378,026 research outputs found
Is United States (U.S.) Policy Sufficient To Develop Earth-Moon Economic Zone Infrastructures By 2049?
The nation first-to-develop infrastructures in the future Earth-Moon Economic Zone will set the standards that shape and govern use by others, increasing both economic and national power. Current U.S. economic and national power is built upon a legacy of infrastructure leadership on Earth and in Earth orbit. However, China has a goal to supplant U.S. infrastructure leadership on Earth and establish leadership before the U.S. in the Earth-Moon Economic Zone by 2049. While the U.S. acknowledges China’s terrestrial infrastructure goals as an economic challenge, China’s space infrastructure goals appear to be met as either a military challenge in Earth orbit, or a prestige challenge to land a human on the Moon. Despite China incorporating infrastructure goals into their 2017 constitution, there has been no scholarly review of U.S. policy to develop infrastructures in this zone before 2049. The purpose of this study is to explore the sufficiency of U.S. policy to develop Earth-Moon Economic Zone infrastructures by 2049. The target audience is the U.S. National Security, National Space, and National Economic Councils, U.S. Congress, U.S. Department of Commerce (DOC), U.S. Department of Defense (DoD), National Aeronautics and Space Administration (NASA), U.S. Industry, and think tanks. This study was limited to the Earth-Moon Economic Zone from Earth orbit to the surface of the Moon, and both Trump and Biden U.S. national security, national space and select NASA budget documents since 2017. A qualitative analysis was used to review U.S. policy with an initial researcher-led document analysis followed by expert interviews for corroboration and supplemental information such as new policy. If any changes or new policies were identified, then U.S. policy reviewed was deemed not sufficient. The interview analysis corroborated five recommended changes and identified three new policies, so current U.S. policy was deemed not sufficient. While recommendations were not analyzed, the Researcher opines four as critical; adding a more unified infrastructure competition strategy across all infrastructure domains, including sustained operational dates for specific infrastructures in both policy and budgets, creating a national economic strategy for U.S. Earth-Moon Zone investment, and development of a whole-of-nation industrialization plan for Earth-Moon Zone infrastructure development
Examining the Roles of Army Reserve Component Forces in Military Cyberspace Operations
Cyberspace operations have become pervasive in the United States, and they enable many aspects of modern life for the average citizen, such as entertainment, communication, education, transportation, banking, and voting. The continuing development of the U.S. Army and Department of Defense (DoD) Reserve component cyberspace units can leverage the capabilities and experience of industry and academia to help protect critical information infrastructure and enhance national security. What opportunities and challenges surround the integration of these forces into a still-evolving joint cyberspace force?https://press.armywarcollege.edu/monographs/1383/thumbnail.jp
The War on Cyberterror: Why Australia Should Examine the U.S. Approach to Critical Infrastructure Protection
As the global community focuses on detecting and fighting terrorism, defense strategists have identified the vulnerability of certain cybersystems. Traditional methods of defense and warfare, however, often do not apply to new technologies. Thus the cybercommunity is developing new standards for protecting computer resources against terrorist attack. From the perspective of national governments, much attention has been paid to the importance of secure critical infrastructure. This category of computer-dependent resources includes sectors vital to the smooth and orderly operation of public society, such as transportation, communications, and food production. These sectors are becoming increasingly dependent on computers to function, and the majority of critical infrastructure is owned by the private sector. This relationship between the public\u27s interest in critical infrastructure and the interests of the private sector raises questions about how to balance the public and private interests in a cyberterror protection plan. While governments have an interest in ensuring the security of critical infrastructure, they are reluctant to directly regulate privately-owned businesses. Since the late 1990s, the United States has been developing methods to secure infrastructure through public-private information-sharing partnerships, and has successfully taken steps to respect corporate privacy in the process. Conversely, Australia is in the early stages of developing a national strategy for critical infrastructure protection, and the government has faced corporate resistance to developing an information-sharing security network. In comparing the cybersecurity situation in Australia to that in the United States, the Australian government should follow many of the steps that have made the U.S. process such a success to date. In particular, it should adopt similar corporate privacy protection policies for information shared with the government for critical infrastructure protection purposes, and should emphasize the development of public-private co-regulation of critical infrastructure. While the United States has not yet reached complete cybersecurity, its extra years of experience should inform the development of Australian policymaking
Preparing for the Apocalypse: a Multi-Prong Proposal to Develop Countermeasures for Biological, Chemical, Radiological, and Nuclear Threats
The false alarm of an Hawaiian nuclear attack in January 2018 is an example of the lack of U.S. preparedness for attacks using nuclear and other weapons of mass destruction. To address such threats, this Article proposes the establishment of a nation-wide integrated defense of health countermeasures initiative (“DHCI”), which is a multi-prong program to create a defensive triad comprising government, private industry, and academia to develop countermeasures for health threats posed by biological, chemical, radiological, and nuclear (“BCRN”) attacks. Key elements of our multi-faceted proposal include the use of the government’s Other Transaction Authority to simplify procurement arrangements, the establishment of public-private partnerships with an information commons for the sharing and the use of certain information and trusted intermediaries to protect proprietary information pursuant to cooperative research and development agreements (“CRADAs”), and the creation of a network of incubators sited in ecosystems of excellence. Although our proposal focuses on health countermeasures, it may be applied to other urgent national needs, such as rebuilding U.S. infrastructure
Preparing for the Apocalypse: A Multi-Prong Proposal to Develop Countermeasures for Chemical, Biological, Radiological, and Nuclear Threats
The false alarm of an Hawaiian nuclear attack in January 2018 is an example of the lack of U.S. preparedness for attacks using nuclear and other weapons of mass destruction. To address such threats, this Article proposes the establishment of a nation-wide integrated defense of health countermeasures initiative ( DHCI ), is a multi-prong program to create a defensive triad comprising government, private industry, and academia to develop countermeasures for health threats posed by chemical, biological, radiological, and nuclear ( CBRN ) attacks. Key elements of our multi-faceted proposal include the use of the government’s Other Transaction Authority to simplify procurement arrangements, the establishment of public-private partnerships with an information commons for the sharing and the use of certain information and trusted intermediaries to protect proprietary information pursuant to cooperative research and development agreements ( CRADAs ), and the creation of a network of incubators sited in ecosystems of excellence. Although our proposal focuses on health countermeasures, it may be applied to other urgent national needs, such as rebuilding U.S. infrastructure
Space-based Communications Infrastructure for Developing Countries
This study examines the potential use of satellites to augment the telecommunications infrastructure of developing countries with advanced satellites. The study investigated the potential market for using satellites in developing countries, the role of satellites in national information infractructures (NII), the technical feasibility of augmenting NIIs with satellites, and a nation's financial conditions necessary for procuring satellite systems. In addition, the study examined several technical areas including onboard processing, intersatellite links, frequency of operation, multibeam and active antennas, and advanced satellite technologies. The marketing portion of this study focused on three case studies: China, Brazil, and Mexico. These cases represent countries in various stages of telecommunication infrastructure development. The study concludes by defining the needs of developing countries for satellites, and recommends steps that both industry and NASA can take to improve the competitiveness of U.S. satellite manufacturing
CDC Division of Global HIV & TB country profile : Kenya
Since 2004, the U.S. Centers for Disease Control and Prevention (CDC) in Kenya, through the U.S. President\u2019s Emergency Plan for AIDS Relief (PEPFAR), has worked with multiple stakeholders, including the Kenya Ministry of Health (MOH), local, and international partners to support and strengthen prevention and control efforts of the HIV and tuberculosis (TB) epidemics.To achieve these goals, CDC is:\u2022 Developing strategic policy guidelines, national HIV surveillance, and strategic information systems, enabling early adoption of new scientific evidence and data use.\u2022 Improving service delivery in HIV and TB prevention, identification, linkage, treatment, and retention of people living with HIV (PLHIV) or TB.\u2022 Implementing high-quality laboratory services through infrastructure improvement, workforce development, and optimization of the lab-clinical interface.\u2022 Establishing and maintaining sound financial management systems to ensure transparency, accountability, and compliance with required regulations
Recommended from our members
Cyber security information sharing in the United States : an empirical study including risk management and control implications, 2000-2003
A tremendous amount of change in traditional business paradigms has occurred over the past decade through the development of Electronic Commerce and ad\ ancements in the field of Information Technology. As lesser-developed countries progress and become more prosperous. traditional . first world' countries have migrated to become strong service oriented economies (Asch, 200 I). Supporting technologies have developed over the past decade which has exploited the benefits of the Internet and other infonnation technologies. While Electronic Commerce continues to grow there is a corresponding impact on computer software and individual privacy (Ghosh and Swaminatha, 200 I). Recently. the U.S. National Institute of Standards and Technology (NIST) found that software bugs cost the U.S. economy approximately $59.5 billion, or .600/0 of the annual Gross Domestic Product (U.S. Department of Commerce, 2003). In addition, we have witnessed a rise in the strength and impact of Denial of Service and other types of computer attacks such as: viruses. trojans. exploit scripts and probes/scans. Popular industry surveys such as the annual Federal Bureau of Investigation/Computer Security Institute (Gordon. Et. AI.. 2006) confirm the growing threats in the Information Assurance field. In addition to these concerns our increased reliance on the Internet enabled systems (loudon and loudon. 2000). E-Commerce systems and Information Technologies an integrated suite of risks which must be managed effectively across the public and private sectors (Backhouse. Et. AI. 2005. Ghosh and Swamintha. 200 I. Parker. 200 I. Graf. 1995. Greenberg and Goldman, 1995). Previous research (Rumizen, 1998. Haver, 1998, Roulier, 1998) examined InterOrganisational, Web Infonnation Systems and Government Information Systems in order to assess how companies and other organisations can effectively design these information systems such that maximum benefits can be achieved for all participating organisations. Furthermore, Davenport, Harris and Delong (2001) and Davenport (1999) explained that collaboration is central to the results of a knowledge management system in which open, nonpolitical, non-competitive entities are involved in environments to achieve optimal individual and collective results. Before this memorable event. some related programmatic initiatives were already in-process at that time. The United States government built upon its active leadership in the areas of computer security and information assurance when it launched a number of important efforts to manage information security threats. This was clearly evident when President Clinton made the U.S. National Infrastructure (Nil) a major national priority in the 1 990s. One critical development occurred in 1998 when the National Infrastructure Protection Centre was established to be the central point for gathering, analysing and disseminating critical cyber security information and built upon the previous success of the national Computer Emergency Response Team (CERT). Earlier research (Rich. 2001, Soo Hoo, 2000. Howard. 1997 and Landwher, 1994) addressed various aspects of information security information and incident reporting. Also. Vatis 0001) addressed some research considerations in this area while investigating foreign network centric and traditional warfare events primarily through Denial of Service and Web Site Defacement attacks. However. areas for new exploration existed especially as they related to U.S. critical infrastructure protection (Karestand. 2003. Vatis. 200 I. U.S. General Accounting Office. 2000. Alexander and Swetham. 19(9). Finally. Information and Network Centric Warfare (Arens and Rosenbloom. 2003. Davies. 2000. Denning and Baugh. 2000. and Schwartau. 1997) are increasing national security issues in the \\' ar on Terrorism and Homeland Security in general
A Comparative Case Study of American and Ugandan Refugee Policies
This research was conducted in order to expand upon current understandings of the policies affecting refugees in Uganda and the United States (U.S.). Appreciating both policies and implementation strategies for each country is critical in providing the ability to fully grasp the reality of the refugee crisis faced by countries all over the world.
This study employed field-based research, including observations, focus groups, and interviews with refugees and those who implement refugee policies. Non-governmental organizations (NGOs) and implementing partners of the United Nations High Commissioner for Refugees (UNHCR) in Uganda were interviewed, along with officers and commandants in the Office of the Prime Minister. Research was conducted within Kampala, Nakivale Refugee Settlement, and Bidi Bidi, the largest refugee camp in the world. Virtual interviews assisted in collecting information concerning U.S. policy. Additionally, a thorough exploration of the legal frameworks through which refugees exist, both in the U.S. and Uganda, was conducted through documentary research.
Preliminary research found that America and Uganda maintain distinctly different refugee policies. America’s Refugee Act of 1980 focuses exclusively on resettlement. This contrasts with Uganda’s Refugee Act of 2006, which emphasizes local integration and repatriation strategies. The research revealed that financial and infrastructure resource constraints, compounded by developmental obstructions, are among the most important implementation issues affecting refugees, especially in Uganda. These challenges highlight the complex nature of implementing refugee policy, as well as the intricate relationship that refugees have with national development
- …