Pollina D.A.,National Center for Credibility Assessment |
Computers in Human Behavior | Year: 2014
To determine the feasibility of automating the process of interviewing applicants for Federal security clearances, the authors examined behavioral and physiological responses of individuals (n = 120) to questions concerning their mental health, drug, alcohol, and criminal histories. The interviews were administered by a computer-generated (CG) agent. The results indicated that the number of relevant admissions during the CG interview exceeded the number of admissions made using a self-report questionnaire. In addition, significant blood volume and skin conductance amplitude differences were observed between individuals who made two or more relevant admissions and individuals who made less than two admissions. An interaction between perceived locus of interview control (either computer or human) and behavioral activation systems (BAS) on skin conductance (SC) responses was also observed. © Published by Elsevier Ltd.
IEEE Electrification Magazine | Year: 2015
The definition of rural areas has evolved over time because of the urbanization movement. Today, rural areas are typically defined as all territories outside urban or suburban areas, where farming is still the main economic activity. The U.S Census Bureau defines a rural area as any area outside of an urbanized area whose population is greater than 50,000 and whose core population density is greater than 1,000 persons per square mile (or 386 persons per square kilometer). There are many other definitions by different countries and even by different government agencies within the same country. Regardless, the common attributes of rural areas are the small population clusters and low population density. These two characteristics dictate that there are tremendous challenges to building infrastructure in the geographically disperse rural areas, which ?constrains economic activities and household incomes. © 2013 IEEE.
Gerlach K.,U.S. Navy |
Picciolo M.L.,ManTech |
IEEE Transactions on Aerospace and Electronic Systems | Year: 2011
A robust, fast-converging, reduced-rank adaptive processor called the loaded reiterative median cascaded canceller (LRMCC) is introduced. The LRMCC exhibits the highly desirable combination of 1) convergence-robustness to outliers/targets/nonstationary data in adaptive weight training data, and 2) fast convergence at a rate commensurate with reduced-rank algorithms. Simulated jamming data as well as measured airborne radar data from the MCARM space-time adaptive processing (STAP) database are used to show performance enhancements. Performance is compared with the fast maximum likelihood (FML) and sample matrix inversion (SMI) algorithms. It is demonstrated that the LRMCC is easily implemented and is a highly robust replacement for existing reduced-rank adaptive processors, exhibiting superior performance in nonideal measured data environments. © 2011 IEEE.
Stekli J.,U.S. Department of Energy |
Irwin L.,ManTech |
Pitchumani R.,U.S. Department of Energy
Journal of Thermal Science and Engineering Applications | Year: 2013
Concentrating solar power (CSP) provides the ability to incorporate simple, efficient, and cost-effective thermal energy storage (TES) by virtue of converting sunlight to heat as an intermediate step to generating electricity. Thermal energy storage for use in CSP systems can be one of sensible heat storage, latent heat storage using phase change materials (PCMs) or thermochemical storage. Commercially deployed CSP TES systems have been achieved in recent years, with two-tank TES using molten salt as a storage medium and steam accumulators being the system configurations deployed to date. Sensible energy thermocline systems and PCM systems have been deployed on a pilot-scale level and considerable research effort continues to be funded, by the United States Department of Energy (DOE) and others, in developing TES systems utilizing any one of the three categories of TES. This paper discusses technoeconomic challenges associated with the various TES technologies and opportunities for advancing the scientific knowledge relating to the critical questions still remaining for each technology. © 2013 by ASME.
News Article | July 30, 2011
As promised, Anonymous has sought to embarrass the FBI with a network attack, this time going after defense contractor ManTech International. “Hacktivist” collective Anonymous claims to have “owned” the defense contractor ManTech International and promised to release the stolen information within 24 hours, according to a post on Twitter that appeared shortly after midnight on 29 July. Some documents have already been posted as “teasers”, including a resume of an individual with significant military and law enforcement background and a statement of work memo for NATO Communication & Information Systems Services Agency. About 500MB of files are expected to be released. This latest attack is in apparent retribution for the 20 July arrests of individuals who are accused of participating in Anonymous group hacking attacks. Earlier this week, in the midst of news reports about British police arresting a suspected member of hacker group LulzSec and regular updates on Twitter about people canceling PayPal accounts in protest, Anonymous posted the following warning on Twitter, “Also, tomorrow: Expect something nice. Looks like the FBI asked for a slap in the face. Well, we can deliver. #FFF (On Thursday, who cares).” About 14 individuals were arrested on 20 July in the United States for participating in the Anonymous DDOS (distributed denial-of-service) campaign against PayPal in Operation Payback in December. The FBI also arrested one person accused of hacking into InfraGard Tampa and a customer support contractor who downloaded confidential AT&T documents and provided them to LulzSec. The group said the attacks will continue regardless of the arrests. “We are not scared anymore. Any threats to arrest us are meaningless. We are past threats. We just act. #AntiSec #FFFriday,” the group posted via Twitter. British police also arrested two alleged members of LulzSec, and the Dutch National Police Agency arrested four Anonymous members this month. In June, Spanish authorities arrested three members and claimed to have shut down Anonymous within the country, and Turkish police detained 32 individuals with alleged links to the group. ManTech provides cyber-security services such round-the-clock intrusion-detection monitoring, security engineering, and incident identification and response. It’s providing these services to the FBI’s security division as part of a $99.5 million (£60m) five-year contract. The company also provides vulnerability assessment and penetration testing, cyber-threat analysis and specialised cyber-training services. Other clients include the National Security Agency and the departments of Defense, State and Homeland Security, among others. “The latest attack against ManTech following a string of attacks against other defense and national security contractors shows that those charged with defending our nation are also susceptible to the same attacks,” Anup Ghosh, chief executive of Invincea, told eWEEK. “Make no mistake – this is a failure of the security industry more than it is a failure of ManTech, Booz Allen, Northrup Grumman, and the National Labs,” Ghosh added. Anonymous dumped 90,000 passwords belonging to military personnel from consulting firm Booz Allen Hamilton, exposed sensitive information belonging to agricultural chemical and biotechnology company Monsanto employees and stole more than 8GB of internal data from Italy’s cyber-crime police unit. Before it disbanded, LulzSec lifted and published internal documents obtained during its attack on the Arizona Department of Public Safety, breached two websites belonging to FBI partners InfraGard Atlanta and InfraGard Connecticut, and broke into surveillance company Unveillance chief executive’s personal email account. In a recent interview with National Public Radio in the US, FBI Director Steve Chabinsky discussed the recent arrests. “We want to send a message that chaos on the Internet is unacceptable. [Even if] hackers can be believed to have social causes, it’s entirely unacceptable to break into websites and commit unlawful acts,” Chabinsky said. The charge of intentional damage to a protected computer carries a maximum penalty of 10 years in prison and a $250,000 fine, and each count of conspiracy carries a maximum penalty of five years in prison and a $250,000 fine, according to the FBI. Anonymous “suspects” may face a fine of up to $500,000, with the addition of 15 years’ jail time even if all they did was download the Low-Orbit Ion Cannon software to take part in the DDOS attack. Some Internet users forget that participating in DDOS attacks against websites and online organisations for whatever reason is against the law, Graham Cluley of Sophos, told eWEEK. “If found guilty, most of these individuals are likely to turn out to be foot soldier volunteers in a much bigger Internet conflict, and yet by knowingly participating in a denial-of-service attack it’s unlikely that they will be looked upon kindly by the courts,” Cluley said. Anonymous claims there is a “vast difference” between participating in a civil protest and cyber-criminals running a large botnet. “The end doesn’t justify the means. Time spent throwing bricks through other people’s digital windows doesn’t actually teach anyone anything about glassmaking, glazing or civil engineering,” Paul Ducklin, head of technology for the Asia Pacific group at Sophos, wrote on the NakedSecurity blog in June.