressional Requesters
A natural or terrorist catastrophe in the United States could place enormous financial demands on the insurance industry, businesses, and taxpayers. Thus, interest has been raised in bonds that are sold in the capital markets and thereby diversify catastrophe funding sources. GAO was asked to update a 2002 report on "catastrophe bonds" and assess (1) their progress in transferring natural catastrophe risks to the capital markets, (2) factors that may affect the issuance of catastrophe bonds by insurance companies, (3) factors that may affect investment in catastrophe bonds, and (4) the potential for and challenges associated with securitizing terrorism-related financial risks. The market for catastrophe bonds has transferred a small portion of natural catastrophe risk to the capital markets. Some insurance and reinsurance companies issue catastrophe bonds because they allow for risk transfer and may lower the costs of insuring against the most severe catastrophes. However, other insurers do not issue catastrophe bonds because their costs are higher than transferring risks to other insurers. Although some investors see catastrophe bonds as an attractive investment because they offer high returns and portfolio diversification, others believe that the bonds' risks are too high or too costly to assess. To date, no catastrophe bonds related to terrorism have been issued covering potential targets in the United States since issuing such securities would not be practical at this time due in part to the challenges of predicting the frequency and severity of terrorist attacks.
United States. General Accounting Office
2003-09-24
-
Protecting Sources of Drinking Water: Selected Case Studies in Watershed Management
This document presents case studies of 17 drinking water systems commited to extensive efforts to incorporate source water management and protection as an
integral part of their business of providing safe drinking water to their customers. The authors provide snapshots of lessons learned in implementing four aspects of source water protection: partnerships, watershed assessment, watershed land use management, and land acquisition. Though diverse in their watershed management experiences, there is a common thread among all of the water systems: the importance of cross-program coordination. The coordination of a drinking water utility's goals with local watershed management initiatives aimed at aquatic ecosystem restoration and protection can boost the effectiveness of program implementation for both priorities.
United States. Environmental Protection Agency
1999-04
-
U.S. Postal Service: Clear Communication with Employees Needed before Reopening the Brentwood Facility: Testimony by Bernard L. Ungar, Director Physical Infrastructure, before the Committee on Government Reform
On October 21, 2001, the U.S. Postal Service closed its Brentwood mail processing facility after the Centers for Disease Control and Prevention (CDC) confirmed that an employee there had contracted inhalation anthrax. The Brentwood facility has since been decontaminated and will soon reopen. This testimony provides GAO's preliminary observations on the decisions made in closing the facility and problems experienced in communicating with employees, as well as lessons learned from the experience. The Postal Service's decision to wait to close the Brentwood facility and refer employees for medical treatment until CDC confirmed that a postal employee had contracted inhalation anthrax was consistent with the advice the Postal Service received from public health advisers and the information about health risk available at the time. The Postal Service communicated information to its Brentwood employees during the anthrax incident, but some of the health risk information changed over time, exacerbating employees' concerns about the measures being taken to protect them. Other factors, including difficulties in communicating the uncertainty associated with health recommendations and employees' distrust of postal managers, also challenged efforts to communicate effectively. The Postal Service and others have learned since the 2001 anthrax incidents that (1) the risk of contracting anthrax through the mail is greater than was previously believed and more caution is needed to respond to that greater risk and (2) clear, accurate communication is critical to managing the response to an incident and its aftermath.
United States. General Accounting Office
2003-10-23
-
Physician Workforce: Physician Supply Increased in Metropolitan and Nonmetropolitan Areas but Geographic Disparities Persisted
Through a variety of programs, the federal government supports the training of physicians and encourages physicians to work in underserved areas or pursue primary care specialties. GAO was asked to provide information on the physician supply and the generalist and specialist mix of that supply in the United States and the changes in and geographic distribution of physician supply in metropolitan and nonmetropolitan areas. To address these objectives, GAO analyzed data on physician supply and geographic distribution from 1991 and 2001. The U.S. physician population increased 26 percent, which was twice the rate of total population growth, between 1991 and 2001. Growth in physician supply per 100,000 people between 1991 and 2001 was seen in historically high-supply metropolitan areas as well as low-supply statewide nonmetropolitan areas. Between 1991 and 2001, all statewide nonmetropolitan areas and 301 out of the 318 metropolitan areas gained physicians per 100,000 people. Of those 17 metropolitan areas that experienced declines in the number of physicians per 100,000 people, only 2 had fewer total physicians in 2001 than 1991. Overall, nonmetropolitan areas experienced higher proportional growth in physicians per 100,000 people than metropolitan areas, but the disparity in the supply of physicians per 100,000 people between nonmetropolitan and metropolitan areas persisted. Nonmetropolitan counties with a large town (10,000 to 49,999 residents) had the biggest increase in physicians per 100,000 people of all county categories but their supplies per 100,000 people were still less than large and small metropolitan counties' supplies in 1991 and 2001.
United States. General Accounting Office
2003-10-31
-
FSIS Safety and Security Guidelines for the Transportation and Distribution of Meat, Poultry, and Egg Products
The FSIS Food Safety and Security Guidelines for the Transportation and Distribution of Meat, Poultry, and Egg Products are designed to assist small facilities and shippers handling these products. The guidelines provide a list of safety and security measures that may be taken to prevent contamination of meat, poultry, and egg products during loading and unloading, transportation, and in-transit storage. In these voluntary guidelines, we strongly encourage shippers and receivers, as well as transporters of these products, to develop controls for ensuring the condition of the products through all phases of distribution. Such controls are necessary to protect the products from intentional, as well as unintentional, contamination. We recognize that not all of these measures will be appropriate or practical for every facility. The first section of these guidelines provides food safety measures to help prevent the physical, chemical, radiological, or microbiological contamination of meat, poultry, and egg products during transportation and storage. The second section of the guidelines deals specifically with security measures intended to prevent the same forms of contamination due to criminal or terrorist acts. Both sections apply to all points of shipment from the processor to their delivery at the retail store, restaurant, or other facility serving consumers of the products. These guidelines can be applied whether the potential contamination occurs due to an intentional or unintentional act.
United States. Food Safety and Inspection Service
2003-08
-
Unclassified Report to Congress on the Acquisition of Technology Relating to Weapons of Mass Destruction and Advanced Conventional Munitions, 1 January through 30 June 2003
As required by Section 721 of the FY 1997 Intelligence Authorization Act, this report, submitted by the Director of the Central Intelligence, outlines the acquisition by foreign countries during the preceding 6 months of dual-use and other technology useful for the development or production of weapons of mass destruction (including nuclear weapons, chemical weapons, and biological weapons) and advanced conventional munitions. This report provides country summaries of acquisition activities (solicitations, negotiations, contracts, and deliveries) related to weapons of mass destruction (WMD) and advanced conventional weapons (ACW) that occurred from 1 January through 30 June 2003. Countries that already have established WMD programs, as well as countries that demonstrated little WMD acquisition activity of concern are not discussed. Countries covered in this report include Iran, Iraq, North Korea, Libya, Syria, and Sudan. Countries reported as key suppliers include Russia, North Korea, and China. The report also includes information on the role western European countries play in the proliferation of WMD- and missile-related information and training, and a brief discussion regarding emerging state and non-state suppliers.
United States. Central Intelligence Agency
2003-11
-
Department of Health and Human Services, Food and Drug Administration: Registration of Food Facilities Under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002
GAO reviewed the Department of Health and Human Services, Food and Drug Administration's (FDA) new rule on registration of food facilities. GAO found that (1) the rule would require domestic and foreign facilities that manufacture/process, pack or hold food for human or animal consumption in the United States to register with the FDA by December 12, 2003; and (2) FDA complied with all applicable requirements in promulgating the rule.
United States. General Accounting Office
2005-07-05
-
Department of Health and Human Services, Food and Drug Administration: Prior Notice of Imported Food Under the Public Security and Bioterrorism Preparedness and Response Act of 2002
GAO reviewed the Food and Drug Administration's (FDA) new rule on prior notice of imported food. GAO found that (1) the rule would require submission to the FDA of prior notice of food, including animal feed, that is imported or offered for import into the United States, and implement the Public Health Security and Bioterrorism Preparedness and Response Act of 2002; and (2) the FDA complied with the applicable requirements in promulgating the rule.
United States. General Accounting Office
2003-10-23
-
Unclassified Report to Congress on the Acquisition of Technology Relating to Weapons of Mass Destruction and Advanced Conventional Munitions, 1 July - 30 December 2002
As required by Section 721 of the FY 1997 Intelligence Authorization Act, this report, submitted by the Director of the Central Intelligence, outlines the acquisition by foreign countries during the preceding 6 months of dual-use and other technology useful for the development or production of weapons of mass destruction (including nuclear weapons, chemical weapons, and biological weapons) and advanced conventional munitions. This report provides country summaries of acquisition activities (solicitations, negotiations, contracts, and deliveries) related to weapons of mass destruction (WMD) and advanced conventional weapons (ACW) that occurred from 1 July through 31 December 2002.
Countries that already have established WMD programs, as well as countries that demonstrated little WMD acquisition activity of concern are not discussed. Countries covered in this report include Iran, Iraq, North Korea, Libya, Syria, and Sudan. Countries reported as key suppliers include Russia, North Korea, and China. The report also includes information on the role western European countries play in the proliferation of WMD- and missile-related information and training, and a brief discussion regarding emerging state and non-state suppliers.
United States. Central Intelligence Agency
2003-11
-
Unclassified Report to Congress on the Acquisition of Technology Relating to Weapons of Mass Destruction and Advanced Conventional Munitions, 1 July Through 31 December 2000
As required by Section 721 of the FY 1997 Intelligence Authorization Act, this report, submitted by the Director of the Central Intelligence, outlines the acquisition by foreign countries during the preceding 6 months of dual-use and other technology useful for the development or production of weapons of mass destruction (including nuclear weapons, chemical weapons, and biological weapons) and advanced conventional munitions. This report provides country summaries of acquisition activities (solicitations, negotiations, contracts, and deliveries) related to weapons of mass destruction (WMD) and advanced conventional weapons (ACW) that occurred from 1 July through 31 December 2002.
Countries that already have established WMD programs, as well as countries that demonstrated little WMD acquisition activity of concern are not discussed. Countries covered in this report include Iran, Iraq, North Korea, Libya, Syria, Sudan, India, Pakistan, and Egypt. Countries reported as key suppliers include Russia, North Korea, and China. The report also includes information on the role western European countries play in the proliferation of WMD- and missile-related information and training, and a brief discussion of trends in the acquisition of such technology by such countries.
United States. Central Intelligence Agency
2001-02
-
Agricultural Transportation Challenges of the 21st Century: Transportation, Handling, and Logistical implications of Bioengineered Grains and Oilseeds: A Prospective Analysis
The overall goals of the analysis are to describe and analyze the transportation, handling, and logistical implications likely to result from the continued adoption of bioengineered grains and oilseeds in the United States, including such factors as the number and type of bioengineered products likely to emerge; product certification and testing requirements; and the transportation, storage, and handling requirements that will have to be met if bioengineered products are to be marketed successfully. To achieve those overall goals, a number of specific analyses were conducted. The results of these studies are integrated and reported in this report. The remainder of this section provides a systems perspective of the dynamics inherent in marketing system change, driven by biotechnology. The report's second section will briefly review and assess biotechnology from the perspective of its potential implications for the marketing sector. The next two major sections will examine the evolution of the commodity marketing systems, employing alternative lenses. First, alternative market structures will be detailed by investigating key distinguishing characteristics relative to those of the commodity market channel. Second, the results of indepth futuring exercises with decision makers from throughout today's production and market system will be reported. The final section of the report will identify handling, storage, and logistical implications of alternative future paths for biotechnology.
United States. Department of Agriculture
Cunningham, Carrie; Sonka, Steven T.; Schroeder, R. Christopher
2000-11