July 2009 1663 Los Alamos Science and Technology Magazine July 2009 the Complicated Network of Transmission a Very Chilly –300°F, to Become Superconducting

Total Page:16

File Type:pdf, Size:1020Kb

July 2009 1663 Los Alamos Science and Technology Magazine July 2009 the Complicated Network of Transmission a Very Chilly –300°F, to Become Superconducting loslos alamos alamos science science and and technology technology magazine magazine JUJULYLY 20 20 09 09 Wired for the Future Cyber Wars Have SQUIDs, Will Travel 1663 A Trip to Nuclear North Korea About Our Name: during World War ii, all that the 1663outside world knew of los alamos and its top-secret table of contents laboratory was the mailing address—P. o. Box 1663, santa Fe, new mexico. that box number, still part of our address, symbolizes our historic role in the nation’s from terry wallace service. PrINcIPaL aSSocIatE DIrEctor For ScIENcE, tEchNoLogy, aND ENgINEErINg located on the high mesas of northern new mexico, los alamos national laboratory was founded in 1943 to build the first atomic bomb. it remains a premier scientific laboratory, dedicated to national security in its broadest the Scientist Envoy INSIDE FroNt coVEr sense. the laboratory is operated by los alamos national security, llc, for the department of energy’s national nuclear security administration. features About the Cover: artist’s conception of a hacker’s “trojan horse,” in cyberspace. los alamos fights an mosArchive unending battle against trojan horses, worms, and la other forms of malicious software but is spearheading LosA research to play offense rather than defense in the Wired for the Future 2 During the Manhattan Project, Enrico Fermi, Nobel Laureate and leader of SUPErcoNDUctINg WIrES MIght traNSForM ENErgy DIStrIBUtIoN ongoing cyber wars. F-Division, meets with San Ildefonso Pueblo’s Maria Martinez, famous worldwide for her extraordinary black pottery. from terry wallace cyber Wars The Scientist Envoy 6 thE UNENDINg BATTLE For coNtroL Since the middle of the His direct experience with both plutonium metallurgy nineteenth century and the and international diplomacy have allowed him to days of Mendeleev, Darwin, communicate with the North’s weapons scientists, Pasteur, and Maxwell, obtain accurate information about the country’s scientists have helped to plutonium capabilities, and report his findings to the have SQUIDs, Will travel 12 better society. Their theories United States government. In an exclusive interview thE WorLD’S BESt MagNEtIc-FIELD SENSorS For MEDIcINE aND hoMELaND SEcUrIty and discoveries underlie all of today’s technologies, with this magazine, Hecker recalls his experiences in and increasingly, society is turning to them to help nuclear North Korea. dialogue find long-term solutions to tomorrow’s environmental, Today, Los Alamos’ scientific staff members social, and security challenges. continue to support numerous nuclear nonproliferation Scientists at Los Alamos National Laboratory activities, for example, monitoring seismic activity readily shoulder this responsibility. Evidence for to detect underground nuclear tests. They design that can be seen throughout this issue of 1663, systems to safeguard nuclear facilities, as exemplified a trip to Nuclear North Korea 18 which highlights efforts to develop superconducting by the work of Howard Menlove, the world’s expert ForMEr DIrEctor SIg hEcKEr oPENS DoorS IN yoNgByoN transmission lines, perfect new medical imaging on measuring neutrons from radioactive materials. technologies, and safeguard computer networks. Each Menlove designed instruments to monitor operations of those efforts has the potential to contribute greatly and nuclear materials at North Korea’s Yongbyon spotlight to society and national security. reactor. In the area of diplomacy, George Eccleston But scientists also form a unique community. was a technical expert at the Six-Party Talks, a role All hold a rational view of the natural world and, now filled by Los Alamos scientist Kevin Veal. regardless of their native tongue, speak the universal As the premier national security science hoW to BraKE aN EPIDEMIc 25 language of mathematics. They relate to one another Laboratory, Los Alamos is a continuing source MEaSUrINg thE VarIaBLE STARS so that, on occasion, scientists can play a special role, of diverse and important contributions. Those that of the unofficial envoy, called upon to help society contributions, whether technical, social, or confront a difficult situation. diplomatic, will arise from the talents of one of our North Korea’s development of nuclear weapons is nation’s great assets—its scientists. one example. Since 2004, former Los Alamos Director Sig Hecker has gone to that country several times in the capacity of technical advisor to verify North Korea’s ability to make and purify plutonium. 1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 The complicated network of transmission a very chilly –300°F, to become superconducting. To lines that brings electricity from energy sources to the cool an underground cable (current ones typically are user has dramatically changed its topology since the only a half mile long), liquid nitrogen enters the cable 1970s. Power plants that traditionally served local at 68K and warms to about 72K as it flows along the WIRED areas became part of a large interconnecting network of cable to the other end. It is then taken out of the cable hubs and spokes, with power plants and transmission and recooled. This scheme, which uses the specific heat lines fanning out to multiple population centers, many of liquid nitrogen for cooling, requires recooling after of which are connected to multiple power plants. The no more than a mile, making it uneconomical for long, interconnectedness has tended to make the grid more overhead cable runs. reliable because failures in individual power lines don’t Ashworth has demonstrated an alternative scheme bring the system down. that requires a cooling plant only once every 40 miles. for the future The trouble is that investments in transmission lines Each plant takes in air, cools it, and produces liquefied Superconducting Wires Might Transform Energy Distribution have not always kept up with the addition of new power nitrogen at 77K and 4 times atmospheric pressure. In plants, especially in congested areas. No one wants one design, the liquid nitrogen would run through a a power line in the backyard, so new lines can take perforated flexible-metal cooling tube alongside the the recent successes of underground 7 to 10 years to site and string. The National Energy superconducting wire. All would be encased in a long superconducting power lines and the Regulatory Commission reports that 25,000 miles of cryostat (vacuum-walled piping). The pressurized liquid new high-voltage lines are planned for construction nitrogen would spray out of its piping, vaporizing as it advent of second-generation, potentially over the next 10 years, but historically, only a small cools the nearby wire to superconducting temperatures. cost-competitive superconducting fraction of lines planned are actually built. If renewable The vapor would then exit from engineered vents every wires may well be a prelude to a bigger sources of electricity (wind farms and solar arrays) few miles. The conceptual difference is the use of the revolution in our nation’s power grid. increase as expected, most will be located far from liquid nitrogen coolant’s latent heat of vaporization, major population centers and will require at least as well as its specific heat, and that difference makes another 12,000 miles of new lines. overhead lines feasible. Steve Ashworth, leader of the applications team Says Ken Marken, head of the STC, “Steve’s out-of- at the Los Alamos Superconductivity Technology the box thinking is what’s needed if superconducting Center (STC), sees opportunity in these challenges. technology is to be a major player in the next 20 years.” steve Ashworth has invented a cooling Superconducting wires, which are just now being Because superconducting lines could transmit scheme produced in kilometer lengths (just over a half mile), power with a significantly lower visual impact than can carry massive amounts of electric power with conventional high-voltage power lines, Ashworth thinks almost no energy loss. Ashworth wants to run these they would be more acceptable to the public and would wires overhead to minimize the environmental impact reduce—by years—the delay for obtaining permits. of new high-power lines that must run for hundreds Even more important, bringing one large wind-power of miles. Superconducting wires would carry generating facility online a year earlier, and using it to much more current and much lower voltage replace a coal-fired generator, would eliminate up to and so could be strung on much shorter, 4 million tons of CO2 emissions. A superconducting grid less intrusive poles than are used for could help power a green revolution. conventional high-power lines. However, superconducting First Trials wire has to be cooled below Almost 100 years ago, 90 degrees Kelvin (90K), mercury was found to be superconducting at 4K (–453°F), and since then, scientists have finessed hundreds of elements and compounds into exhibiting superconductivity. Starting in 1986 a class of compounds called copper oxide Three high-temperature superconducting power lines enter an underground right of way on Long island, New York. switched on in April 2008, the lines carry almost 600 megawatts of power, as much as all the 1663 los alamos science and technology magazine july 2009 1663 los alamos science and technology magazine july 2009 2 3 perovskites were found to become superconducting at The Long Shot Los Alamos’ Yates coulter checks the quality and temperatures about 100 degrees higher than mercury Another possible high-temperature superconductor uniformity of long tapes for a number of compa- does. That meant cooling costs would be 1,000 times was yttrium barium copper oxide (YBCO), discovered lower, a giant advantage in any application. These new in 1987. This was the first compound found to be nies. his cassettelike machine passes each tape, “high-temperature” superconductors promised to fulfill superconducting at temperatures above that of liquid inch by inch, through two external magnetic fields, the dream of lossless power transmission. nitrogen.
Recommended publications
  • Guppy Color Strains
    Guppy Color Strains Guppy Color Strains Philip Shaddock Third Edition June 2012 v | Table of Contents Guppy Color STrains | v Guppy Color Strains © 2000 - 2012 Philip Shaddock This book is copyrighted and may not be reproduced in whole or in part. If you wish to quote more than a few lines from the book or use any of its fig- ures, graphics or images, please contact Philip Shaddock through the Guppy Designer website: www.guppydesigner.com. If you find inaccuracies or mistakes in the book, please contact Philip Shaddock through the Guppy Designer site. Your help would be very much appreciated. Contact Philip Shaddock at: www.guppydesigner.com 10 9 8 7 6 5 4 3 2 1 ISBN 978-0-9865700-0-1 v | Table of Contents Guppy Color STrains | v Contents Preface 13 1 Moscows 17 The Moscow in the Rest of the World . 18 Moscow Color and Genetics . 19 Breeding the Moscow . 21 Blue Moscow . 23 Albino Blue Moscow . 24 Blond Blue Moscow . 24 Asian Blau Blue Moscow . 25 Golden Blue Moscow . 26 Green Moscow . 27 Purple Moscow . 27 Full Red Moscow . 28 Half-Black Red Moscow . 29 Albino Full Red Moscow . 30 Golden Red Moscow . 31 Midnight Black Moscow . 31 Albino Midnight Black . 33 Golden Midnight Black . 34 Half Black Moscow . 34 Stoerzbach Moscow . 36 Pink White Moscow . 37 vivii | Table of Contents Guppy Color STrains | viivi Full Gold Moscow . 38 Blue Grass Moscow . 39 Leopard (Grass) Moscow . 40 Carnation Moscow . 41 Moscow Fire Tail . 43 WREA Full Pearl Moscow . 43 2 Metal Heads 45 Cobra Metal Heads .
    [Show full text]
  • Enhancement of Udc Data for Use and Sharing in A
    Enhancement of UDC data for use and sharing in a networked environment: [presentation at the Librarian Workshop in conjunction with "The 31st Annual Conference of the German Classification Society on Data Analysis, Machine Learning, and Applications", March 7-9, 2007, Freiburg i. Br., Germany] Item Type Presentation Authors Slavic, Aida; Cordeiro, Maria Inês; Riesthuis, Gerhard Citation Enhancement of UDC data for use and sharing in a networked environment: [presentation at the Librarian Workshop in conjunction with "The 31st Annual Conference of the German Classification Society on Data Analysis, Machine Learning, and Applications", March 7-9, 2007, Freiburg i. Br., Germany] 2007, Download date 02/10/2021 10:10:37 Link to Item http://hdl.handle.net/10150/105770 Librarian Workshop 8 March 2007 The 31st Annual Conference of the German Classification Society on Data Analysis, Machine Learning, and Applications, March 7-9, 2007, Freiburg i. Br., Germany ENHANCEMENT OF UDC DATA FOR USE AND SHARING IN A NETWORKED ENVIRONMENT Aida Slavic Maria Ines Cordeiro Gerhard Riesthuis MAIN POINTS UDC facts update Logic behind the synthetic structure UDC number building and authority control Improvement of data Data development roadmap UNIVERSAL DECIMAL CLASSIFICATION (UDC) classification system created to support • detailed document indexing in bibliographies • broad collocation of subject vocabulary – current database “UDC MRF - Master Reference File” contains 67.600 classes covers the whole universe of knowledge hierarchical, analytico-synthetic,
    [Show full text]
  • Creation and Resilience of Decentralized Brands: Bitcoin & The
    Creation and Resilience of Decentralized Brands: Bitcoin & the Blockchain Syeda Mariam Humayun A dissertation submitted to the Faculty of Graduate Studies in partial fulfillment of the requirements for the degree of Doctor of Philosophy Graduate Program in Administration Schulich School of Business York University Toronto, Ontario March 2019 © Syeda Mariam Humayun 2019 Abstract: This dissertation is based on a longitudinal ethnographic and netnographic study of the Bitcoin and broader Blockchain community. The data is drawn from 38 in-depth interviews and 200+ informal interviews, plus archival news media sources, netnography, and participant observation conducted in multiple cities: Toronto, Amsterdam, Berlin, Miami, New York, Prague, San Francisco, Cancun, Boston/Cambridge, and Tokyo. Participation at Bitcoin/Blockchain conferences included: Consensus Conference New York, North American Bitcoin Conference, Satoshi Roundtable Cancun, MIT Business of Blockchain, and Scaling Bitcoin Tokyo. The research fieldwork was conducted between 2014-2018. The dissertation is structured as three papers: - “Satoshi is Dead. Long Live Satoshi.” The Curious Case of Bitcoin: This paper focuses on the myth of anonymity and how by remaining anonymous, Satoshi Nakamoto, was able to leave his creation open to widespread adoption. - Tracing the United Nodes of Bitcoin: This paper examines the intersection of religiosity, technology, and money in the Bitcoin community. - Our Brand Is Crisis: Creation and Resilience of Decentralized Brands – Bitcoin & the Blockchain: Drawing on ecological resilience framework as a conceptual metaphor this paper maps how various stabilizing and destabilizing forces in the Bitcoin ecosystem helped in the evolution of a decentralized brand and promulgated more mainstreaming of the Bitcoin brand. ii Dedication: To my younger brother, Umer.
    [Show full text]
  • AMT Model Kits
    AMT Model Kits CARS — 1/16 SCALE CARS — 1/25 SCALE (Cont) CARS — 1/25 SCALE (Cont) 872 1965 Ford Mustang $39.99 841 2013 Chevy Camaro ZL1 898 1969 Mercury Cougar $22.99 Showroom Replica $21.99 1005 ‘55 Chevy Nomad Wagon 38.99 899 1937 Chevy Coupe 24.99 849 ‘68 Plymouth Roadrunner-yellow 23.99 900 Piranha Spy Car 23.99 850 ‘40 Ford Coupe—orange 22.99 , 854 Baldwin Motion 872 ‘70 1/2 Chevy Camaro—white 21.99 855 Baldwin Motion 900 ‘70 1/2 Chevy Camaro—dk green 21.99 860 Nestle 1923 Ford Model T Delivery 23.99 CARS — 1/20 SCALE 861 ‘63 Chevy Corvette 22.99 1030 ‘94 Chevy Camaro Conv. 26.99 902 1932 Ford Victoria 25.99 862 ‘51 Chevy Bel Air 21.99 CARS — 1/25 SCALE 904 1966 Ford Galaxie 23.99 634 ‘68 Shelby GT500 15.99 906 1941 Ford Woody 24.99 635 ‘70 1/2 Camaro Z28 15.99 907 Tee Vee Dune Buggy 23.99 636 ‘66 Chevy Nova Pro Street 15.99 638 ‘57 Bel Air 15.99 862 671 2010 Dodge Challenger R/T 907 Classic 19.99 704 ‘66 Ford Mustang 21.99 729 Buick Opel GT- white 864 ‘97 Ford Mustang GT 21.99 Original Art Series 24.99 865 ‘62 Chevy Bel Air SS 409 908 Li’l Hot Dogger Show Rod 26.99 730 ‘40 Ford Coupe –white Joe Gardner Racing 22.99 Original Art Series 22.99 868 ‘68 Chevy Camaro Z/28 21.99 750 Ghostbusters Ecto-1A 22.99 871 Jack Reacher 768 ‘75 Gremlin 21.99 ‘70 Chevy Chevelle SS 23.99 908 873 Chevy CheZoom Corvair F/C 24.99 876 1967 Chevy Chevelle Pro Street 21.99 768 909 USA-1 1963 Chevy Corvette 22.99 910 1953 Chevy Corvette 23.99 912 ‘69 Mercury Cougar—orange 22.99 876 916 Piranha Spy Car Original Art Series 26.99 769 Gene Winfield ‘40 Ford Sedan 917 1964 Chevy Impala 22.99 Delivery 22.99 919 1941 Plymouth Coupe 21.99 772 ‘66 Chevy Nova-Bill Jenkins 24.99 920 1971 Ford Thunderbird 25.99 791 The Three Stooges ‘40 Ford Sedan 877 1953 Studebaker Starliner Delivery 22.99 “Mr.
    [Show full text]
  • Weekly Edition 31 of 2021
    Notices 3062 -- 3147/21 ADMIRALTY NOTICES TO MARINERS Weekly Edition 31 05 August 2021 (Published on the ADMIRALTY website 26 July 2021) CONTENTS I Explanatory Notes. Publications List II ADMIRALTY Notices to Mariners. Updates to Standard Nautical Charts III Reprints of NAVAREA I Navigational Warnings IV Updates to ADMIRALTY Sailing Directions V Updates to ADMIRALTY List of Lights and Fog Signals VI Updates to ADMIRALTY List of Radio Signals VII Updates to Miscellaneous ADMIRALTY Nautical Publications VIII Updates to ADMIRALTY Digital Services For information on how to update your ADMIRALTY products using ADMIRALTY Notices to Mariners, please refer to NP294 How to Keep Your ADMIRALTY Products Up--to--Date. Mariners are requested to inform the UKHO immediately of the discovery of new or suspected dangers to navigation, observed changes to navigational aids and of shortcomings in both paper and digital ADMIRALTY Charts or Publications. The H--Note App helps you to send H--Notes to the UKHO, using your device’s camera, GPS and email. It is available for free download on Google Play and on the App Store. The Hydrographic Note Form (H102) should be used to forward this information and to report any ENC display issues. H102A should be used for reporting changes to Port Information. H102B should be used for reporting GPS/Chart Datum observations. Copies of these forms can be found at the back of this bulletin and on the UKHO website. The following communication facilities are available: NMs on ADMIRALTY website: Web: admiralty.co.uk/msi Searchable Notices to Mariners: Web: www.ukho.gov.uk/nmwebsearch Urgent navigational information: e--mail: [email protected] Phone: +44(0)1823 353448 +44(0)7989 398345 Fax: +44(0)1823 322352 H102 forms e--mail: [email protected] (see back pages of this Weekly Edition) Post: UKHO, Admiralty Way, Taunton, Somerset, TA1 2DN, UK All other enquiries/information e--mail: [email protected] Phone: +44(0)1823 484444 (24/7) Crown Copyright 2021.
    [Show full text]
  • Weekly Edition 33 of 2020
    Notices 3878 -- 3974/20 ADMIRALTY NOTICES TO MARINERS Weekly Edition 33 13 August 2020 (Published on the ADMIRALTY website 03 August 2020) CONTENTS I Explanatory Notes. Publications List II ADMIRALTY Notices to Mariners. Updates to Standard Nautical Charts III Reprints of NAVAREA I Navigational Warnings IV Updates to ADMIRALTY Sailing Directions V Updates to ADMIRALTY List of Lights and Fog Signals VI Updates to ADMIRALTY List of Radio Signals VII Updates to Miscellaneous ADMIRALTY Nautical Publications VIII Updates to ADMIRALTY Digital Services For information on how to update your ADMIRALTY products using ADMIRALTY Notices to Mariners, please refer to NP294 How to Keep Your ADMIRALTY Products Up--to--Date. Mariners are requested to inform the UKHO immediately of the discovery of new or suspected dangers to navigation, observed changes to navigational aids and of shortcomings in both paper and digital ADMIRALTY Charts or Publications. The H--Note App helps you to send H--Notes to the UKHO, using your device’s camera, GPS and email. It is available for free download on Google Play and on the App Store. The Hydrographic Note Form (H102) should be used to forward this information and to report any ENC display issues. H102A should be used for reporting changes to Port Information. H102B should be used for reporting GPS/Chart Datum observations. Copies of these forms can be found at the back of this bulletin and on the UKHO website. The following communication facilities are available: NMs on ADMIRALTY website: Web: admiralty.co.uk/msi Searchable Notices to Mariners: Web: www.ukho.gov.uk/nmwebsearch Urgent navigational information: e--mail: [email protected] Phone: +44(0)1823 353448 +44(0)7989 398345 Fax: +44(0)1823 322352 H102 forms e--mail: [email protected] (see back pages of this Weekly Edition) Post: UKHO, Admiralty Way, Taunton, Somerset, TA1 2DN, UK All other enquiries/information e--mail: [email protected] Phone: +44(0)1823 484444 (24/7) Crown Copyright 2020.
    [Show full text]
  • Orchestrating Public Opinion
    Paul ChristiansenPaul Orchestrating Public Opinion Paul Christiansen Orchestrating Public Opinion How Music Persuades in Television Political Ads for US Presidential Campaigns, 1952-2016 Orchestrating Public Opinion Orchestrating Public Opinion How Music Persuades in Television Political Ads for US Presidential Campaigns, 1952-2016 Paul Christiansen Amsterdam University Press Cover design: Coördesign, Leiden Lay-out: Crius Group, Hulshout Amsterdam University Press English-language titles are distributed in the US and Canada by the University of Chicago Press. isbn 978 94 6298 188 1 e-isbn 978 90 4853 167 7 doi 10.5117/9789462981881 nur 670 © P. Christiansen / Amsterdam University Press B.V., Amsterdam 2018 All rights reserved. Without limiting the rights under copyright reserved above, no part of this book may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the written permission of both the copyright owner and the author of the book. Every effort has been made to obtain permission to use all copyrighted illustrations reproduced in this book. Nonetheless, whosoever believes to have rights to this material is advised to contact the publisher. Table of Contents Acknowledgments 7 Introduction 10 1. The Age of Innocence: 1952 31 2. Still Liking Ike: 1956 42 3. The New Frontier: 1960 47 4. Daisies for Peace: 1964 56 5. This Time Vote Like Your Whole World Depended On It: 1968 63 6. Nixon Now! 1972 73 7. A Leader, For a Change: 1976 90 8. The Ayatollah Casts a Vote: 1980 95 9. Morning in America: 1984 101 10.
    [Show full text]
  • Malware – Future Trends Dancho Danchev Dancho.Danchev at Hush.Com Ddanchev.Blogspot.Com
    Malware – future trends Dancho Danchev dancho.danchev AT hush.com ddanchev.blogspot.com 1. Intro 2. Scope 3. Author’s comments 4. The current state of the malware threat - Where the metrics are! - Use and abuse of malware - DDoS extortion - DDoS on demand/hire - Botnets and zombie hosts - Pay-Per-Click-Hijacking - Cryptoviral extortion, Ransomware - Platform for dissemination of other junk - Mass identity theft and financial abuse - Around the industry 5. Factors contributing to the rise and success of malware - Documentation and howto’s transformed into source code - Vulnerabilities, even patches, easily turned into exploits - Clear signs of consolidation on the malware scene - The media as a fueling factor for growth - Over 960M unique Internet users and their connectivity, or purchasing power - The demand for illegal services 6. Future trends - Mobile malware will be successfully monetized - Localization as a concept will attract the coders’ attention - Open Source Malware - Anonymous and illegal hosting of (copyrighted) data - The development of Ecosystem - Rise in encryption and packers - 0day malware on demand - Cryptoviral extortion / Ransomware will emerge - When the security solutions ends up the security problem itself - Intellectual property worms - Web vulnerabilities, and web worms – diversity and explicit velocity - Hijacking botnets and infected PCs - Interoperability will increase the diversity and reach of the malware scene 7. Conclusion 01. Intro Malware has truly evolved during the last couple of years. Its potential
    [Show full text]
  • Generations of Service
    Generations of Service Laura E. Yardley Generations of Service Laura E. Yardley 2008 COVER PHOTO: CMSgt. Ralph “Bucky” Dent (left) and son TSgt. Jason Dent at an undisclosed location. Foreword If imitation is the sincerest form of flattery, then certainly any parent, broth- er, sister or cousin, aunt or uncle is honored to see a loved family member follow in his or her footsteps to military service. In old Europe it was traditionally the second son, since only the eldest could inherit the land. But in America the oppor- tunity is there for any fledgling to dream, “I want to serve in the Air Force, just like my Uncle/Brother/ Grandfather Bob.” Few are more aware of the demands of military service than those who serve, so to have a loved one make the com- mitment can be bittersweet—on the one hand a joy and honor; on the other the knowledge that it can be too frequently a tough way to make a living. In this short study you will meet several such families, and you will learn about their relationships and the reasons some have seen a clear path that has been forged by the generations ahead of them. Myriad reasons motivate these multiple generations of Airmen, some of which are clearly expressed, while others are just felt: honor, pride, responsibility, patriotism, courage. The author herself is expe- riencing the family tie of common service: she served as an active duty, now reserve, officer; her husband served as an active duty enlisted man and officer and is now an Air Force civilian.
    [Show full text]
  • Department of State Office of Protocol; Gifts to Federal Employees from Foreign Government Sources Reported to Employing Agencies in Calendar Year 1999; Notice
    Friday, March, 24, 2000 Part II Department of State Office of Protocol; Gifts to Federal Employees From Foreign Government Sources Reported to Employing Agencies in Calendar Year 1999; Notice VerDate 20<MAR>2000 15:47 Mar 23, 2000 Jkt 190000 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\24MRN2.SGM pfrm03 PsN: 24MRN2 15936 Federal Register / Vol. 65, No. 58 / Friday, March, 24, 2000 / Notices DEPARTMENT OF STATE statements which, as required by law, Publication of this listing in the Federal employees filed with their Federal Register is required by Section [Public Notice 3250] employing agencies during calendar 7342(f) of Title 5, Unites States Code, as year 1999 concerning gifts received from added by Section 515(a)(1) of the Office of Protocol; Gifts to Federal foreign government sources. The Foreign Relations Authorization Act, Employees From Foreign Government compilation includes reports of both Fiscal Year 1978 (Public Law 95±105, Sources Reported to Employing tangible gifts and gifts of travel or travel August 17, 1977, 91 Stat. 865). Agencies In Calendar Year 1999 expenses of more than minimal value, Dated: March 10, 2000. The Department of State submits the as defined by statute. Bonnie Cohen, following comprehensive listing of the Under Secretary for Management. REPORT OF TANGIBLE GIFTS Gift, date of acceptance on behalf Name and title of person accepting of the U.S. Government, esti- Identity of foreign donor and gov- Circumstances justifying accept- the gift on behalf of the U.S. Gov- mated value, and current disposi- ernment ance ernment tion or location Executive Office of The President President .......................................
    [Show full text]
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
    THE NATIONAL ACADEMIES PRESS This PDF is available at http://nap.edu/12651 SHARE Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities DETAILS 390 pages | 6x9 | PAPERBACK ISBN 978-0-309-13850-5 | DOI 10.17226/12651 AUTHORS BUY THIS BOOK William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors; Committee on Offensive Information Warfare; National Research Council FIND RELATED TITLES Visit the National Academies Press at NAP.edu and login or register to get: – Access to free PDF downloads of thousands of scientific reports – 10% off the price of print titles – Email or social media notifications of new titles related to your interests – Special offers and discounts Distribution, posting, or copying of this PDF is strictly prohibited without written permission of the National Academies Press. (Request Permission) Unless otherwise indicated, all materials in this PDF are copyrighted by the National Academy of Sciences. Copyright © National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of CYBerattacK CapaBILITIes William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences Copyright National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Gov- erning Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engi- neering, and the Institute of Medicine.
    [Show full text]
  • Patriotic Hackers from China, Russia, and Elsewhere
    Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications Thomas J. Holt Michigan State University, USA Bernadette H. Schell Laurentian University, Canada InformatIon scIence reference Hershey • New York Director of Editorial Content: Kristin Klinger Director of Book Publications: Julia Mosemann Acquisitions Editor: Lindsay Johnston Development Editor: Joel Gamon Production Editor: Jamie Snavely Cover Design: Lisa Tosheff Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2011 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or com- panies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Corporate hacking and technology-driven crime : social dynamics and implications / Thomas J. Holt and Bernadette H. Schell, editors. p. cm. Includes bibliographical references and index. Summary: "This book addresses various aspects of hacking and technology- driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher. ISBN 978-1-61692-805-6 (hbk.) -- ISBN 978-1-61692-807-0 (ebook) 1. Computer crimes. 2. Computer hackers.
    [Show full text]