Applying Digital Library Technologies to Nuclear Forensics
|
|
|
- Wendy Sherman
- 10 years ago
- Views:
Transcription
1 Applying Digital Library Technologies to Nuclear Forensics Electra Sutton, Chloe Reynolds, Fredric C. Gey, Ray R. Larson School of Information and UC Data University of California, Berkeley Berkeley, California, USA, chloe Abstract. Digital Libraries will enhance the value of forensic endeavors if they provide tools that enable data mining capabilities. In fact, collecting data without such tools can result in investigators becoming overwhelmed. Currently, the quantity of highly dangerous radioactive materials is increasing with the advancement of civilizations scientific inventions. This creates a demand for an equivalently sophisticated forensics capability that prevents misuse and brings malicious intent to justice. Our forensics approach applies digital library and data mining techniques. Specifically, the forensic investigator will utilize our digital library system which has been enhanced with advanced data mining query tools in order to determine attribution of material to their geographic sources and threat levels, enabling tracing and rating of smuggling activities. 1 Introduction Radioactive materials can cause harm in many ways, from poisoning to bombs. Today these materials are abundantly applied in the medical, energy, weapons, and space exploration fields. Keeping populations safe from their malicious use is the job of forensic investigators worldwide. Recent records from the Illicit Trafficking Database (ITDB) at the International Atomic Energy Agency (IAEA) show that high-value HEU (Highly Enriched Uranium), Pu, Cs-137, Am-241, Ir-192, Cr-60 and Sr-90 have been traded illegally [1]. Therefore, tracking these activities is urgent. A literature search [3] has revealed that neither the database research community nor the information retrieval research community are aware of the unique search challenges posed by the nuclear forensics identification problem. Each of these communities has significant resources which could be brought to bear in solving the fundamental problems of large-scale nuclear forensic discovery. Among other goals, a primary focus of this digital library is to interest these communities in the issues of nuclear forensic identification and to supply education. This is the first project of its kind to apply modern search technology to the nuclear forensics matching and identification problems. The methodologies explored (directed graph similarity, automatic classification, and rule-based
2 matching) are expected to break new ground in providing rigorously evaluated approaches to nuclear signature matching. Just as traditional forensics (fingerprint matching, DNA matching) benefited from algorithms developed by information search specialists in their area, we expect the area of nuclear forensics to be significantly improved by focused attention by researchers in the search area. In particular, the projects results should help support the work of the Nuclear Smuggling International Technical Working Group. In the remaining sections of the paper we provide descriptions of the data collections involved. Finally we explain the data mining techniques used and our implementation. In the conclusion we discuss future plans for the system. 2 Data Collections Since this digital library is about search and search evaluation, it is crucial to have some data upon which to evaluate the effectiveness of our methodologies. We expect to include, among others to be assembled, the following data sets: 1. Radioactive decay chain patterns. The unclassified Nuclear Structure and Decay Data (NuDat) data set [7] will be used to build graphs of radioactive decay. The data set contains over 165 thousand records of isotopes of elements, decay daughters, radiation type, half life and energy levels. 2. Location identification collections (a) Uranium Oxide Quality Control data set. This proprietary dataset from Lawrence Livermore National Laboratory contains principal components analysis to infer location from indicator trace elements which are geospecific [6]. The data set has 3,436 sample measurements for 21 sites. The data set has licensing restrictions but we are attempting to obtain access to the data. (b) Pit Manufacturing Measurements. Isotopic measurement records of pit manufacturing materials from the Plutonium Metal Standards Exchange Program at Los Alamos National Laboratory. The data consists of analytical measurements within and between worldwide laboratories. (c) Actinide measurement test results. This unclassified dataset is a report of all measurements made on actinide samples and contains the assay actinide and its isotopic and trace element amounts. It is produced by researchers from six national laboratories and the Atomic Weapons Establishment. 3. The Nuclear Fuel Cycle and Weapon Development Cycle [8]. The Pacific Northwest National Laboratory created it on behalf of the United States Department of Energy. Nuclear materials are naturally-occurring and can also be manufactured in a lab. Once obtained, either sort goes through any of various multi-stage processes to either become fuel or nuclear weapons material. This figure depicts the life cycle stages of both outcomes: fuel or weapon development. At each stage, the figure also names the processing facility types that convert materials from one stage to the next in the life cycle.
3 4. Facilities. The International Atomic Energy Agency (IAEA) lists of worldwide reactors. 3 Data Mining Technologies Our intent is to create a library of empirical radio chemical data with forensics capabilities in order to preserve public safety while accommodating the important utility of radioactive materials for medicine, energy and security. The nuclear materials addressed by our library collection are economically valuable commodities to criminals. As such, great resources are employed to smuggle nuclear materials to illicit customers who may have destructive or catastrophic objectives. To interfere with such aims, we utilize a digital library with advanced search capabilities. 3.1 Forensics Capacity In order to furnish the forensics community with suitable protective force, the system s design not only incorporates advanced digital library and search capabilities, but also incorporates the practices and protocols of forensics. A forensics operation is distinguished by requirements for provability, traceability and credibility. The results of a query must stand up in court since the goal of a forensics operation is to make a claim during judicial proceedings. Therefore our design focuses on technologies that would survive the scrutiny of trial court requirements and other legal proceedings. Also, our data sources must constitute a reliable, authoritative base. We use collections from certified national laboratories. The following technologies were selected by virtue of their traceability to authoritative sources and for their quantifiable characteristics that will be credible in court. 3.2 Technologies The data mining techniques employed are association relationships, a graph theory distance algorithm and rule-based classification. Each one was selected because it satisfies forensic practices and protocol requirement of reproducible results to which a subject matter expert witnesses can testify. 1. Relationship associations are utilized to make a conceptual link between the radiochemical properties of a nuclear material sample and where a sample lies in the Nuclear Fuel and Weapon Life Cycle corresponding to a threat level, as well as geographic origin, as discussed in the Data Collections section. These associations are drawn by using the transitive property of relationships using set operations and therefore can be demonstrated to have an irrefutable relationship.
4 2. The graph theory node distance algorithm identifies the threat level classification for nuclear materials. Node distance metrics determine the distance of a nuclear material s progress along the Nuclear Fuel and Weapon Life Cycle [8]. The lower the distance from current stage to end stage, the higher the threat level. 3. Rule-based data mining for classification of nuclear material signatures. This method is utilized to predict the radio chemical signatures of nuclear materials given temporal changes and the laws of radioactive decay. 4 Implementation 4.1 Attribution Implementation of the attribution search involves association relationships that are found by joining data sets on common instances with known class labels and with the set operation of transitivity. Attribution will be further explained below. Given chemical measurements of nuclear material samples, our digital library can return probabilistic geographic origin points and threat levels. Threat level refers to a material s position in the nuclear weapons life cycle, which begins at naturally-occurring Uranium and Thorium and progresses through various processes of enrichment - any of which has multiple stages - eventually becoming weapons grade material. Chemical measurements of samples reveal trace element signatures which correspond to particular geographic sites or regions. Specific sites hold facilities that are capable of certain material processing steps (mining, enriching, etc.). These processes are associated with specific stages of the weapons life cycle. The closer a material is to the weapons grade end stage of the weapons development life cycle, the higher that material s threat level is. By multiple association relationships and the transitive property then, a user can input a smuggled material s chemical composition as a query. The query result will be (attribution of) the material s probable geographic origin and threat level. 4.2 Threat Level Implementation of the search for a threat level of a nuclear material involves k-nearest neighbor distance computations [4] using the Nuclear Fuel Cycle and Weapons Development Process chart[8]. Considering each stage in this cycle as a node, node distance metrics can assign a numeric threat level to a given sample. The distance (in number of nodes) from a material s current state to the end state of weapons-grade material, determines its threat level; the smaller the distance, the more dangerous a material is. The distance attribute of this technique provides a compelling way to express viability of a material as a fuel or weapon and its threat level.
5 As mentioned in the previous section, the result of the relation association search is a point within the Nuclear Fuel Cycle and Weapons Development Process, e.g., chart position 5.10 Spent Fuel or Special Irradiated U Target Containing Pu. This point or position identifies the type of facility where a material with particular radio chemical properties would be found due to the manufacturing processes and development state of the material. The metric aspect is suitable for forensics practices since it makes the classification of a material s threat level measurable and illustratable in a courtroom setting. The threat level will also serve as a metric for the material s value as a commodity (to smugglers). 4.3 Rule-based Matching Any given nuclear material has a nuclide signature. This signature is determined by the properties of radioactive decay and fission. The training data set for our signature classifier is a set of measured quantities of isotopes and trace elements for particular nuclear material samples from well-established laboratories. This training set has created class labels for signatures, e.g., Highly Enriched Uranium (HEU) - more than 20 % of Pu and Low Enriched Uranium (LEU) - less than 4 % of Pu-240. Laboratory data is usually incomplete and contains anomalies such as disagreeing production date isotopic ratios. For those reasons, we will generate our own set of simulated measurements. In the paper Characterization of nuclear fuel using multivariate statistical analysis [5], the authors state, It is impractical to obtain such data from real nuclear fuel sample analyses. Instead, the ORIGEN-ARP code package (Bowman, 2000) was used to predict U and Pu isotopic compositions at various burn up values. In the AAAS/APS report on nuclear forensics [2], simulated data was also used to characterize different types of nuclear reactors. This simulated data set was generated by software called MCODE. MCODE is similar in function to ORIGEN-ARP but uses more computing resources because it implements a Monte Carlo method. For this project we expect to generate simulated data using one of the code packages mentioned above. We will build simulated decay chain graphs using the radioactive decay rules inferred from the NuDat database [7]. Our implementation will supplement the incomplete and anomalous laboratory measurements with our own simulated data. One note in composing classifications for forensic use of raw data is that the modeling process must be sensitive to unexpected values. Unexpected values are important as unique attributes which could be evidence to prove a case for particular events rather than for generalized scientific knowledge. Investigative practices that search for malicious intent are focused on finding singular activities that can be traced to particular perpetrators rather than finding general observations about a phenomenon.
6 5 Conclusion In this paper we have described the preliminary work being carried out on this project, and discussed some of design and search issues involved in nuclear forensics search. Our work in data collection, data mining and forensic matching algorithm creation is ongoing. We are in the process of collecting and indexing the various databases discussed in the Data Collections section and are investigating algorithms for graph-based search with time components. 6 Acknowledgements The work described in the paper is part of the grant ARI-MA: Recasting Nuclear Forensics Discovery as a Digital Library Search Problem which was funded by the U.S. National Science Foundation and Department of Homeland Security (award #ECCS ). References 1. International Atomic Energy Agency. Illicit Trafficking Database (ITDB) Factsheet, American Physical Society (APS) / American Association for the Advancement of Science (AAAI) Joint Working Group: Nuclear Forensics: Role, State of the Art, Program Needs, F. Gey, R. Larson, and E. Sutton. Ari-ma recasting nuclear forensics discovery as a digital library search problem, nsf/domestic nuclear detection office academic research initiative grant proposal from uc berkeley Y. Lifshits. Branch and bound algorithms for nearest neighbor search: Lecture 1. Steklov Institute of Mathematics at St. Petersburg, California Institute of Technology, RuSSIR, Russian Summer in Information Retrieval, M. Robel and M. J. Kristo. Characterization of nuclear fuel using multivariate statistical analysis. Lawrence Livermore National Laboratory report, M. Robel, M. J. Kristo, and M. Heller. Nuclear forensic inferences using iterative multidimensional statistics. Institute of Nuclear Materials Management 50th Annual Meeting Tucson, AZ., July A. Sonzogni. Nudat (nuclear structure and decay data) database C. E. Willingham. Nuclear fuel cycle and weapons development process. Prepared for the United States of America Department of Energy by the Pacific Northwest National Laboratory
Seoul Communiqué 2012 Seoul Nuclear Security Summit
Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to
NUCLEAR FORENSICS UNDERGRADUATE SCHOLARSHIP PROGRAM
U.S. DEPARTMENT OF HOMELAND SECURITY DOMESTIC NUCLEAR DETECTION OFFICE NUCLEAR FORENSICS UNDERGRADUATE SCHOLARSHIP PROGRAM Student Application Deadline February 1, 2013 Awards Announced March 2013 ACADEMIC
The Urgent Requirement for New Radioanalytical CRMs for Measurement Traceability in Nuclear Safeguards, Nuclear Forensics, and Consequence Management
The Urgent Requirement for New Radioanalytical CRMs for Measurement Traceability in Nuclear Safeguards, Nuclear Forensics, and Consequence Management Jacqueline Mann, C. Martin Johnson Jr., Warren Oldham,
Nuclear Forensics and the requirement of Certified Reference Materials. SSA Jeff Leggitt, FBI Laboratory Quantico, Virginia
Nuclear Forensics and the requirement of Certified Reference Materials SSA Jeff Leggitt, FBI Laboratory Quantico, Virginia Goals of Forensic Science Associate an item of physical evidence with a person,
2374-19. Joint ICTP-IAEA School of Nuclear Energy Management. 5-23 November 2012. Nuclear Security Fundamentals Module 9 topic 2
2374-19 Joint ICTP-IAEA School of Nuclear Energy Management 5-23 November 2012 Nuclear Security Fundamentals Module 9 topic 2 EVANS Rhonda, IAEA Department of Nuclear Safety and Security Office of Nuclear
The Parties agree as follows: ARTICLE I. For the purposes of this Agreement:
AGREEMENT FOR COOPERATION BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE REPUBLIC OF KOREA CONCERNING CIVIL USES OF ATOMIC ENERGY Whereas the Government of the United
FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS
IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]
International Symposium on Nuclear Security
International Symposium on Nuclear Security The Nuclear Security actions taken in Mexico to get an effective protection system of nuclear and radioactive facilities RUBÉN RAMÍREZ GUERRERO [email protected]
HIGHLY ENRICHED URANIUM INVENTORY
U NITE D DEPARTMENT OF ENERGY STATES OF A M ERICA HIGHLY ENRICHED URANIUM INVENTORY AMOUNTS OF HIGHLY ENRICHED URANIUM IN THE UNITED STATES U.S. DEPARTMENT OF ENERGY OFFICE OF SECURITY AND SAFETY PERFORMANCE
Chemical and Isotopic Signatures for Environmental Remediation and Nuclear Forensic Analysis
Chemical and Isotopic Signatures for Environmental Remediation and Nuclear Forensic Analysis Sue B. Clark Washington State University, Department of Chemistry, Pullman, WA 99163 [email protected] Abstract
IBC 2100. Nuclear Energy Liability Exclusion. Explained
IBC 2100 Nuclear Energy Liability Exclusion Explained By Colleen DeMerchant Assistant Manager Nuclear Insurance Association of Canada June 22, 2005 Nuclear Energy Liability Exclusion (IBC 2100 CGL form)
Basics of Nuclear Physics and Fission
Basics of Nuclear Physics and Fission A basic background in nuclear physics for those who want to start at the beginning. Some of the terms used in this factsheet can be found in IEER s on-line glossary.
Requirements and Challenges for a Nuclear Forensic System
Requirements and Challenges for a Nuclear Forensic System David Kenneth Smith Division of Nuclear Security Prepared for Seminar on Nuclear Forensics from a Nordic Perspective Oslo, Norway 5 6 October 2015
SUN PRAIRIE AREA SCHOOL DISTRICT COURSE POWER STANDARDS. Curriculum Area: Science Course Length: Semester
SUN PRAIRIE AREA SCHOOL DISTRICT COURSE POWER STANDARDS Course Title: Forensic Science Curriculum Area: Science Course Length: Semester Credit Status: ½ Physical Science Credit Date submitted: 7/09 Expected
ORTEC DET-SW-UPG. Latest Software Features. Ease of Use. Source Location with the Detective V3 Software
ORTEC DET-SW-UPG Latest Software Features Three Search Modes: Gamma/Neutron total count rate. SNM search mode. Sliding average "monitor" mode. (NEW) User choice of identification schemes: Classify mode
Plutonium vs. Uranium: The Road Less Traveled. In a world where nuclear proliferation may no longer be held back by the guise of antiproliferation
David Wang STS.092 Plutonium vs. Uranium: The Road Less Traveled In a world where nuclear proliferation may no longer be held back by the guise of antiproliferation treaties, where the news, everyday,
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 AN ACT TO (1) CREATE THE NORTH CAROLINA FORENSIC SCIENCE ADVISORY BOARD, (2) ENCOURAGE EFFORTS TO ELIMINATE SOURCES OF
IAEA Support for the Establishment of Nuclear Security Education
IAEA Support for the Establishment of Nuclear Security Education Andrea Braunegger-Guelich, Vladimir Rukhlo Office of Nuclear Security Department of Nuclear Safety and Security International Atomic Energy
Waste Management 04 Conference, February 29 - March 4, 2004, Tucson, AZ Copyright WM Symposia, Inc. All Rights Reserved. Reprinted with permission.
RADIOLOGICAL FALSE POSITIVES IN ENVIRONMENTAL SOIL AND GROUNDWATER DATA FROM COMMERCIAL LABORATORIES Walter Kubilius Westinghouse Savannah River Company Thomas Coffey, Paul Mark EXR, Inc. Allen Volesky
Trade monitoring for nuclear and nuclear-related dual-use items
Trade monitoring for nuclear and nuclear-related dual-use items Cristina Versino European Commission Joint Research Centre (JRC) Institute for Transuranium Elements Information Analysis for Nuclear Security
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10
How To Strengthen Nuclear Security
COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,
Nuclear Security Glossary
IAEA NUCLEAR SECURITY SERIES NO. Nuclear Security Glossary Revision 3E Draft 17 March 2010 Page 1 of 16 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME] Page 2 of 16 Introduction The Nuclear
Plutonium Watch. Tracking Plutonium Inventories by David Albright and Kimberly Kramer. July 2005, Revised August 2005
Plutonium Watch Tracking Plutonium Inventories by David Albright and Kimberly Kramer July 25, Revised August 25 Plutonium is a key ingredient in nuclear weapons, making it one of the most dangerous materials
REGULATION. Regulation for the System of Accounting for and Control of Nuclear Material and Application of Additional Protocol (FANR-REG-10) Version 0
REGULATION Regulation for the System of Accounting for and Control of Nuclear Material and Application of Additional Protocol (FANR-REG-10) Version 0 Federal Authority for Nuclear Regulation (FANR) P.O.
Conference Call with Dr. Olli Heinonen Transcript
1 Conference Call with Dr. Olli Heinonen Transcript David Harris: Welcome ladies and gentlemen. I m absolutely delighted that The Israel Project is hosting Dr. Olli Heinonen for this conference call on
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES CLASS TITLE POSITION CODE STATE POLICE EVIDENCE TECHNICIAN I 41901 STATE POLICE EVIDENCE TECHNICIAN
Structure and Properties of Atoms
PS-2.1 Compare the subatomic particles (protons, neutrons, electrons) of an atom with regard to mass, location, and charge, and explain how these particles affect the properties of an atom (including identity,
Insider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University [email protected] Lawrence
NUCLEAR RESEARCH AT INP-ALMATY:
NUCLEAR RESEARCH AT INP-ALMATY: Science, Technology, Safety, Security, Cooperation 9 th APCTP-BLTP JINR Joint Workshop at Kazakhstan Almaty, June 27 July 4, 2015 Petr Chakrov Institute of Nuclear Physics
Nuclear Material Accounting Handbook. Vienna, May 2008. Services Series 15
Nuclear Material Accounting Handbook Vienna, May 2008 Services Series 15 IAEA Services Series No. 15 Nuclear Material Accounting Handbook May 2008 The originating Section of this publication in the IAEA
Cluster Analysis for Evaluating Trading Strategies 1
CONTRIBUTORS Jeff Bacidore Managing Director, Head of Algorithmic Trading, ITG, Inc. [email protected] +1.212.588.4327 Kathryn Berkow Quantitative Analyst, Algorithmic Trading, ITG, Inc. [email protected]
DEMONSTRATION ACCELERATOR DRIVEN COMPLEX FOR EFFECTIVE INCINERATION OF 99 Tc AND 129 I
DEMONSTRATION ACCELERATOR DRIVEN COMPLEX FOR EFFECTIVE INCINERATION OF 99 Tc AND 129 I A.S. Gerasimov, G.V. Kiselev, L.A. Myrtsymova State Scientific Centre of the Russian Federation Institute of Theoretical
Similarity Search and Mining in Uncertain Spatial and Spatio Temporal Databases. Andreas Züfle
Similarity Search and Mining in Uncertain Spatial and Spatio Temporal Databases Andreas Züfle Geo Spatial Data Huge flood of geo spatial data Modern technology New user mentality Great research potential
Institute for Science and International Security
Institute for Science and International Security ISIS Report Defining Iranian Nuclear Programs in a Comprehensive Solution under the Joint Plan of Action Drawn from Institute for Science and International
STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE CHEM 150 - COLLEGE CHEMISTRY I
STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE CHEM 150 - COLLEGE CHEMISTRY I PREPARED BY: NICOLE HELDT SCHOOL OF SCIENCE, HEALTH, AND PROFESSIONAL STUDIES SCIENCE DEPARTMENT
PROSPECT: Precision Reactor Oscillation and Spectrum experiment
PROSPECT: Precision Reactor Oscillation and Spectrum experiment DAVID MARTINEZ CAICEDO on behalf of PROSPECT collaboration ILLINOIS INSTITUTE OF TECHNOLOGY NUFACT 2015 AUGUST 14th 2015 1 Outline Motivations:
Nuclear Forensics Support
IAEA Nuclear Security Series No. 2 Technical Guidance Reference Manual Nuclear Forensics Support NUCLEAR FORENSICS SUPPORT REFERENCE MANUAL The following States are Members of the International Atomic
CRIME SCENE FORENSICS
CRIME SCENE FORENSICS Description Crime Scene Forensics, which is a laboratory-based course, will promote and cultivate the development of student s scientific inquiry and scientific method skills, which
University of Texas Nuclear Security Program: Academic Curriculum and Nuclear Engineering Teaching Laboratory
University of Texas Nuclear Security Program: Academic Curriculum and Nuclear Engineering Teaching Laboratory Specific Program Information Academic Curriculum and Nuclear Engineering Teaching Laboratory
The Netherlands Forensic Institute. Strengthening the rule of law together
The Netherlands Forensic Institute Strengthening the rule of law together The Netherlands Forensic Institute The Netherlands Forensic Institute (NFI) is one of the world s leading forensic laboratories.
Strategic Decision Support using Computerised Morphological Analysis
Strategic Decision Support using Computerised Morphological Analysis Adapted from a paper presented at the 9th International Command and Control Research and Technology Symposium, Copenhagen September
Part 1 General and Administrative Information. Part 3 Applicant s Environmental Report Combined License Stage
Part 16 South Carolina Electric and Gas V. C. Summer Nuclear Station, Units 2 & 3 COL Application COLA Table of Contents Navigation Page Part 1 General and Administrative Information Part 2 Final Safety
9 th Grade Physical Science Springfield Local Schools Common Course Syllabi. Course Description
9 th Grade Physical Science Springfield Local Schools Common Course Syllabi Course Description The purpose of the Physical Science course is to satisfy the Ohio Core science graduation requirement. The
Nuclear Physics. Nuclear Physics comprises the study of:
Nuclear Physics Nuclear Physics comprises the study of: The general properties of nuclei The particles contained in the nucleus The interaction between these particles Radioactivity and nuclear reactions
Master Degree in Nuclear Engineering: Academic year 2007-2008
Master Degree in Nuclear Engineering: Academic year 2007-2008 Number of students 2007-2008: University Politehnica Bucharest Total: 17 Language: Romanian For further information: www.cne.pub.ro Dates Title
Somers Public Schools Somers, Connecticut 06071 Science Curriculum
Survey in Forensics Grades 11 and 12 F.1 Teamwork and deductive reasoning play an important role in forensic science. Core Theme: Understanding forensic science. What is forensic science and why are teamwork
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead COURSE DESCRIPTION: Fingerprints. Blood spatter. DNA analysis. The world of law enforcement is increasingly making use of the techniques
Legal view of digital evidence
Chapter 2 Legal view of digital evidence Before developing a model or a theory, it is important to understand the requirements of the domain in which the model or the theory is going to be used. The ultimate
Training in Emergency Preparedness and Response
Working to Protect People, Society and the Environment Training in Emergency Preparedness and Response Nuclear Safety and Security Programme Nuclear Safety and Security Programme Training in Emergency
EXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science
Certificate Description This certificate provides professionals the opportunity to enhance specialized skills in Forensic Science. Arson Investigation CRJS 350 This course will explore criminal and scientific
Corporate Training. Occupational Safety, Health, and Environmental Management. Certificate Program. extension.uci.edu/corporate
Corporate Training Occupational Safety, Health, and Environmental Management Certificate Program extension.uci.edu/corporate Safety and health professionals play an important role in maintaining the quality
Radiation Protection s Benefits in the Production of Iodine-131
Radiation Protection s Benefits in the Production of Iodine-131 Daniel M. Cestau *, Ariel N. Novello, Cecilia Bravo, Pablo Cristini, Marcelo Bronca, Eduardo Carranza, Ricardo Bavaro, Julián Cestau and
Crime Scene Investigator I
Office of Human Resources Crime Scene Investigator I Page 1 of 5 GENERAL STATEMENT OF CLASS DUTIES Performs entry-level professional work while receiving training in the principles, practices, methods,
ASTM C26 LONG RANGE PLAN Committee on the Nuclear Fuel Cycle
ASTM C26 LONG RANGE PLAN Committee on the Nuclear Fuel Cycle VISION STATEMENT ASTM C26 continues to be the Internationally-recognized leader in the development of consensus standards for the Nuclear Fuel
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description
Forensic Science High School Elective Course Description Forensic Science is a one semester high school level course that satisfies a CUSD200 graduation requirement in the area of science. Successful completion
Antoine Henri Becquerel was born in Paris on December 15, 1852
Discovery Antoine Henri Becquerel was born in Paris on December 15, 1852 Summit Environmental Technologies, Inc. Analytical Laboratories 3310 Win Street Cuyahoga Falls, Ohio 44223 Fax: 1-330-253-4489 Call
Open Source Software zur Vertrauensbildung in der Abrüstungsverifikation: Simulation von Neutronenmultiplizitätsmessungen mit Geant4
Open Source Software zur Vertrauensbildung in der Abrüstungsverifikation: Simulation von Neutronenmultiplizitätsmessungen mit Geant4 Moritz Kütt [email protected] Interdisciplinary Research Group
Big Data s Big Impact In Financial Investigations
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Big Data s Big Impact In Financial Investigations
LAW OF GEORGIA on Export Control of Armaments, Military Equipment and Dual-Use Products
LAW OF GEORGIA on Export Control of Armaments, Military Equipment and Dual-Use Products This Law establishes the principles and procedures for implementation of export control of arms, military technology,
Course Forensic Science. Unit II History
Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History
MONTE CARLO SIMULATION OF THE FULL MULTIPLICITY DISTRIBUTIONS MEASURED WITH A PASSIVE COUNTER
International Conference on Mathematics, Computational Methods & Reactor Physics (M&C 9) Saratoga Springs, New York, May 3-7, 9, on CD-ROM, American Nuclear Society, LaGrange Park, IL (9) MONTE CARLO SIMULATION
Nuclear Security Education and Training At Naif Arab University for Security Sciences
Nuclear Security Education and Training At Naif Arab University for Security Sciences Dr. Amjad Fataftah Chairman, Forensic Chem. Dept. College of Forensic Sciences Naif Arab University for Security Sciences
NATIONAL NUCLEAR SECURITY ADMINISTRATION
NATIONAL NUCLEAR SECURITY ADMINISTRATION (Discretionary dollars in thousands) FY 2013 FY 2014 FY 2015 FY 2015 vs. FY 2014 Current Enacted Request $ % National Nuclear Security Administration Weapons Activities
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
About the Enrichment Limit for Research Reactor Conversion : Why 20%?
The 27th International Meeting on Reduced Enrichment for Research and Test Reactors (RERTR) November 6 10, 2005, Boston, Massachusetts About the Enrichment Limit for Research Reactor Conversion : Why 20%?
AN INVESTIGATION INTO THE USEFULNESS OF THE ISOCS MATHEMATICAL EFFICIENCY CALIBRATION FOR LARGE RECTANGULAR 3 x5 x16 NAI DETECTORS
AN INVESTIGATION INTO THE USEFULNESS OF THE ISOCS MATHEMATICAL EFFICIENCY CALIBRATION FOR LARGE RECTANGULAR 3 x5 x16 NAI DETECTORS Frazier L. Bronson CHP Canberra Industries, Inc. 800 Research Parkway,
FORENSIC SCIENTIST MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION
MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION FORENSIC SCIENTIST JOB DESCRIPTION Employees in this job complete and oversee a variety of tests, analyses, identification, and classification of mechanical
NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014
NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism
International Convention on Nuclear Security
International Convention on Nuclear Security Washington, DC March 2015 This convention establishes an effective and sustainable international legal mechanism that allows for continuous improvement and
Phased International Cooperation with North Korea s Civil Nuclear Programs
Phased International Cooperation with North Korea s Civil Nuclear Programs David Albright Institute for Science and International Security (ISIS) March 19, 2007 North Korea s desire to produce electricity
CHM 105. General organic and Biochemistry
Technical College of the Lowcountry Arts & Sciences Division 921 Ribaut Road Building 9, Room 102 Beaufort, SC 29901 843-525-8281 CHM 105 General organic and Biochemistry Course Description This course
Strengthening Forensic Science in the United States: A Path Forward
This PDF is available from The National Academies Press at Strengthening Forensic Science in the United States: A Path Forward ISBN 978-0-309-13135-3 Committee on Identifying the Needs of the Forensic
How To Understand The Sensitivity Of A Nuclear Fuel Cask
IAEA Conference Paper Thursday, February 16, 2006 Nuclear Science and Technology Division Application of Sensitivity/Uncertainty Methods to Burnup Credit Validation D. E. Mueller and J. C. Wagner Oak Ridge
10 Nuclear Power Reactors Figure 10.1
10 Nuclear Power Reactors Figure 10.1 89 10.1 What is a Nuclear Power Station? The purpose of a power station is to generate electricity safely reliably and economically. Figure 10.1 is the schematic of
How Cisco IT Uses SAN to Automate the Legal Discovery Process
How Cisco IT Uses SAN to Automate the Legal Discovery Process Cisco dramatically reduces the cost of legal discovery through better data management. Cisco IT Case Study / Storage Networking / : This case
Determination of the Comsumption Rate in the Core of the Nigeria Research Reactor-1 (NIRR-1) Fuelled with 19.75% UO 2 Material
Journal of Nuclear and Particle Physics 2016, 6(1): 1-5 DOI: 10.5923/j.jnpp.20160601.01 Determination of the Comsumption Rate in the Core of the Nigeria Research Reactor-1 (NIRR-1) Fuelled with 19.75%
How To Become A State Pol Forensic Tech Leader
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,
The National Intelligence Estimative Product
Iran: Nuclear Intentions and Capabilities November 2007 OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE The Director of National Intelligence serves as the head of the Intelligence Community (IC), overseeing
