Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1904 Full-Text Articles 1591 Authors 886959 Downloads 114 Institutions

All Articles in National Security Law

Faceted Search

1904 full-text articles. Page 7 of 63.

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene 2016 Advanced Technology Insights, LLC (ATI)

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame 2016 University of Tennessee

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Student Competition Cover, 2016 University of Tennessee, Knoxville

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed 2016 University of Dhaka

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen 2016 Korea Advanced Institute of Science and Technology

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein 2016 University of Tennessee, Knoxville

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa 2016 Department of Nuclear Engineering and Engineering Physics, Universitas Gadjah Mada, Yogyakarta, Indonesia

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to ...


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan 2016 National Nuclear Energy Agency of Indonesia (BATAN)

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath 2016 Nuclear Security Science & Policy Institute, Department of Nuclear Engineering Texas A&M University, College Station, TX-77843-3473, USA

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga 2016 Installation and Licensing Directorate of Nuclear Material Nuclear Energy Agency

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear ...


Table Of Contents, 2016 University of Tennessee, Knoxville

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk, 2016 University of Tennessee, Knoxville

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr 2016 The University of the Witwatersrand, Johannesburg

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Emigration, Repatriation And The Reality Of Returned Youth In El Salvador, Isabel C. Duarte Vasquez 2016 The University of San Francisco

Emigration, Repatriation And The Reality Of Returned Youth In El Salvador, Isabel C. Duarte Vasquez

Master's Theses

According to US Customs and Border Protection, over 59 thousand unaccompanied minors from the Northern Triangle (Guatemala, Honduras and El Salvador) have been detained at the US border, of those 59 thousand, 17 thousand are from El Salvador. El Salvador is home to some of the most dangerous and ruthless gangs of the twenty-first century. Their ruthlessness comes from 1980s guerrilla warfare experience. In addition, El Salvador serves as a transshipment point for illicit substances from South America into Mexico. These dynamics fuel the homicide rate of the region as local gang members must protect their territory by any means ...


Surveillance’S Future: A Pragmatic Take From The Center For A New American Security, Peter Margulies 2016 Roger Williams University School of Law

Surveillance’S Future: A Pragmatic Take From The Center For A New American Security, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber 2016 Brooklyn Law School

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


If We Don’T Bring Them To Court, The Terrorists Will Have Won: Reinvigorating The Anti-Terrorist Act And General Jurisdiction In A Post-Daimler Era, Stephen J. DiGregoria 2016 Brooklyn Law School

If We Don’T Bring Them To Court, The Terrorists Will Have Won: Reinvigorating The Anti-Terrorist Act And General Jurisdiction In A Post-Daimler Era, Stephen J. Digregoria

Brooklyn Law Review

Prior to the Supreme Court's recent general personal jurisdiction decisions in Daimler AG v. Bauman and Goodyear Dunlop Tires Operations S.A. v. Brown American terror victims, injured in terror attacks abroad, were able to bring their attackers and those who sponsor them into United States courts for relief. Specifically, groups like the Palestine Liberation Organization (the PLO) and the Palestinian Authority (the PA) had a history of being sued by American victims of terror. In the course of these suits, the PLO and the PA were regularly found subject to the personal jurisdiction of U.S. courts under ...


Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed 2016 University of Dhaka

Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed

International Journal of Nuclear Security

Bangladesh uses category I of nuclear materials and category 1-5 of radioactive materials in the field of research, medical and industries. The Government is going to implement its first nuclear power plant under an IGA between the Bangladesh and Russian Governments. With the emerging global nuclear and radiological terrorism by potential adversaries, enhancing nuclear security is the paramount importance for the country. The paper has found no established communication channels among stakeholders in order to work in a coordinated and collaborative manner for strengthening the nuclear security. This has resulted lacking importance of education, research, training and knowledge management initiatives ...


Ijns Masthead, 2016 University of Tennessee, Knoxville

Ijns Masthead

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor - Choe, Kwan Kyoo CHOE 2016 Korea Institute of Nuclear Nonprolieration and Control

Letter From The Editor - Choe, Kwan Kyoo Choe

International Journal of Nuclear Security

No abstract provided.


Digital Commons powered by bepress